- 16 May, 2022 4 commits
-
-
Ariel D'Alessandro authored
This is the default reprepro snaphost hook script. Let's add it until OBS reprepro support is finally dropped. Signed-off-by:
Ariel D'Alessandro <ariel.dalessandro@collabora.com>
-
Ariel D'Alessandro authored
This function cleans up all contents from a repository. In order to re-create snapshots from reprepro, we may wanna reset a repository, then add all packages from an old reprepro snapshot and create the aptly snapshot from there. Signed-off-by:
Ariel D'Alessandro <ariel.dalessandro@collabora.com>
-
Ariel D'Alessandro authored
Update the prefix used in the aptly test, to match the one used by reprepro repositories in general. Signed-off-by:
Ariel D'Alessandro <ariel.dalessandro@collabora.com>
-
Ariel D'Alessandro authored
These functions will be used from other perl scripts as well. Let's make it available from the aptly module. Signed-off-by:
Ariel D'Alessandro <ariel.dalessandro@collabora.com>
-
- 12 May, 2022 6 commits
-
-
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
This commit adds tests for the OBS aptly integration. See tests/aptly/README.md for instructions on how to run the test suite. Signed-off-by:
Ariel D'Alessandro <ariel.dalessandro@collabora.com>
-
This commit integratates aptly backend. The following features are supported: * OBS repositories gets automatically created/removed on aptly. * Each arch with the publish flag enabled in a repository, get published on aptly. * Package binaries get added to the aptly repository right after they get built. Old versions are automatically removed. * Every time a package is published, a snapshot is taken and published. Related documentation is added to `README.aptly.md`: * aptly configuration files. * snapshot and db-cleanup scripts. Signed-off-by:
Ariel D'Alessandro <ariel.dalessandro@collabora.com>
-
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Secrets are owned by root and are not world-readable by default, so the frontend cannot access them when it’s not running as root. Not all versions of docker-compose support setting access rights for secrets, so instead of wrangling with them, just copy secrets and re-own them. Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
- 04 May, 2022 1 commit
-
-
The can_register check is actually only suitable for preventing new unverified registrations; in SSO mode, we normally trust the SSO provider have performed the checks and only gives us users we’re supposed to let in. Ideally, this should be a separate set of settings to allow e.g. optionally requiring confirmation on SSO logins or to configure different levels of trust per SSO provider. Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
- 03 May, 2022 1 commit
-
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
- 02 May, 2022 20 commits
-
-
Andrej Shadura authored
The auth hash can be quite large, and with session storage in cookies, the cookie can easily reach the 4 KB limit. Work around this issue by only storing the part of the hash we currently use. Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Add a new "hash type" for invalid passwords, which is never equal to normal passwords, but nevertheless can be changed without being known by the user. This "invalid" password can only be set by directly setting the password hash type. When updating the password using update_password method, it will always be upgrade it to the strongest hash type, sha256crypt. To allow changing this "invalid" password to a normal one, stop requiring a non-empty current password in the password change dialog when changing a password from an "invalid" one. Don’t show the current password box either, as it is not used anyway in this case, making it better not to show it to avoid confusion. Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
The redirect should only happen to the referrer URL pointing at our domain, never to the external ones. Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Some providers set username or nickname to an email address. For this reason, first collect the best possible user name we can find, and only then fix it to match our requirements. Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
See https://bugs.debian.org/697630 Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
- 28 Apr, 2022 1 commit
-
-
Andrej Shadura authored
Service dispatch daemon depends on the source service, so it has to start after it. Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
- 27 Apr, 2022 3 commits
-
-
Backend services have internal dependencies, so it’s better to start them in the correct order. Supervisord does not guarantee this order, but it’s still better than starting them all at once. See: https://openbuildservice.org/help/manuals/obs-admin-guide/obs.cha.installation_and_configuration.html#_backend_installation Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
- 26 Apr, 2022 2 commits
-
-
The backend better fits to a stateful set rather then a replicaset; As obviously the backend has a lot of state and a 1:1 relationship with its volumes Signed-off-by:
Sjoerd Simons <sjoerd@collabora.com>
-
OBS doesn't talk to the kubernetes api so there is no reason to create service accounts Signed-off-by:
Sjoerd Simons <sjoerd@collabora.com>
-
- 25 Apr, 2022 2 commits
-
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-
Andrej Shadura authored
Signed-off-by:
Andrej Shadura <andrew.shadura@collabora.co.uk>
-