prima-twig 0.51.1 → 0.51.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +5 -5
- data/bin/twig-feature +201 -414
- metadata +2 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
|
-
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
2
|
+
SHA256:
|
3
|
+
metadata.gz: 4daefd86d6b8588d2053ea1f8867465ec13fb94c859cc08fcb900ee98ff88fe1
|
4
|
+
data.tar.gz: eb7ed6e7bcba2b74b02a7588d8f62ea66a0871088118d4f80bad0c1a98192985
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 0babe143608d39ac25852573a22e8445e8130ff8402476b0fa28611e88b899193cef8789742931e106f845c10b702dfb0b7862afe0ed210672825e977af3b3b7
|
7
|
+
data.tar.gz: fd664530292d52279eeee4f40e92c0196da5ca908179c768e3eb87ed727c7c08c0fe488e1c89384afda81f675d41cb242cca2d0ee7d127c8b708ee72b088ea36
|
data/bin/twig-feature
CHANGED
@@ -2022,35 +2022,22 @@ class Release
|
|
2022
2022
|
|
2023
2023
|
decrypt_secrets()
|
2024
2024
|
|
2025
|
-
|
2026
|
-
|
2027
|
-
exec_step 'prepare-docker-compose --directory urania && cp docker-compose-qainit.yml docker-compose.yml'
|
2028
|
-
end
|
2025
|
+
exec_step 'cp docker-compose.yml docker-compose-ci.yml'
|
2026
|
+
exec_step 'prepare-docker-compose --directory urania && cp docker-compose-qainit.yml docker-compose.yml'
|
2029
2027
|
|
2030
2028
|
execute_command "docker-compose build web"
|
2031
2029
|
|
2032
|
-
|
2033
|
-
|
2034
|
-
|
2035
|
-
|
2036
|
-
|
2037
|
-
|
2038
|
-
|
2039
|
-
execute_command cmd
|
2040
|
-
end
|
2041
|
-
|
2042
|
-
cleanup_containers
|
2043
|
-
else
|
2044
|
-
[ "docker run -v $PWD:/code -w /code -e MIX_ENV=qa --entrypoint /bin/sh urania_web \
|
2045
|
-
'-c' 'mix local.hex --force && mix hex.info && \
|
2046
|
-
mix deps.get && mix compile && mix deps.compile && \
|
2047
|
-
rm -rf _build/qa/rel/ && \
|
2048
|
-
mix release --env=qa'"
|
2049
|
-
].each do |cmd|
|
2050
|
-
execute_command cmd
|
2051
|
-
end
|
2030
|
+
[ "docker-compose run -w $PWD -u root -e MIX_ENV=qa --entrypoint /bin/sh web \
|
2031
|
+
'-c' 'mix local.hex --force && mix hex.info && \
|
2032
|
+
mix deps.get && mix compile && mix deps.compile && \
|
2033
|
+
rm -rf _build/qa/rel/ && \
|
2034
|
+
mix release --env=qa'"
|
2035
|
+
].each do |cmd|
|
2036
|
+
execute_command cmd
|
2052
2037
|
end
|
2053
2038
|
|
2039
|
+
cleanup_containers
|
2040
|
+
|
2054
2041
|
artifact_path = Dir.glob("_build/qa/rel/urania/releases/*/urania.tar.gz").first
|
2055
2042
|
upload_artifact(artifact_path, "microservices/urania/#{revision}-qa.tar.gz", "#{@s3_bucket}-encrypted")
|
2056
2043
|
|
@@ -2066,35 +2053,22 @@ class Release
|
|
2066
2053
|
|
2067
2054
|
decrypt_secrets()
|
2068
2055
|
|
2069
|
-
|
2070
|
-
|
2071
|
-
exec_step 'prepare-docker-compose --directory rachele && cp docker-compose-qainit.yml docker-compose.yml'
|
2072
|
-
end
|
2056
|
+
exec_step 'cp docker-compose.yml docker-compose-ci.yml'
|
2057
|
+
exec_step 'prepare-docker-compose --directory rachele && cp docker-compose-qainit.yml docker-compose.yml'
|
2073
2058
|
|
2074
2059
|
execute_command "docker-compose build web"
|
2075
2060
|
|
2076
|
-
|
2077
|
-
|
2078
|
-
|
2079
|
-
|
2080
|
-
|
2081
|
-
|
2082
|
-
|
2083
|
-
execute_command cmd
|
2084
|
-
end
|
2085
|
-
|
2086
|
-
cleanup_containers
|
2087
|
-
else
|
2088
|
-
[ "docker run -v $PWD:/code -w /code -e MIX_ENV=qa --entrypoint /bin/sh rachele_web \
|
2089
|
-
'-c' 'mix local.hex --force && mix hex.info && \
