6 Commits

Author SHA1 Message Date
cc4a8f3836 Update all non-major dependencies
Some checks failed
renovate/artifacts Artifact file update failure
Main workflow / Run lints & tests (push) Failing after 38s
2025-05-01 10:01:29 +00:00
7371bd2ea9 Update dtolnay/rust-toolchain digest to b3b07ba
All checks were successful
Main workflow / Run lints & tests (push) Successful in 1m8s
2025-05-01 09:44:29 +00:00
a4679d62cf Update dependency ubuntu to v24
All checks were successful
Main workflow / Run lints & tests (push) Successful in 1m9s
2025-05-01 01:01:50 +00:00
e6e658e014 Add github-actions to renovate
All checks were successful
Main workflow / Run lints & tests (push) Successful in 1m34s
2025-04-12 12:09:52 +02:00
8260f0db4c Upgrade CI
All checks were successful
Main workflow / Run lints & tests (push) Successful in 1m34s
2025-04-12 12:07:46 +02:00
85256bf559 Fix clippy lint 2025-04-12 11:52:01 +02:00
4 changed files with 63 additions and 59 deletions

View File

@@ -6,71 +6,75 @@ on:
jobs:
check:
name: Lint code & run tests
runs-on: ubuntu-22.04
container: alpine:3.21
name: Run lints & tests
runs-on: ubuntu-24.04
timeout-minutes: 5
steps:
- name: Install dependencies
run: apk add cargo coreutils docker git nodejs rust-clippy rustfmt tar zstd
- name: Checkout repository
uses: actions/checkout@v4
- name: Checkout repository
uses: actions/checkout@v4
- name: Setup rust
uses: dtolnay/rust-toolchain@b3b07ba8b418998c39fb20f53e8b695cdcc8de1b
id: toolchain
with:
toolchain: stable
targets: x86_64-unknown-linux-musl
components: clippy, rustfmt
- name: Get Cargo.lock hash
id: hash
run: |
hash="$(sha256sum Cargo.lock | awk '{print $1}')"
echo "hash=$hash" >>"$GITHUB_OUTPUT"
- name: Setup cache
uses: actions/cache@v4
with:
path: |
~/.cargo/registry/index/
~/.cargo/registry/cache/
~/.cargo/git/db/
target/
key: cargo-${{ steps.toolchain.outputs.cachekey }}-${{ hashFiles('Cargo.lock') }}
restore-keys: |
cargo-${{ steps.toolchain.outputs.cachekey }}-
cargo-
- name: Setup cache
uses: actions/cache@v3
with:
path: |
~/.cargo/bin/
~/.cargo/registry/index/
~/.cargo/registry/cache/
~/.cargo/git/db/
target/
key: zpk-cargo-${{ steps.hash.outputs.hash }}
restore-keys: |
zpk-cargo-
- name: Run fmt
run: cargo fmt --all --check
- name: Run fmt
run: cargo fmt --all --check
- name: Run check
run: cargo check
- name: Run check
run: cargo check
- name: Run clippy
run: cargo clippy -- -D warnings
- name: Run clippy
run: cargo clippy -- -D warnings
- name: Download apk
run: |
wget -O apk https://gitlab.alpinelinux.org/api/v4/projects/5/packages/generic//v2.14.10/x86_64/apk.static
chmod +x apk
echo "$(pwd)" >>"$GITHUB_PATH"
- name: Run unit tests
run: cargo test
- name: Run unit tests
run: cargo test
- name: Build binary
run: cargo build
- name: Build binary
run: cargo build --target x86_64-unknown-linux-musl
- name: Start test container
id: container
run: |
id="$(docker run --rm --privileged -d alpine:3.21 tail -f /dev/null)"
echo "id=$id" >>"$GITHUB_OUTPUT"
- name: Start integration test container
id: container
run: |
id="$(docker run --rm --privileged -d alpine:3.21 tail -f /dev/null)"
echo "id=$id" >>"$GITHUB_OUTPUT"
- name: Copy scripts
run: |
docker cp ./scripts/integration.sh "$ID":/tmp/
docker cp ./target/debug/zpk "$ID":/usr/bin/
env:
ID: ${{ steps.container.outputs.id }}
- name: Copy scripts
run: |
docker cp ./scripts/integration.sh "$ID":/tmp/
docker cp ./target/x86_64-unknown-linux-musl/debug/zpk "$ID":/usr/bin/
env:
ID: ${{ steps.container.outputs.id }}
- name: Run tests
run: docker exec -i -u 0 "$ID" /tmp/integration.sh
env:
ID: ${{ steps.container.outputs.id }}
- name: Run integration tests
run: docker exec -i -u 0 "$ID" /tmp/integration.sh
env:
ID: ${{ steps.container.outputs.id }}
- name: Stop test container
if: always()
run: docker stop "$ID"
env:
ID: ${{ steps.container.outputs.id }}
- name: Stop integration test container
if: always()
run: docker stop -t0 "$ID"
env:
ID: ${{ steps.container.outputs.id }}

View File

@@ -5,6 +5,6 @@
"group:allNonMajor",
"schedule:monthly",
],
"enabledManagers": ["cargo"],
"enabledManagers": ["cargo", "github-actions"],
"osvVulnerabilityAlerts": true
}

View File

@@ -11,10 +11,10 @@ cmd_lib = "1.9.3"
confy = "0.6.1"
ctrlc = "3.4.4"
directories = "5.0.1"
dirs-sys = "0.4.1"
dirs-sys = "0.5.0"
eyre = "0.6.12"
nix = { version = "0.29.0", features = ["process", "signal", "user"] }
rand = "0.8.5"
nix = { version = "0.30.0", features = ["process", "signal", "user"] }
rand = "0.9.0"
serde = { version = "1.0.200", features = ["derive"] }
serde_json = "1.0.116"
spinoff = "0.8.0"

View File

@@ -18,7 +18,7 @@ fn get_repo_dir_from(path: &Path) -> eyre::Result<String> {
.lines()
.filter(|line| line.starts_with("REPODEST="))
.map(|line| line.trim_start_matches("REPODEST="))
.last();
.next_back();
let home_dir = dirs_sys::home_dir().unwrap();
let repo_dir = PathBuf::from(if let Some(repodest) = repodest {
// This should probably be done with proper shell interpolation.