CI components
A few open source components have been updated, or created which use the JFPatch-as-a-service system to build themselves on push. Hopefully these will serve as a useful guide should anyone else wish to use the facility.
Examples can also be found on GitHub by searching for the topic 'riscos-ci'. Fully details on how the CI systems can be configured can be found on the RISC OS Build service site.
2020LineEditor
This was actually the first project I built using the API myself.
The CI build uses GitHub workflow to perform the build on an Ubuntu machine. The workflow has a few steps, thus:
- It zips the source, and then submits it to the JFPatch-as-a-service JSON API interface.
The result is extracted into different files, and if there was an output, it is decoded from Base64 to a file. - We check whether the build was successful, and if not, we report this and fail.
- We extract the version number from the '
VersionNum
' file, and apply this to the Zip that was built. - We report the artifact to GitHub.
.robuild.yml
file doesn't do anything particularly clever. It runs the existing '!!Release
' Obey file to do the build. The build was changed slightly to be more friendly for use on non-RISC OS systems. In particular, the BASIC files were converted to BASIC Text format, which is diff-able in git.
2020Nettle
The
.robuild.yaml
file runs the build with 'amu
', and then performs the necessary copying of files with the existing '!Release
' Obey file. The Obey file was modified slightly to make the '*Wipe
' operations non-fatal - Pyromaniac hasn't got a working '*Wipe
' yet.
2020ErrorCancel
However, there's also a '
.gitlab-ci.yml
'
automation file, which is used by GitLab for building jobs under its CI system.The
.robuild.yaml
builds the objasm source. There's only one file, and we're not doing anything complicated, so the script just contains the 4 commands that we need - create directories, assembler to an AOF file, link into a module.
2020Pico
Both GitHub and GitLab scripts are included. The master copy of Pico is in my GitLab repository and is tested automatically there; when pushed to master, the branches are synchronised to GitHub. Thus it tests both the types of workflows.
2020CObey
This simplifies the process of submitting the build, and makes the build more responsive - the output from the build is sent to GitHub as it happens. Consequently the CI file is a little different:
- First we Zip up the sources.
Then we download the 'riscos-build-online
' tool from GitHub, and make it runnable.
And we use the tool to submit the source to the service.
Because the 'riscos-build-online
' tool reports output and errors, and writes files to a known location, a lot of the boilerplate that was in the other workflows is removed. - We work out the version number from '
VersionNum
' and rename the file so that it has a good name in the artifacts.
Some variables are set for the version and leafname that we'll use later. - IF this is a release - that is, we pushed a tag starting with a '
v
', we do a bunch of extra steps:- We obtain the built artifact we created.
- We 'create a release' in GitHub - this is the thing you will see as a downloadable artifact off the main repository's homepage, currently on the right of the page.
- We push the built artifact to the release we created, so that it's attached. This means that users will be able to download the built binary, as well as the source for this release.
2020DDEUtilsJF
riscos-build-online
' tool.
2020riscos-build-online
The 'riscos-build-online' tool is a tool to make it easier to submit builds to the JFPatch-as-a-service system for building. It uses the WebSockets interface so it's a bit more involved than the JSON API version - but this also means that it can run for much longer, and give better feedback.
The CI build is more complex than the others, because it's building for other platforms. There are actually 3 major parts to the build:
- The first build is for linux - we build the tool so that it will run on the Ubuntu we're running on.
- We checkout the sources - including the two submodules.
The client uses two open source libraries; a JSON parser and a WebSockets client. These are submodules so that we're not duplicating the code into this repository. As submodules we know the code should not go stale because we will always get the same pinned version of the source. - The tool is built - this is just a simple '
make
' which builds the tool and the deb archive. - We run the tests - this just uses the tool to run a simple command on the service and check we get a response.
- We work out what the built files are and store them in some variables.
- We upload the tool, and then the deb, so that it is available as an artifact.
- We checkout the sources - including the two submodules.
- The second build, which happens after the first has completed, is to build the RISC OS version of the tool.
- We checkout the sources. This is a fresh system, so we need to get the sources to be able to work with them.
- We download the linux binary that we built in the earlier stage.
- We zip up the sources, and we use the linux tool to send them to the service.
- We work out the name to give the output.
- We upload the tool as an artifact.
-
If we were doing a release - a tag was pushed that starts with a '
v
' - we do this final stage.- We download the 3 binaries that were built - the Ubuntu deb, the linux tool and the RISC OS tool/
- We create a new release using the name with the version that was released.
- We attach the 3 binaries to the release.
This means that once a change is pushed with the tag starting with a 'v
', a release is prepared which contains the 3 binaries. These are left in the pending state, so that as owner of the repository you can confirm that they are good, and update any release notes you might want to add. No human is involved in the actual building, other than to push the tag.
2021LanMan 98
RISC OS Developments released the LanMan98 source in April 2021. Obviously it's best under source control, and if it's under source control it should be built automatically. I put the sources into git and then updated it so that it build on my machine using the cross compilation toolchain. The notes for the changes that were made are in the repository.
Once the build was working locally, I used the general CI template to create some GitHub actions that invoke it. These needed to be more special than the usual commands. Because the build takes longer than 10 minutes, the gatedway'd build can't be used - its proxy times out at that point. So instead we talk directly to the back end server.
The total build time is around 16 minutes on the build service, which isn't so great but then it's all happening off your machine so you can get on with other things.
The .robuild.yaml
file has one special fix in it - there's an extra alias
for the *Copy
command. It turned out that the arguments processed from
the command were not being split using the usual RISC OS rules - multiple spaces weren't
handled the same way. This bug has subsequently been fixed, but the alias remains as
the service hadn't been updated at the time it was written.
The resulting artifact is a complete build of the !LanMan98 application and modules. A release was made at that time.
2021Iconborders Example
In the Select Iconborders SDK there had been an example module which provided simple borders just like the standard icons. The example code was meant to make it easy for anyone to create new styles of borders to match whatever style of desktop they wanted.
The example code was supplied with a build which show what the buttons would look like when rendered on the screen. This makes it easier to test what it's going to look like.
The .robuild.yaml
builds the test code and the module, and then runs
the test code to show that the code works, and that you can see what the result
will be. The CI build saves the sprite, along with the build executables and
provides them as artifacts so that you can see what it made.
The iconborderfilters-documentation
branch contains documentation
for how the Filters work.
2021Iconborders Fob
One of the example Iconbborder modules was for a simple border that had a highlight colour on one edge. These were styled like a key fob I had, which I thought would look reasonable as a button. They look pretty good as a flat design, and work better when they have the colour changing slightly as you float over them.
The .robuild.yaml
has the same configuration as the example Iconborders
module.