|
2090
|
-
mix deps.get && mix compile && mix deps.compile && \
|
2091
|
-
rm -rf _build/qa/rel/ && \
|
2092
|
-
mix release --env=qa'"
|
2093
|
-
].each do |cmd|
|
2094
|
-
execute_command cmd
|
2095
|
-
end
|
2061
|
+
[ "docker-compose run -w $PWD -u root -e MIX_ENV=qa --entrypoint /bin/sh web \
|
2062
|
+
'-c' 'mix local.hex --force && mix hex.info && \
|
2063
|
+
mix deps.get && mix compile && mix deps.compile && \
|
2064
|
+
rm -rf _build/qa/rel/ && \
|
2065
|
+
mix release --env=qa'"
|
2066
|
+
].each do |cmd|
|
2067
|
+
execute_command cmd
|
2096
2068
|
end
|
2097
2069
|
|
2070
|
+
cleanup_containers
|
2071
|
+
|
2098
2072
|
artifact_path = Dir.glob("_build/qa/rel/rachele/releases/*/rachele.tar.gz").first
|
2099
2073
|
upload_artifact(artifact_path, "microservices/rachele/#{revision}-qa.tar.gz", "#{@s3_bucket}-encrypted")
|
2100
2074
|
|
@@ -2110,10 +2084,9 @@ class Release
|
|
2110
2084
|
|
2111
2085
|
decrypt_secrets()
|
2112
2086
|
|
2113
|
-
|
2114
|
-
|
2115
|
-
|
2116
|
-
end
|
2087
|
+
exec_step 'cp docker-compose.yml docker-compose-ci.yml'
|
2088
|
+
exec_step 'prepare-docker-compose --directory ermes && cp docker-compose-qainit.yml docker-compose.yml'
|
2089
|
+
|
2117
2090
|
[
|
2118
2091
|
"if echo `docker network ls` | grep crash_default; \
|
2119
2092
|
then echo 'crash_default network already existing'; \
|
@@ -2123,33 +2096,18 @@ class Release
|
|
2123
2096
|
execute_command cmd
|
2124
2097
|
end
|
2125
2098
|
|
2126
|
-
|
2127
|
-
|
2128
|
-
|
2129
|
-
|
2130
|
-
|
2131
|
-
|
2132
|
-
|
2133
|
-
|
2134
|
-
execute_command cmd
|
2135
|
-
end
|
2136
|
-
|
2137
|
-
cleanup_containers
|
2138
|
-
else
|
2139
|
-
[ "docker run -v $PWD:/code -w /code -e MIX_ENV=qa --entrypoint /bin/sh ermes_web \
|
2140
|
-
'-c' 'mix local.hex --force && mix hex.info && \
|
2141
|
-
mix deps.get && mix compile && mix deps.compile && \
|
2142
|
-
mix phx.digest && \
|
2143
|
-
rm -rf _build/qa/rel/ && \
|
2144
|
-
mix release --env=qa'",
|
2145
|
-
"if echo `docker ps` | grep crash; \
|
2146
|
-
then echo 'cannot delete crash_default network'; \
|
2147
|
-
else docker network rm crash_default; fi "
|
2148
|
-
].each do |cmd|
|
2149
|
-
execute_command cmd
|
2150
|
-
end
|
2099
|
+
[ "docker-compose run --rm -w $PWD -u root -e MIX_ENV=qa --entrypoint /bin/sh web \
|
2100
|
+
'-c' 'mix local.hex --force && mix hex.info && \
|
2101
|
+
mix deps.get && mix compile && mix deps.compile && \
|
2102
|
+
mix phx.digest && \
|
2103
|
+
rm -rf _build/qa/rel/ && \
|
2104
|
+
mix release --env=qa'"
|
2105
|
+
].each do |cmd|
|
2106
|
+
execute_command cmd
|
2151
2107
|
end
|
2152
2108
|
|
2109
|
+
cleanup_containers
|
2110
|
+
|
2153
2111
|
artifact_path = Dir.glob("_build/qa/rel/ermes/releases/*/ermes.tar.gz").first
|
2154
2112
|
upload_artifact(artifact_path, "microservices/ermes/#{revision}-qa.tar.gz", "#{@s3_bucket}-encrypted")
|
2155
2113
|
|
@@ -2186,51 +2144,29 @@ class Release
|
|
2186
2144
|
|
2187
2145
|
decrypt_secrets()
|
2188
2146
|
|
2189
|
-
|
2190
|
-
|
2191
|
-
|
2192
|
-
|
2193
|
-
|
2194
|
-
|
2195
|
-
|
2196
|
-
|
2197
|
-
|
2198
|
-
|
2199
|
-
|
2200
|
-
|
2201
|
-
|
2202
|
-
|
2203
|
-
|
2204
|
-
|
2205
|
-
|
2206
|
-
|
2207
|
-
|
2208
|
-
execute_command cmd
|
2209
|
-
end
|
2210
|
-
|
2211
|
-
cleanup_containers
|
2212
|
-
else
|
2213
|
-
[
|
2214
