List of commits:
Subject Hash Author Date (UTC)
Make rgfs more verbose in case of errors 197c21765870fa6b95bb08c8599de9decf3980eb Catalin(ux) M. BOIE 2023-06-15 20:33:18
Cosmetic d48682ffe54991deedd4989a100a0607cafefab8 Catalin(ux) M. BOIE 2023-06-14 17:11:03
Fixed delete account op 4157f88a19d1b24934743d0193755a6dc3f98c13 Catalin(ux) M. BOIE 2023-06-14 17:10:22
Render readme files on the project page a8c09adb1bceed31f8070386158561b06470a98f Catalin(ux) M. BOIE 2023-06-14 17:09:17
Added rg_sid global variable to simplify the function calling 0047908fcd2ed0302a826487ddd15ca2579a9a83 Catalin(ux) M. BOIE 2023-06-14 17:06:39
Removed delta support for rpms because Fedora will remove it 2c26be90f4bc08a06ab03ab016e9ccaa843780e5 Catalin(ux) M. BOIE 2023-05-03 05:04:40
Added first payments option; fixes all around 7102aed9f239d529723799171553e8c4bd018440 Catalin(ux) M. BOIE 2023-05-02 22:36:28
Fixed a nasty typo in the build system; doc update; cosmetic 1934732b297d6476be7954fabdcaf9eb87678f5e Catalin(ux) M. BOIE 2022-12-21 12:51:53
Send client features to the builder dcf648353662409b9e39a422228ddb6a7c43358c Catalin(ux) M. BOIE 2022-12-21 11:10:00
Add support for SHA-256 git repos 8b88927d353c7b588909d0b1220c8922b32129c0 Catalin(ux) M. BOIE 2022-12-21 11:03:19
Look-up pkg_repo using pkg_repo uid f2b188b8cb151c376d8ee8c81f8e82c02ed93cd1 Catalin(ux) M. BOIE 2022-12-12 05:29:13
Cosmetic 04ae5ac6b9805198966a21755d1d430ef5b6a6dd Catalin(ux) M. BOIE 2022-12-11 17:17:39
Keep-alive mechanism for builder/worker 7e3add2ab41feefe37a858439934b8599fb30933 Catalin(ux) M. BOIE 2022-12-10 19:36:53
Bumped version to 0.76 09bb0cc92a9dfce513ce1289a22e71faf4ad1fe1 Catalin(ux) M. BOIE 2022-10-22 06:27:35
Cosmetic 45c59081c97489ccccd35efffa522607fee25a63 Catalin(ux) M. BOIE 2022-10-22 05:52:56
Mostly worker stuff ccf3a8d8da2ad1b0d97418fabb5028b40721835f Catalin(ux) M. BOIE 2022-10-22 05:50:04
wh: lambda: seems we cannot pass x-Amz-Client-Context header empty anymore 7f065b0fb6ceed5d2339afd7590f5a795ed3582e Catalin(ux) M. BOIE 2022-10-21 19:33:58
workers: wrong URL for delete a2b2ff5925b1ee9b4a033da93084c008b7af8c64 Catalin(ux) M. BOIE 2022-10-21 16:03:56
Typo 4557595fb985fb2a0a482a387ef0a61293b511ed Catalin(ux) M. BOIE 2022-03-29 17:06:57
Builder improvements 2c27620922c4990454dc3039b2f1c4a86388501f Catalin(ux) M. BOIE 2022-03-29 06:28:16
Commit 197c21765870fa6b95bb08c8599de9decf3980eb - Make rgfs more verbose in case of errors
Author: Catalin(ux) M. BOIE
Author date (UTC): 2023-06-15 20:33
Committer name: Catalin(ux) M. BOIE
Committer date (UTC): 2023-06-15 20:33
Parent(s): d48682ffe54991deedd4989a100a0607cafefab8
Signer:
Signing key:
Signing status: N
Tree: f6ccb8d16800b60890e2cfa5e583d32d64e8e944
File Lines added Lines deleted
inc/struct.inc.php 3 2
scripts/rgfs.php 49 25
File inc/struct.inc.php changed (mode: 100644) (index e5d0784..88f5246)
... ... $rg_sql_struct[50]['other'] = array(
785 785 ); );
786 786 $rg_sql_struct_parts['payments_history'] = array(); $rg_sql_struct_parts['payments_history'] = array();
787 787 // Here 0.77 was released // Here 0.77 was released
788
789 788 // Here 0.78 was released // Here 0.78 was released
790 789
791 // Do not forget to add the new created tables to statistics. Where?
790 // Do not forget to add the new created tables to statistics.
791 // See rg_conns_data etc.
792 // But also by e-mail.
792 793
793 794 // The next line must be after all rg_sql_struct* definitions. // The next line must be after all rg_sql_struct* definitions.
794 795 $rg_sql_schema_ver = count($rg_sql_struct); $rg_sql_schema_ver = count($rg_sql_struct);
File scripts/rgfs.php changed (mode: 100644) (index 993a56d..6e7da48)
... ... function xdispatch_one($key, $tlv)
204 204
205 205 $t = @unpack('nvar_len/nvalue_len', $tlv['data']); $t = @unpack('nvar_len/nvalue_len', $tlv['data']);
206 206 if ($t === FALSE) { if ($t === FALSE) {
207 debug($key, 'unpack error: ' . rg_php_err());
207 debug($key, 'unpack error gen var 1: ' . rg_php_err() . ': '
208 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
208 209 return; return;
209 210 } }
210 211
211 212 $t = @unpack('a' . $t['var_len'] . 'var' $t = @unpack('a' . $t['var_len'] . 'var'
212 213 . '/a' . $t['value_len'] . 'value', $tlv['data'], 2 + 2); . '/a' . $t['value_len'] . 'value', $tlv['data'], 2 + 2);
213 214 if ($t === FALSE) { if ($t === FALSE) {
214 debug($key, 'unpack error: ' . rg_php_err());
215 debug($key, 'unpack error gen var 2: ' . rg_php_err() . ': '
216 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
215 217 return; return;
216 218 } }
217 219
 
