3 Commits

Author SHA1 Message Date
peternashaat
aa30c54742 docs: document hero-git image and installer-based release pipeline
- add README for hero-git Docker image usage (local + CI)
- explain Dockerfile/entrypoint behavior and horus_full_install workflow
- describe new release process using hero-git image and horus_full_install.vsh
2025-11-20 12:06:41 +00:00
8fdfdd1746 chore: use hero-git installer to build release binaries
* run `horus_full_install.vsh` inside hero-git docker image
 * collect built binaries from /root/hero/bin into release artifacts
2025-11-20 11:46:01 +00:00
peternashaat
dffb17ffbc Add CI and release workflows for Horus Rust binaries
This adds a per-bin Rust CI pipeline and a tagged release workflow that builds,
packages, and publishes binaries as Gitea releases.
2025-11-19 18:47:16 +00:00
6 changed files with 460 additions and 942 deletions

View File

@@ -1,881 +0,0 @@
# Gitea Actions Workflows - Line-by-Line Explanation
This document provides a detailed explanation of every line in the CI/CD workflows, explaining what each line does, why it's needed, and how it works.
---
## Table of Contents
1. [CI Workflow (ci.yml)](#ci-workflow-ciyml)
2. [Release Workflow (release.yml)](#release-workflow-releaseyml)
3. [Testing Guide](#testing-guide)
4. [Common Patterns Explained](#common-patterns-explained)
---
## CI Workflow (ci.yml)
### Header Section
```yaml
name: CI
```
**What**: Defines the workflow name displayed in the Gitea Actions UI
**Why**: Helps identify this workflow among multiple workflows
**How**: Gitea reads this and displays "CI" in the Actions tab
---
### Trigger Configuration
```yaml
on:
```
**What**: Starts the trigger configuration section
**Why**: Tells Gitea when to run this workflow
**How**: Gitea monitors repository events and matches them against these triggers
```yaml
push:
branches:
- '**'
```
**What**: Triggers workflow on push to any branch
**Why**: We want to test every commit on every branch
**How**: `'**'` is a glob pattern matching all branch names (main, develop, feature/*, etc.)
**Alternative**: Use `- main` to only run on main branch
```yaml
pull_request:
types: [opened, synchronize, reopened]
```
**What**: Triggers workflow on pull request events
**Why**: Test code before merging into main branch
**How**:
- `opened` - When PR is first created
- `synchronize` - When new commits are pushed to the PR
- `reopened` - When a closed PR is reopened
**Note**: Does not run on `closed` to save resources
---
### Job Definition
```yaml
jobs:
```
**What**: Starts the jobs section
**Why**: Workflows contain one or more jobs that run tasks
**How**: Each job runs in a fresh virtual environment
```yaml
build-and-test:
```
**What**: Job identifier (internal name)
**Why**: Unique ID for this job, used in logs and dependencies
**How**: Must be unique within the workflow, use kebab-case
```yaml
name: Build & Test
```
**What**: Human-readable job name
**Why**: Displayed in the Gitea UI for better readability
**How**: Shows in the Actions tab instead of "build-and-test"
```yaml
runs-on: ubuntu-latest
```
**What**: Specifies which runner to use
**Why**: Determines the OS and environment for the job
**How**: Gitea matches this label with available runners
**Note**: Your runner must have the `ubuntu-latest` label configured
---
### Steps Section
```yaml
steps:
```
**What**: Starts the list of steps to execute
**Why**: Steps are the individual tasks that make up a job
**How**: Steps run sequentially in order
---
#### Step 1: Checkout Code
```yaml
- name: Checkout code
```
**What**: Human-readable step name
**Why**: Helps identify this step in logs
**How**: Displayed in the workflow run UI
```yaml
uses: actions/checkout@v4
```
**What**: Uses a pre-built action to checkout code
**Why**: Clones your repository into the runner's workspace
**How**:
- `actions/checkout` - GitHub's official checkout action (Gitea compatible)
- `@v4` - Pins to version 4 for stability
**What it does**:
1. Clones the repository
2. Checks out the commit that triggered the workflow
3. Sets up git configuration
**Why needed**: Without this, the runner has no access to your code
---
#### Step 2: Setup Rust
```yaml
- name: Setup Rust toolchain
uses: actions-rust-lang/setup-rust-toolchain@v1
```