|
-
'mv docker-compose-ci.yml docker-compose.yml',
|
2215
|
-
'docker-compose build web',
|
2216
|
-
"docker-compose run -w $PWD -e ENV_HASH=#{deploy_id} -e MIX_ENV=qa web \
|
2217
|
-
'-c' 'mix local.hex --force && mix hex.info && \
|
2218
|
-
mix deps.get && \
|
2219
|
-
cd assets && \
|
2220
|
-
yarn --cache-folder ~/.cache/yarn && \
|
2221
|
-
NODE_ENV=production sysconfcpus -n 1 yarn run build && \
|
2222
|
-
cd ../ && \
|
2223
|
-
mix release.clean --implode --no-confirm && \
|
2224
|
-
mix phx.digest && \
|
2225
|
-
mix deps.clean --all && \
|
2226
|
-
mix deps.get && \
|
2227
|
-
mix compile && mix release --env=qa'",
|
2228
|
-
'docker-compose down'
|
2229
|
-
].each do |cmd|
|
2230
|
-
execute_command cmd
|
2231
|
-
end
|
2147
|
+
`mv docker-compose-ci.yml docker-compose.yml`
|
2148
|
+
exec_step 'prepare-docker-compose --directory crash && cp docker-compose-qainit.yml docker-compose.yml'
|
2149
|
+
[
|
2150
|
+
'docker-compose build web',
|
2151
|
+
"docker-compose run -w $PWD -u root -e MIX_ENV=qa -e ENV_HASH=#{deploy_id} web \
|
2152
|
+
'-c' 'mix local.hex --force && mix hex.info && \
|
2153
|
+
mix deps.get && \
|
2154
|
+
cd assets && \
|
2155
|
+
yarn --cache-folder ~/.cache/yarn && \
|
2156
|
+
NODE_ENV=production sysconfcpus -n 1 yarn run build && \
|
2157
|
+
cd ../ && \
|
2158
|
+
mix release.clean --implode --no-confirm && \
|
2159
|
+
mix phx.digest && \
|
2160
|
+
mix deps.clean --all && \
|
2161
|
+
mix deps.get && \
|
2162
|
+
mix compile && mix release --env=qa'",
|
2163
|
+
'docker-compose down'
|
2164
|
+
].each do |cmd|
|
2165
|
+
execute_command cmd
|
2232
2166
|
end
|
2233
2167
|
|
2168
|
+
cleanup_containers
|
2169
|
+
|
2234
2170
|
artifact_path = Dir.glob('_build/qa/rel/crash/releases/*/crash.tar.gz').first
|
2235
2171
|
upload_artifact(artifact_path, "microservices/crash/#{revision}-qa.tar.gz", "#{@s3_bucket}-encrypted")
|
2236
2172
|
|
@@ -2272,34 +2208,21 @@ class Release
|
|
2272
2208
|
|
2273
2209
|
decrypt_secrets()
|
2274
2210
|
|
2275
|
-
|
2276
|
-
|
2277
|
-
|
2278
|
-
|
2279
|
-
|
2280
|
-
|
2281
|
-
|
2282
|
-
|
2283
|
-
|
2284
|
-
|
2285
|
-
|
2286
|
-
execute_command cmd
|
2287
|
-
end
|
2288
|
-
|
2289
|
-
cleanup_containers
|
2290
|
-
else
|
2291
|
-
[
|
2292
|
-
"docker-compose build web",
|
2293
|
-
"docker run -v $PWD:/code -w /code -e MIX_ENV=qa --entrypoint /bin/sh leftorium_web \
|
2294
|
-
'-c' 'mix local.hex --force && mix hex.info && \
|
2295
|
-
mix deps.get && mix compile && mix deps.compile && \
|
2296
|
-
rm -rf _build/qa/rel/ && \
|
2297
|
-
mix release --env=qa'"
|
2298
|
-
].each do |cmd|
|
2299
|
-
execute_command cmd
|
2300
|
-
end
|
2211
|
+
exec_step 'cp docker-compose.yml docker-compose-ci.yml'
|
2212
|
+
exec_step 'prepare-docker-compose --directory leftorium && cp docker-compose-qainit.yml docker-compose.yml'
|
2213
|
+
[
|
2214
|
+
"docker-compose build web",
|
2215
|
+
"docker-compose run -w $PWD -u root -e MIX_ENV=qa --entrypoint /bin/sh web \
|
2216
|
+
'-c' 'mix local.hex --force && mix hex.info && \
|
2217
|
+
mix deps.get && mix compile && mix deps.compile && \
|
2218
|
+
rm -rf _build/qa/rel/ && \
|
2219
|
+
mix release --env=qa'"
|
2220
|
+
].each do |cmd|
|
2221
|
+
execute_command cmd
|
2301
2222
|
end
|
2302
2223
|
|
2224
|
+
cleanup_containers
|
2225
|
+
|
2303
2226
|