... ... function xdispatch_one($key, $tlv)
375 377 case 0x02: // getattr case 0x02: // getattr
376 378 $t = @unpack('a*path', $tlv['data']); $t = @unpack('a*path', $tlv['data']);
377 379 if ($t === FALSE) { if ($t === FALSE) {
378 debug($key, 'unpack error: ' . rg_php_err());
380 debug($key, 'unpack error getattr: ' . rg_php_err() . ': '
381 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
379 382 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
380 383 break; break;
381 384 } }
 
... ... function xdispatch_one($key, $tlv)
401 404 case 0x03: // readdir case 0x03: // readdir
402 405 $t = @unpack('Joff/a*path', $tlv['data']); $t = @unpack('Joff/a*path', $tlv['data']);
403 406 if ($t === FALSE) { if ($t === FALSE) {
404 debug($key, 'unpack error: ' . rg_php_err());
407 debug($key, 'unpack error readdir: ' . rg_php_err() . ': '
408 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
405 409 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
406 410 break; break;
407 411 } }
 
... ... function xdispatch_one($key, $tlv)
422 426 case 0x04: // read case 0x04: // read
423 427 $t = @unpack('Joff/Jsize/a*path', $tlv['data']); $t = @unpack('Joff/Jsize/a*path', $tlv['data']);
424 428 if ($t === FALSE) { if ($t === FALSE) {
425 debug($key, 'unpack error: ' . rg_php_err());
429 debug($key, 'unpack error read: ' . rg_php_err() . ': '
430 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
426 431 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
427 432 break; break;
428 433 } }
 
