From patchwork Wed Feb 15 12:02:04 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Anthony PERARD X-Patchwork-Id: 13141572 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 79C2AC636CC for ; Wed, 15 Feb 2023 12:02:45 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.495903.766342 (Exim 4.92) (envelope-from ) id 1pSGUV-0003Ba-1c; Wed, 15 Feb 2023 12:02:27 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 495903.766342; Wed, 15 Feb 2023 12:02:27 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1pSGUU-0003BT-Ue; Wed, 15 Feb 2023 12:02:26 +0000 Received: by outflank-mailman (input) for mailman id 495903; Wed, 15 Feb 2023 12:02:26 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1pSGUU-0002tE-0e for xen-devel@lists.xenproject.org; Wed, 15 Feb 2023 12:02:26 +0000 Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 97f057e2-ad28-11ed-93b5-47a8fe42b414; Wed, 15 Feb 2023 13:02:20 +0100 (CET) X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 97f057e2-ad28-11ed-93b5-47a8fe42b414 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1676462540; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=MVgVSQoqoX6b1cwtMgdJCX74cqDIUgNuwrGwqbwsx9c=; b=CLwry3HxeXdRxXQZmiNn2q1bbSGI7YhMF9XgniiPpq9ybSJYIES/9D1h V13c+qleQ45uMzDv9xLtyBn0i/C5U48a0Md/uGC5uSuII6MCr2w0qSkmb CPwoQ6OrYrPYCnri1rIPCrW/OCGNItPq28RWLo6XVZEHywUYwFG46UEKM o=; Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none X-SBRS: 4.0 X-MesageID: 97048389 X-Ironport-Server: esa2.hc3370-68.iphmx.com X-Remote-IP: 162.221.156.123 X-Policy: $RELAYED IronPort-Data: A9a23:ifiYd6LPPL29zLAdFE+R/pUlxSXFcZb7ZxGr2PjKsXjdYENS0DwAx 2sZUW+OOvvcZjakcoglPYvgph9V7J7Xz9IwQAJlqX01Q3x08seUXt7xwmUcnc+xBpaaEB84t ZV2hv3odp1coqr0/0/1WlTZhSAgk/rOHvykU7Ss1hlZHWdMUD0mhQ9oh9k3i4tphcnRKw6Ws Jb5rta31GWNglaYCUpJrfPcwP9TlK6q4mhA5AVjPakjUGL2zBH5MrpOfcldEFOgKmVkNrbSb /rOyri/4lTY838FYj9yuu+mGqGiaue60Tmm0hK6aYD76vRxjnVaPpIAHOgdcS9qZwChxLid/ jnvWauYEm/FNoWU8AgUvoIx/ytWZcWq85efSZSzXFD6I+QrvBIAzt03ZHzaM7H09c5QLUxDq ewoJAoCSU++vM2J5+7rWs9V05FLwMnDZOvzu1llxDDdS/0nXYrCU+PB4towMDUY354UW6yEP oxANGQpNU6bC/FMEg5/5JYWleG0hn75YntApUicv6Yf6GnP1g1hlrPqNbI5f/TbGp0Jzh3I9 woq+UylIR8nF9+d7QaL92yWgcvEpB3mUaI7QejQGvlC3wTImz175ActfVCyu/W+h2a1UshTL EFS8S0rxYAp71CiRNT5Wxy+oVaHswQaVt4WFPc1gCmdx6yR7wuHC2wsSj9adMdgpMIwXSYt1 FKCg5XuHzMHjVGOYSvDrPHO92r0YHVLazZYPkfoUDfp/fHEjKw+0gL/QuxsN/GItfLKPm2g0 xaz+X1Wa6ooseYH0KCy/Fbiij2qp4TUQgNd2jg7Tl5J/SsiOtf7OtXABUzzqK8Zcd3HFgXpU G0swZD20QwYMX2aeMVhqs0pFarh2fuKOSa0bbVHT8h4rGTFF5JOkOltDNBCyKVBaJ1sldzBO hW7VeZtCHl7ZiPCgUhfPeqM5zwCl/SIKDgcfqm8giBySpZwbhSb2ypleFSd2Wvg+GB1z/5hY sbKL5z9VyZAYUiC8NZQb71FuVPM7npjrV4/uLihl0j3uVZgTCD9pUg53KumMblisfLsTPT9+ NdDLcqaoyizo8WnChQ7BbU7dAhQRVBiXMCeliCiXrLbSuaQMD17WqC5LHJIU9ANopm5Yc+Up i7nABUClQGn7ZAFQC3TAk1ehHrUdc4XhRoG0eYEZz5EB1BLjV6T0Zoi IronPort-HdrOrdr: A9a23:+vVrA6OoKs5kC8BcTv2jsMiBIKoaSvp037BL7SxMoHluGaalfq +V7ZcmPGDP+U4ssR0b+OxoQZPwJ080lqQb3WByB8bBYOC8ghrNEGgK1+KLrgEIfReOk9K1vZ 0QFJSWY+efMbEVt6bHCFvSKadY/OW6 X-IronPort-AV: E=Sophos;i="5.97,299,1669093200"; d="scan'208";a="97048389" From: Anthony PERARD To: CC: Anthony PERARD , Doug Goldstein , Stefano Stabellini Subject: [XEN PATCH 0/4] automation: Update containers to allow HTTPS access to xenbits Date: Wed, 15 Feb 2023 12:02:04 +0000 Message-ID: <20230215120208.35807-1-anthony.perard@citrix.com> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 Patch series available in this git branch: https://xenbits.xen.org/git-http/people/aperard/xen-unstable.git br.gitlab-containers-update-v1 There is work in progress [1] to update urls in our repo to use https, but those https urls to xenbits don't work in our containers, due to an expired root certificate. So we need to update those containers. This series update the dockerfile where just rebuilding the container isn't enough. I've tested the new containers but didn't updated them yet. You can see the result in the following links (if you can access them). There are other containers been test which didn't need dockerfile update. https://gitlab.com/xen-project/people/anthonyper/xen/-/pipelines/777474218 https://gitlab.com/xen-project/people/anthonyper/xen/-/pipelines/778218868 Building randconfig on debian unstable seems to be an issue. [1] https://lore.kernel.org/xen-devel/75d91def8234bceb41548147ee8af5fea52bd1d6.1675889602.git.demi@invisiblethingslab.com/ Cheers, Anthony PERARD (4): automation: Remove clang-8 from Debian unstable container automation: Ignore package authentification issue in Jessie container automation: Remove expired root certificates used to be used by let's encrypt automation: Add more aliases in containerize automation/build/centos/7.2.dockerfile | 5 +++++ automation/build/centos/7.dockerfile | 5 +++++ automation/build/debian/jessie-i386.dockerfile | 7 +++++++ automation/build/debian/jessie.dockerfile | 7 +++++++ automation/build/debian/unstable-llvm-8.list | 3 --- automation/build/debian/unstable.dockerfile | 12 ------------ automation/build/ubuntu/trusty.dockerfile | 5 +++++ automation/gitlab-ci/build.yaml | 10 ---------- automation/scripts/containerize | 3 +++ 9 files changed, 32 insertions(+), 25 deletions(-) delete mode 100644 automation/build/debian/unstable-llvm-8.list