artifact_path = Dir.glob('_build/qa/rel/leftorium/releases/*/leftorium.tar.gz').first
|
2304
2227
|
upload_artifact(artifact_path, "microservices/leftorium/#{revision}-qa.tar.gz", "#{@s3_bucket}-encrypted")
|
2305
2228
|
|
@@ -2315,36 +2238,22 @@ class Release
|
|
2315
2238
|
|
2316
2239
|
decrypt_secrets()
|
2317
2240
|
|
2318
|
-
|
2319
|
-
|
2320
|
-
|
2321
|
-
|
2322
|
-
|
2323
|
-
|
2324
|
-
|
2325
|
-
|
2326
|
-
|
2327
|
-
|
2328
|
-
|
2329
|
-
|
2330
|
-
execute_command cmd
|
2331
|
-
end
|
2332
|
-
|
2333
|
-
cleanup_containers
|
2334
|
-
else
|
2335
|
-
[
|
2336
|
-
"docker-compose build web",
|
2337
|
-
"docker run -v $PWD:/code -w /code -e MIX_ENV=qa --entrypoint /bin/sh hal9000_web \
|
2338
|
-
'-c' 'mix local.hex --force && mix hex.info && \
|
2339
|
-
mix deps.get && mix compile && mix deps.compile && \
|
2340
|
-
mix phx.digest && \
|
2341
|
-
rm -rf _build/qa/rel/ && \
|
2342
|
-
mix release --env=qa'"
|
2343
|
-
].each do |cmd|
|
2344
|
-
execute_command cmd
|
2345
|
-
end
|
2241
|
+
exec_step 'cp docker-compose.yml docker-compose-ci.yml'
|
2242
|
+
exec_step 'prepare-docker-compose --directory hal9000 && cp docker-compose-qainit.yml docker-compose.yml'
|
2243
|
+
[
|
2244
|
+
"docker-compose build web",
|
2245
|
+
"docker-compose run -w $PWD -u root -e MIX_ENV=qa --entrypoint /bin/sh web \
|
2246
|
+
'-c' 'mix local.hex --force && mix hex.info && \
|
2247
|
+
mix deps.get && mix compile && mix deps.compile && \
|
2248
|
+
mix phx.digest assets -o priv/static && \
|
2249
|
+
rm -rf _build/qa/rel/ && \
|
2250
|
+
mix release --env=qa'"
|
2251
|
+
].each do |cmd|
|
2252
|
+
execute_command cmd
|
2346
2253
|
end
|
2347
2254
|
|
2255
|
+
cleanup_containers
|
2256
|
+
|
2348
2257
|
artifact_path = Dir.glob("_build/qa/rel/hal9000/releases/*/hal9000.tar.gz").first
|
2349
2258
|
upload_artifact(artifact_path, "microservices/hal9000/#{revision}-qa.tar.gz", "#{@s3_bucket}-encrypted")
|
2350
2259
|
|
@@ -2360,36 +2269,22 @@ class Release
|
|
2360
2269
|
|
2361
2270
|
decrypt_secrets()
|
2362
2271
|
|
2363
|
-
|
2364
|
-
|
2365
|
-
|
2366
|
-
|
2367
|
-
|
2368
|
-
|
2369
|
-
|
2370
|
-
|
2371
|
-
|
2372
|
-
|
2373
|
-
|
2374
|
-
|
2375
|
-
execute_command cmd
|
2376
|
-
end
|
2377
|
-
|
2378
|
-
cleanup_containers
|
2379
|
-
else
|
2380
|
-
[
|
2381
|
-
"docker-compose build web",
|
2382
|
-
"docker run -v $PWD:/code -w /code -e MIX_ENV=qa --entrypoint /bin/sh fidaty_web \
|
2383
|
-
'-c' 'mix local.hex --force && mix hex.info && \
|
2384
|
-
mix deps.get && mix compile && mix deps.compile && \
|
2385
|
-
mix phx.digest && \
|
2386
|
-
rm -rf _build/qa/rel/ && \
|
2387
|
-
mix release --env=qa'"
|
2388
|
-
].each do |cmd|
|
2389
|
-
execute_command cmd
|
2390
|
-
end
|
2272
|
+
exec_step 'cp docker-compose.yml docker-compose-ci.yml'
|
2273
|
+
exec_step 'prepare-docker-compose --directory fidaty && cp docker-compose-qainit.yml docker-compose.yml'
|
2274
|
+
[
|
2275
|
+
"docker-compose build web",
|
2276
|
+
"docker-compose run -w $PWD -u root -e MIX_ENV=qa --entrypoint /bin/sh web \
|
2277
|
+
'-c' 'mix local.hex --force && mix hex.info && \
|
2278
|
+
mix deps.get && mix compile && mix deps.compile && \
|
2279
|
+
mix phx.digest && \
|
2280
|
+
rm -rf _build/qa/rel/ && \
|
2281
|
+
mix release --env=qa'"
|
2282
|
+
].each do |cmd|
|
2283
|
+
execute_command cmd
|
2391
2284
|
end
|
2392
2285
|
|
2286
|