... ... function xdispatch_one($key, $tlv)
471 476 case 0x05: // write case 0x05: // write
472 477 $t1 = @unpack('npath_len/Joff', $tlv['data']); $t1 = @unpack('npath_len/Joff', $tlv['data']);
473 478 if ($t1 === FALSE) { if ($t1 === FALSE) {
474 debug($key, 'unpack error: ' . rg_php_err());
479 debug($key, 'unpack error write 1: ' . rg_php_err() . ': '
480 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
475 481 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
476 482 break; break;
477 483 } }
478 484
479 485 $t2 = @unpack('a' . $t1['path_len'] . 'path/a*buf', $tlv['data'], 2 + 8); $t2 = @unpack('a' . $t1['path_len'] . 'path/a*buf', $tlv['data'], 2 + 8);
480 486 if ($t2 === FALSE) { if ($t2 === FALSE) {
481 debug($key, 'unpack error2: ' . rg_php_err());
487 debug($key, 'unpack error write 1: ' . rg_php_err() . ': '
488 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
482 489 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
483 490 break; break;
484 491 } }
 
... ... function xdispatch_one($key, $tlv)
514 521 case 0x06: // create case 0x06: // create
515 522 $t = @unpack('Nmode/a*path', $tlv['data']); $t = @unpack('Nmode/a*path', $tlv['data']);
516 523 if ($t === FALSE) { if ($t === FALSE) {
517 debug($key, 'unpack error: ' . rg_php_err());
524 debug($key, 'unpack error create: ' . rg_php_err() . ': '
525 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
518 526 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
519 527 break; break;
520 528 } }
 
... ... function xdispatch_one($key, $tlv)
550 558 case 0x07: // mkdir case 0x07: // mkdir
551 559 $t = @unpack('Nmode/a*path', $tlv['data']); $t = @unpack('Nmode/a*path', $tlv['data']);
552 560 if ($t === FALSE) { if ($t === FALSE) {
553 debug($key, 'unpack error: ' . rg_php_err());
561 debug($key, 'unpack error mkdir: ' . rg_php_err() . ': '
562 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
554 563 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
555 564 break; break;
556 565 } }
 
... ... function xdispatch_one($key, $tlv)
578 587 case 0x08: // unlink case 0x08: // unlink
579 588 $t = @unpack('a*path', $tlv['data']); $t = @unpack('a*path', $tlv['data']);
580 589 if ($t === FALSE) { if ($t === FALSE) {
581 debug($key, 'unpack error: ' . rg_php_err());
590 debug($key, 'unpack error unlink: ' . rg_php_err() . ': '
591 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
582 592 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
583 593 break; break;
584 594 } }
 
... ... function xdispatch_one($key, $tlv)
605 615 case 0x09: // rmdir case 0x09: // rmdir
606 616 $t = @unpack('a*path', $tlv['data']); $t = @unpack('a*path', $tlv['data']);
607 617 if ($t === FALSE) { if ($t === FALSE) {
608 debug($key, 'unpack error: ' . rg_php_err());
618 debug($key, 'unpack error rmdir: ' . rg_php_err() . ': '
619 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
609 620 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
610 621 break; break;
611 622 } }
 
... ... function xdispatch_one($key, $tlv)
623 634 case 0x0a: // rename case 0x0a: // rename
624 635 $t = @unpack('nold_len/nnew_len', $tlv['data']); $t = @unpack('nold_len/nnew_len', $tlv['data']);
625 636 if ($t === FALSE) { if ($t === FALSE) {
626 debug($key, 'unpack error: ' . rg_php_err());
637 debug($key, 'unpack error rename 1: ' . rg_php_err() . ': '
638 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
627 639 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
628 640 break; break;
629 641 } }
630 642
631 643 $t = @unpack('a' . $t['old_len'] . 'old/a' . $t['new_len'] . 'new', $tlv['data'], 2 + 2); $t = @unpack('a' . $t['old_len'] . 'old/a' . $t['new_len'] . 'new', $tlv['data'], 2 + 2);
632 644 if ($t === FALSE) { if ($t === FALSE) {
633 debug($key, 'unpack error: ' . rg_php_err());
645 debug($key, 'unpack error rename 2: ' . rg_php_err() . ': '
646 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
634 647 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
635 648 break; break;
636 649 } }
 
... ... function xdispatch_one($key, $tlv)
657 670 case 0x0b: // truncate case 0x0b: // truncate
658 671 $t = @unpack('Joff/a*path', $tlv['data']); $t = @unpack('Joff/a*path', $tlv['data']);
659 672 if ($t === FALSE) { if ($t === FALSE) {
660 debug($key, 'unpack error: ' . rg_php_err());
673 debug($key, 'unpack error truncate: ' . rg_php_err() . ': '
674 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
661 675 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
662 676 break; break;
663 677 } }
 
... ... function xdispatch_one($key, $tlv)
696 710 $t = @unpack('Jatime_sec/Jatime_nsec/Jmtime_sec/Jmtime_nsec/a*path', $t = @unpack('Jatime_sec/Jatime_nsec/Jmtime_sec/Jmtime_nsec/a*path',
697 711 $tlv['data']); $tlv['data']);
698 712 if ($t === FALSE) { if ($t === FALSE) {
699 debug($key, 'unpack error: ' . rg_php_err());
713 debug($key, 'unpack error utimens: ' . rg_php_err() . ': '
714 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
700 715 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
701 716 break; break;
702 717 } }
 
... ... function xdispatch_one($key, $tlv)
726 741 case 0x0d: // readlink case 0x0d: // readlink
727 742 $t = @unpack('a*path', $tlv['data']); $t = @unpack('a*path', $tlv['data']);
728 743 if ($t === FALSE) { if ($t === FALSE) {
729 debug($key, 'unpack error: ' . rg_php_err());
744 debug($key, 'unpack error readlink: ' . rg_php_err() . ': '
745 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
730 746 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
731 747 break; break;
732 748 } }
 
... ... function xdispatch_one($key, $tlv)
746 762 case 0x0e: // symlink case 0x0e: // symlink
747 763 $t = @unpack('ntarget_len/nlink_len', $tlv['data']); $t = @unpack('ntarget_len/nlink_len', $tlv['data']);
748 764 if ($t === FALSE) { if ($t === FALSE) {
749 debug($key, 'unpack error: ' . rg_php_err());
765 debug($key, 'unpack error symlink 1: ' . rg_php_err() . ': '
766 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
750 767 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
751 768 break; break;
752 769 } }
753 770
754 771 $t = @unpack('a' . $t['target_len'] . 'target/a' . $t['link_len'] . 'link', $tlv['data'], 2 + 2); $t = @unpack('a' . $t['target_len'] . 'target/a' . $t['link_len'] . 'link', $tlv['data'], 2 + 2);
755 772 if ($t === FALSE) { if ($t === FALSE) {
756 debug($key, 'unpack error: ' . rg_php_err());
773 debug($key, 'unpack error symlink 2: ' . rg_php_err() . ': '
774 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
757 775 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
758 776 break; break;
759 777 } }
 
... ... function xdispatch_one($key, $tlv)
790 808 case 0x0f: // link case 0x0f: // link
791 809 $t = @unpack('ntarget_len/nlink_len', $tlv['data']); $t = @unpack('ntarget_len/nlink_len', $tlv['data']);
792 810 if ($t === FALSE) { if ($t === FALSE) {
793 debug($key, 'unpack error: ' . rg_php_err());
811 debug($key, 'unpack error link 1: ' . rg_php_err() . ': '
812 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
794 813 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
795 814 break; break;
796 815 } }
797 816
798 817 $t = @unpack('a' . $t['target_len'] . 'target/a' . $t['link_len'] . 'link', $tlv['data'], 2 + 2); $t = @unpack('a' . $t['target_len'] . 'target/a' . $t['link_len'] . 'link', $tlv['data'], 2 + 2);
799 818 if ($t === FALSE) { if ($t === FALSE) {
800 debug($key, 'unpack error: ' . rg_php_err());
819 debug($key, 'unpack error link 2: ' . rg_php_err() . ': '
820 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
801 821 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
802 822 break; break;
803 823 } }
 