+
cleanup_containers
|
2287
|
+
|
2393
2288
|
artifact_path = Dir.glob("_build/qa/rel/fidaty/releases/*/fidaty.tar.gz").first
|
2394
2289
|
upload_artifact(artifact_path, "microservices/fidaty/#{revision}-qa.tar.gz", "#{@s3_bucket}-encrypted")
|
2395
2290
|
|
@@ -2405,34 +2300,21 @@ class Release
|
|
2405
2300
|
|
2406
2301
|
decrypt_secrets() unless File.exist?('config/secrets.yml')
|
2407
2302
|
|
2408
|
-
|
2409
|
-
|
2410
|
-
|
2411
|
-
|
2412
|
-
|
2413
|
-
|
2414
|
-
|
2415
|
-
|
2416
|
-
|
2417
|
-
|
2418
|
-
|
2419
|
-
execute_command cmd
|
2420
|
-
end
|
2421
|
-
|
2422
|
-
cleanup_containers
|
2423
|
-
else
|
2424
|
-
[
|
2425
|
-
"docker-compose build web",
|
2426
|
-
"docker run -v $PWD:/code -w /code -e MIX_ENV=qa --entrypoint /bin/sh peano_web \
|
2427
|
-
'-c' 'mix local.hex --force && mix hex.info && \
|
2428
|
-
mix deps.get && mix compile && mix deps.compile && \
|
2429
|
-
rm -rf _build/qa/rel/ && \
|
2430
|
-
mix release --env=qa'"
|
2431
|
-
].each do |cmd|
|
2432
|
-
execute_command cmd
|
2433
|
-
end
|
2303
|
+
exec_step 'cp docker-compose.yml docker-compose-ci.yml'
|
2304
|
+
exec_step 'prepare-docker-compose --directory peano && cp docker-compose-qainit.yml docker-compose.yml'
|
2305
|
+
[
|
2306
|
+
"docker-compose build web",
|
2307
|
+
"docker-compose run -w $PWD -u root -e MIX_ENV=qa --entrypoint /bin/sh web \
|
2308
|
+
'-c' 'mix local.hex --force && mix hex.info && \
|
2309
|
+
mix deps.get && mix compile && mix deps.compile && \
|
2310
|
+
rm -rf _build/qa/rel/ && \
|
2311
|
+
mix release --env=qa'"
|
2312
|
+
].each do |cmd|
|
2313
|
+
execute_command cmd
|
2434
2314
|
end
|
2435
2315
|
|
2316
|
+
cleanup_containers
|
2317
|
+
|
2436
2318
|
artifact_path = Dir.glob("_build/qa/rel/peano/releases/*/peano.tar.gz").first
|
2437
2319
|
upload_artifact(artifact_path, "microservices/peano/#{revision}-qa.tar.gz", "#{@s3_bucket}-encrypted")
|
2438
2320
|
|
@@ -2448,35 +2330,21 @@ class Release
|
|
2448
2330
|
|
2449
2331
|
decrypt_secrets() unless File.exist?('config/secrets.yml')
|
2450
2332
|
|
2451
|
-
|
2452
|
-
|
2453
|
-
|
2454
|
-
|
2455
|
-
|
2456
|
-
|
2457
|
-
|
2458
|
-
|
2459
|
-
|
2460
|
-
|
2461
|
-
|
2462
|
-
execute_command cmd
|
2463
|
-
end
|
2464
|
-
|
2465
|
-
cleanup_containers
|
2466
|
-
else
|
2467
|
-
[
|
2468
|
-
"docker-compose build web",
|
2469
|
-
"docker run -v $PWD:/code -w /code -e MIX_ENV=qa --entrypoint /bin/sh rogoreport_web \
|
2470
|
-
'-c' 'cat apps/escile/config/qa.exs && \
|
2471
|
-
mix local.hex --force && mix hex.info && \
|
2472
|
-
mix deps.get && mix compile && mix deps.compile && \
|
2473
|
-
rm -rf _build/qa/rel/ && \
|
2474
|
-
mix release --env=qa'"
|
2475
|
-
].each do |cmd|
|
2476
|
-
execute_command cmd
|
2477
|
-
end
|
2333
|
+
exec_step 'cp docker-compose.yml docker-compose-ci.yml'
|
2334
|
+
exec_step 'prepare-docker-compose --directory rogoreport && cp docker-compose-qainit.yml docker-compose.yml'
|
2335
|
+
[
|
2336
|
+
"docker-compose build web",
|
2337
|
+
"docker-compose run -w $PWD -u root -e MIX_ENV=qa --entrypoint /bin/sh web \
|
2338
|
+
'-c' 'mix local.hex --force && mix hex.info && \
|
2339
|
+
mix deps.get && mix compile && mix deps.compile && \
|
2340
|
+
rm -rf _build/qa/rel/ && \
|
2341
|
+
mix release --name=rogoreport --env=qa'"
|
2342
|
+
].each do |cmd|
|
2343
|
+
execute_command cmd
|
2478
2344
|
end
|
2479
2345
|
|
2346
|
+
cleanup_containers
|
2347
|
+
|
2480
2348
|
artifact_path = Dir.glob("_build/qa/rel/rogoreport/releases/*/rogoreport.tar.gz").first
|
2481
2349
|
upload_artifact(artifact_path, "microservices/rogoreport/rogoreport-#{revision}-qa.tar.gz", "#{@s3_bucket}-encrypted")
|
2482
2350
|
|
@@ -2492,36 +2360,22 @@ class Release
|
|
2492
2360
|
|
2493
2361
|
decrypt_secrets()
|
2494
2362
|
|
2495
|
-
|
2496
|
-
|
2497
|
-
|
2498
|
-
|
2499
|
-
|
2500
|
-
|
2501
|
-
|
2502
|
-
|
2503
|
-
|
2504
|
-
|
2505
|
-
|
2506
|
-
|
2507
|
-
execute_command cmd
|
2508
|
-
end
|
2509
|
-
|
2510
|
-
cleanup_containers
|
2511
|
-
else
|
2512
|
-
[
|
2513
|
-
"docker-compose build web",
|
2514
|
-
"docker run -v $PWD:/code -w /code -e MIX_ENV=qa --entrypoint /bin/sh assange_web \
|
2515
|
-
'-c' 'mix local.hex --force && mix hex.info && \
|
2516
|
-
mix deps.get && mix compile && mix deps.compile && \
|
2517
|
-
mix phx.digest && \
|
2518
|
-
rm -rf _build/qa/rel/ && \
|
2519
|
-
mix release --env=qa'"
|
2520
|
-
].each do |cmd|
|
2521
|
-
execute_command cmd
|
2522
|
-
end
|
2363
|
+
exec_step 'cp docker-compose.yml docker-compose-ci.yml'
|
2364
|
+
exec_step 'prepare-docker-compose --directory assange && cp docker-compose-qainit.yml docker-compose.yml'
|
2365
|
+
[
|
2366
|
+
"docker-compose build web",
|
2367
|
+
"docker-compose run -w $PWD -u root -e MIX_ENV=qa --entrypoint /bin/sh web \
|
2368
|
+
'-c' 'mix local.hex --force && mix hex.info && \
|
2369
|
+
mix deps.get && mix compile && mix deps.compile && \
|
2370
|
+
mix phx.digest && \
|
2371
|
+
rm -rf _build/qa/rel/ && \
|
2372
|
+
mix release --env=qa'"
|
2373
|
+
].each do |cmd|
|
2374
|
+
execute_command cmd
|
2523
2375
|
end
|
2524
2376
|
|
2377
|
+
cleanup_containers
|
2378
|
+
|
2525
2379
|
artifact_path = Dir.glob("_build/qa/rel/assange/releases/*/assange.tar.gz").first
|
2526
2380
|
upload_artifact(artifact_path, "microservices/assange/#{revision}-qa.tar.gz", "#{@s3_bucket}-encrypted")
|
2527
2381
|
|
@@ -2537,46 +2391,27 @@ class Release
|
|
2537
2391
|
|
2538
2392
|
decrypt_secrets()
|
2539
2393
|
|
2540
|
-
|
2541
|
-
|
2542
|
-
|
2543
|
-
|
2544
|
-
|
2545
|
-
|
2546
|
-
|
2547
|
-
|
2548
|
-
|
2549
|
-
|
2550
|
-
|
2551
|
-
|
2552
|
-
|
2553
|
-
|
2554
|
-
|
2555
|
-
|
2556
|
-
|
2557
|
-
execute_command cmd
|
2558
|
-
end
|
2559
|
-
|
2560
|
-
cleanup_containers
|
2561
|
-
else
|
2562
|
-
[
|
2563
|
-
"docker-compose build web",
|
2564
|
-
"docker run -v $PWD:/code -w /code -e MIX_ENV=qa --entrypoint /bin/sh activia_web \
|
2565
|
-
'-c' 'mix local.hex --force && mix hex.info && \
|
2566
|
-
mix deps.get && mix compile && mix deps.compile && \
|
2567
|
-
cd assets && \
|
2568
|
-
rm -rf node_modules && \
|
2569
|
-
yarn --cache-folder ~/.cache/yarn && \
|
2570
|
-
sysconfcpus -n 2 ./node_modules/.bin/webpack --mode production && \
|
2571
|
-
cd .. && \
|
2572
|
-
mix phx.digest && \
|
2573
|
-
rm -rf _build/qa/rel/ && \
|
2574
|
-
mix release --env=qa'"
|
2575
|
-
].each do |cmd|
|
2576
|
-
execute_command cmd
|
2577
|
-
end
|
2394
|
+
exec_step 'cp docker-compose.yml docker-compose-ci.yml'
|
2395
|
+
exec_step 'prepare-docker-compose --directory activia && cp docker-compose-qainit.yml docker-compose.yml'
|
2396
|
+
[
|
2397
|
+
"docker-compose build web",
|
2398
|
+