... ... function xdispatch_one($key, $tlv)
834 854 case 0x10: // chown case 0x10: // chown
835 855 $t = @unpack('Nuid/Ngid/a*path', $tlv['data']); $t = @unpack('Nuid/Ngid/a*path', $tlv['data']);
836 856 if ($t === FALSE) { if ($t === FALSE) {
837 debug($key, 'unpack error: ' . rg_php_err());
857 debug($key, 'unpack error chown: ' . rg_php_err() . ': '
858 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
838 859 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
839 860 break; break;
840 861 } }
 
... ... function xdispatch_one($key, $tlv)
848 869 case 0x11: // chmod case 0x11: // chmod
849 870 $t = @unpack('Nmode/a*path', $tlv['data']); $t = @unpack('Nmode/a*path', $tlv['data']);
850 871 if ($t === FALSE) { if ($t === FALSE) {
851 debug($key, 'unpack error: ' . rg_php_err());
872 debug($key, 'unpack error chmod: ' . rg_php_err() . ': '
873 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
852 874 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
853 875 break; break;
854 876 } }
 
... ... function xdispatch_one($key, $tlv)
859 881 // We will not respect it for now. Ever? // We will not respect it for now. Ever?
860 882 break; break;
861 883
862 // 0x12 is generic variable
884 // 0x12 is generic variable (see above); it needs to be above.
863 885
864 886 case 0x13: // getxattr case 0x13: // getxattr
865 887 $t = @unpack('ntarget_len/nattr_name_len', $tlv['data']); $t = @unpack('ntarget_len/nattr_name_len', $tlv['data']);
866 888 if ($t === FALSE) { if ($t === FALSE) {
867 debug($key, 'unpack error: ' . rg_php_err());
889 debug($key, 'unpack error getxattr 1: ' . rg_php_err() . ': '
890 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
868 891 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
869 892 break; break;
870 893 } }
 
... ... function xdispatch_one($key, $tlv)
872 895 $t = @unpack('a' . $t['target_len'] . 'target/a' $t = @unpack('a' . $t['target_len'] . 'target/a'
873 896 . $t['attr_name_len'] . 'attr_name', $tlv['data'], 2 + 2); . $t['attr_name_len'] . 'attr_name', $tlv['data'], 2 + 2);
874 897 if ($t === FALSE) { if ($t === FALSE) {
875 debug($key, 'unpack error: ' . rg_php_err());
898 debug($key, 'unpack error getxattr 2: ' . rg_php_err() . ': '
899 . bin2hex(substr($tlv['data'], 0, 64)) . '...');
876 900 $p2 .= pack('CN', 0x00, RGFS_EPERM); $p2 .= pack('CN', 0x00, RGFS_EPERM);
877 901 break; break;
878 902 } }
Date/time (UTC) Type Misc Labels
2023-06-15 20:58 build debian-11-amd64 worker/r1 builder/color=fff worker_elap/1204s wait_time/0s date/2023-06-15 time/20:33
2023-06-15 21:09 build fedora-37-x86_64 worker/r1 builder/color=fff worker_elap/95s wait_time/1972s date/2023-06-15 time/20:33
2023-06-15 21:17 build fedora-38-x86_64 worker/r1 builder/color=fff worker_elap/98s wait_time/2433s date/2023-06-15 time/20:33
Hints:
Before first commit, do not forget to setup your git environment:
git config --global user.name "your_name_here"
git config --global user.email "your@email_here"

Clone this repository using HTTP(S):
git clone https://rocketgit.com/user/catalinux/rocketgit

Clone this repository using ssh (do not forget to upload a key first):
git clone ssh://rocketgit@ssh.rocketgit.com/user/catalinux/rocketgit

Clone this repository using git:
git clone git://git.rocketgit.com/user/catalinux/rocketgit

You are allowed to anonymously push to this repository.
This means that your pushed commits will automatically be transformed into a merge request:
... clone the repository ...
... make some changes and some commits ...
git push origin main