"docker-compose run -w $PWD -u root -e MIX_ENV=qa --entrypoint /bin/sh web \
|
2399
|
+
'-c' 'mix local.hex --force && mix hex.info && \
|
2400
|
+
mix deps.get && mix compile && mix deps.compile && \
|
2401
|
+
cd assets && \
|
2402
|
+
rm -rf node_modules && \
|
2403
|
+
yarn --cache-folder ~/.cache/yarn && \
|
2404
|
+
sysconfcpus -n 2 ./node_modules/.bin/webpack --mode production && \
|
2405
|
+
cd .. && \
|
2406
|
+
mix phx.digest && \
|
2407
|
+
rm -rf _build/qa/rel/ && \
|
2408
|
+
mix release --env=qa'"
|
2409
|
+
].each do |cmd|
|
2410
|
+
execute_command cmd
|
2578
2411
|
end
|
2579
2412
|
|
2413
|
+
cleanup_containers
|
2414
|
+
|
2580
2415
|
if @qainit
|
2581
2416
|
artifact_path = Dir.glob("_build/qa/rel/activia/releases/*/activia.tar.gz").first
|
2582
2417
|
else
|
@@ -2596,41 +2431,23 @@ class Release
|
|
2596
2431
|
|
2597
2432
|
decrypt_secrets()
|
2598
2433
|
|
2599
|
-
|
2600
|
-
|
2601
|
-
|
2602
|
-
|
2603
|
-
|
2604
|
-
|
2605
|
-
|
2606
|
-
|
2607
|
-
|
2608
|
-
|
2609
|
-
|
2610
|
-
|
2611
|
-
execute_command cmd
|
2612
|
-
end
|
2613
|
-
|
2614
|
-
cleanup_containers
|
2615
|
-
else
|
2616
|
-
[
|
2617
|
-
"docker-compose build web",
|
2618
|
-
"docker run -v $PWD:/code -w /code -e MIX_ENV=qa --entrypoint /bin/sh roger_web \
|
2619
|
-
'-c' 'mix local.hex --force && mix hex.info && \
|
2620
|
-
mix deps.get && mix compile && mix deps.compile && \
|
2621
|
-
mix phx.digest && \
|
2622
|
-
rm -rf _build/qa/rel/ && \
|
2623
|
-
mix release --env=qa'"
|
2624
|
-
].each do |cmd|
|
2625
|
-
execute_command cmd
|
2626
|
-
end
|
2434
|
+
exec_step 'cp docker-compose.yml docker-compose-ci.yml'
|
2435
|
+
exec_step 'prepare-docker-compose --directory roger && cp docker-compose-qainit.yml docker-compose.yml'
|
2436
|
+
[
|
2437
|
+
"docker-compose build web",
|
2438
|
+
"docker-compose run -w $PWD -u root -e MIX_ENV=qa --entrypoint /bin/sh web \
|
2439
|
+
'-c' 'mix local.hex --force && mix hex.info && \
|
2440
|
+
mix deps.get && mix compile && mix deps.compile && \
|
2441
|
+
mix phx.digest && \
|
2442
|
+
rm -rf _build/qa/rel/ && \
|
2443
|
+
mix release --env=qa'"
|
2444
|
+
].each do |cmd|
|
2445
|
+
execute_command cmd
|
2627
2446
|
end
|
2628
2447
|
|
2629
|
-
|
2630
|
-
|
2631
|
-
|
2632
|
-
artifact_path = Dir.glob("_build/qa/rel/roger/releases/*/roger.tar.gz").first
|
2633
|
-
end
|
2448
|
+
cleanup_containers
|
2449
|
+
|
2450
|
+
artifact_path = Dir.glob("_build/qa/rel/roger/releases/*/roger.tar.gz").first
|
2634
2451
|
upload_artifact(artifact_path, "microservices/roger/#{revision}-qa.tar.gz", "#{@s3_bucket}-encrypted")
|
2635
2452
|
|
2636
2453
|
Dir.chdir '../../'
|
@@ -2645,50 +2462,28 @@ class Release
|
|
2645
2462
|
|
2646
2463
|
decrypt_secrets()
|
2647
2464
|
|
2648
|
-
|
2649
|
-
|
2650
|
-
|
2651
|
-
|
2652
|
-
|
2653
|
-
|
2654
|
-
|
2655
|
-
|
2656
|
-
|
2657
|
-
|
2658
|
-
|
2659
|
-
|
2660
|
-
|
2661
|
-
|
2662
|
-
|
2663
|
-
|
2664
|
-
|
2665
|
-
|
2666
|
-
].each do |cmd|
|
2667
|
-
execute_command cmd
|
2668
|
-
end
|
2669
|
-
|
2670
|
-
cleanup_containers
|
2671
|
-
else
|
2672
|
-
[
|
2673
|
-
"docker network create borat_network || true",
|
2674
|
-
"docker-compose build web",
|
2675
|
-
"docker run -v $PWD:/code -w /code -e MIX_ENV=qa --entrypoint /bin/sh web \
|
2676
|
-
'-c' 'mix local.hex --force && mix hex.info && \
|
2677
|
-
mix deps.get && \
|
2678
|
-
cd assets && \
|
2679
|
-
yarn --cache-folder ~/.cache/yarn && \
|
2680
|
-
./node_modules/.bin/elm-github-install && \
|
2681
|
-
sysconfcpus -n 2 ./node_modules/.bin/webpack -p --config config/webpack.config.prod.js && \
|
2682
|
-
cd ../ && \
|
2683
|
-
mix phx.digest && \
|
2684
|
-
mix compile && mix deps.compile && \
|
2685
|
-
rm -rf _build/qa/rel/ && \
|
2686
|
-
mix distillery.release --env=qa'"
|
2687
|
-
].each do |cmd|
|
2688
|
-
execute_command cmd
|
2689
|
-
end
|
2465
|
+
exec_step 'cp docker-compose.yml docker-compose-ci.yml'
|
2466
|
+
exec_step 'prepare-docker-compose --directory borat && cp docker-compose-qainit.yml docker-compose.yml'
|
2467
|
+
[
|
2468
|
+
"docker network create borat_network || true",
|
2469
|
+
"docker-compose build web",
|
2470
|
+
"docker-compose run -w $PWD -u root -e MIX_ENV=qa --entrypoint /bin/sh web \
|
2471
|
+
'-c' 'mix local.hex --force && mix hex.info && \
|
2472
|
+
mix deps.get && \
|
2473
|
+
cd assets && \
|
2474
|
+
yarn --cache-folder ~/.cache/yarn && \
|
2475
|
+
sysconfcpus -n 2 ./node_modules/.bin/webpack -p --config config/webpack.config.prod.js && \
|
2476
|
+
cd ../ && \
|
2477
|
+
mix phx.digest && \
|
2478
|
+
mix compile && mix deps.compile && \
|
2479
|
+
rm -rf _build/qa/rel/ && \
|
2480
|
+
mix distillery.release --env=qa'"
|
2481
|
+
].each do |cmd|
|
2482
|
+
execute_command cmd
|
2690
2483
|
end
|
2691
2484
|
|
2485
|
+
cleanup_containers
|
2486
|
+
|
2692
2487
|
artifact_path = Dir.glob("_build/qa/rel/borat/releases/*/borat.tar.gz").first
|
2693
2488
|
upload_artifact(artifact_path, "microservices/borat/#{revision}-qa.tar.gz", "#{@s3_bucket}-encrypted")
|
2694
2489
|
|
@@ -2728,26 +2523,18 @@ class Release
|
|
2728
2523
|
end
|
2729
2524
|
end
|
2730
2525
|
|
2731
|
-
|
2732
|
-
|
2733
|
-
|
2734
|
-
|
2735
|
-
|
2736
|
-
|
2737
|
-
|
2738
|
-
|
2739
|
-
execute_command cmd
|
2740
|
-
end
|
2741
|
-
|
2742
|
-
cleanup_containers
|
2743
|
-
else
|
2744
|
-
[
|
2745
|
-
"bin/local_build_artifact.sh #{branch_name} #{'update' if @deploy_update}"
|
2746
|
-
].each do |cmd|
|
2747
|
-
execute_command cmd
|
2748
|
-
end
|
2526
|
+
exec_step 'mv docker-compose-ci.yml docker-compose.yml'
|
2527
|
+
exec_step 'prepare-docker-compose --directory prima'
|
2528
|
+
exec_step 'sed -i "s/\\/home\\/app/\\/root/g" docker-compose.yml'
|
2529
|
+
`sed -i 's/"@prima-assicurazioni/pyxis-npm": ".*",/"@prima-assicurazioni/pyxis-npm": "#{@pyxis_version}",/' package.json` if deploy_pyxis?
|
2530
|
+
[
|
2531
|
+
"bin/qa_build_artifact.sh #{branch_name} #{'update' if @deploy_update}"
|
2532
|
+
].each do |cmd|
|
2533
|
+
execute_command cmd
|
2749
2534
|
end
|
2750
2535
|
|
2536
|
+
cleanup_containers
|
2537
|
+
|
2751
2538
|
Dir.chdir "../../"
|
2752
2539
|
end
|
2753
2540
|
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: prima-twig
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.51.
|
4
|
+
version: 0.51.2
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Matteo Giachino
|
@@ -214,8 +214,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
214
214
|
- !ruby/object:Gem::Version
|
215
215
|
version: '0'
|
216
216
|
requirements: []
|
217
|
-
|
218
|
-
rubygems_version: 2.5.2.3
|
217
|
+
rubygems_version: 3.0.1
|
219
218
|
signing_key:
|
220
219
|
specification_version: 4
|
221
220
|
summary: The Prima twig toolbelt
|