**What**: Installs Rust toolchain on the runner
**Why**: Needed to compile Rust code
**How**: Downloads and installs rustc, cargo, and related tools
**What it does**:
1. Installs Rust stable version
2. Adds cargo to PATH
3. Configures cargo home directory
```yaml
with:
toolchain: stable
```
**What**: Specifies which Rust version to install
**Why**: `stable` ensures we use the latest stable Rust release
**How**: Downloads from rust-lang.org
**Alternatives**: `nightly`, `beta`, or specific version like `1.75.0`
```yaml
components: rustfmt, clippy
```
**What**: Installs additional Rust components
**Why**:
- `rustfmt` - Code formatter (needed for formatting check)
- `clippy` - Linter (needed for lint check)
**How**: Installed via rustup alongside the toolchain
---
#### Step 3-5: Caching
**Why caching is needed**:
- Rust compilation is slow
- Dependencies rarely change
- Caching speeds up builds from ~15 minutes to ~2 minutes
```yaml
- name: Cache cargo registry
uses: actions/cache@v4
```
**What**: Caches the Cargo registry
**Why**: Stores downloaded crate metadata to avoid re-downloading
**How**: Uses GitHub's cache action (Gitea compatible)
```yaml
with:
path: ~/.cargo/registry
```
**What**: Directory to cache
**Why**: This is where Cargo stores downloaded crate files
**How**: Entire directory is compressed and stored
```yaml
key: ${{ runner.os }}-cargo-registry-${{ hashFiles('**/Cargo.lock') }}
```
**What**: Unique cache key
**Why**: Identifies this specific cache
**How**:
- `${{ runner.os }}` - OS name (e.g., "Linux")
- `cargo-registry` - Cache identifier
- `${{ hashFiles('**/Cargo.lock') }}` - Hash of Cargo.lock
**Result**: Key like `Linux-cargo-registry-a1b2c3d4`
**When it changes**: When Cargo.lock changes (dependencies updated)
```yaml
restore-keys: |
${{ runner.os }}-cargo-registry-
```
**What**: Fallback cache keys
**Why**: If exact match not found, use partial match
**How**: Tries to find any cache starting with `Linux-cargo-registry-`
**Benefit**: Even with dependency changes, most cache is still valid
**Same pattern repeats for**:
- Cargo index cache (`~/.cargo/git`)
- Build cache (`target/`)
---
#### Step 6: Check Code
```yaml
- name: Check code
run: cargo check --workspace --verbose
```
**What**: Runs `cargo check` command
**Why**: Fast compilation check without producing binaries
**How**:
- `cargo check` - Compiles code but doesn't generate executables
- `--workspace` - Check all packages in the workspace
- `--verbose` - Show detailed output
**Benefit**: Catches compilation errors quickly (~2x faster than full build)
**Exit code**: Non-zero if compilation fails, which fails the workflow
---
#### Step 7: Run Tests
```yaml
- name: Run tests
run: cargo test --workspace --verbose
```
**What**: Runs all tests in the workspace
**Why**: Ensures code changes don't break functionality
**How**:
- Compiles test code
- Runs all `#[test]` functions
- Runs integration tests in `tests/` directory
**Exit code**: Non-zero if any test fails
---
#### Step 8: Run Clippy
```yaml
- name: Run clippy
run: cargo clippy --workspace -- -D warnings
```
**What**: Runs Rust linter
**Why**: Catches common mistakes and enforces best practices
**How**:
- `cargo clippy` - Runs the clippy linter
- `--workspace` - Lint all packages
- `--` - Separator between cargo args and clippy args
- `-D warnings` - Treat warnings as errors
**Result**: Fails if any clippy warnings are found
**Examples of what clippy catches**:
- Unused variables
- Inefficient code patterns
- Potential bugs
---
#### Step 9: Check Formatting
```yaml
- name: Check formatting
run: cargo fmt --all -- --check
```
**What**: Checks if code is properly formatted
**Why**: Enforces consistent code style
**How**:
- `cargo fmt` - Rust formatter
- `--all` - Check all packages
- `--` - Separator
- `--check` - Don't modify files, just check
**Exit code**: Non-zero if any file is not formatted
**To fix locally**: Run `cargo fmt --all` without `--check`
---
#### Step 10: Build Release Binaries
```yaml
- name: Build release binaries
run: cargo build --workspace --release --verbose
```
**What**: Builds all binaries with optimizations
**Why**: Ensures release builds work and produces artifacts
**How**:
- `cargo build` - Compile code
- `--workspace` - Build all packages
- `--release` - Enable optimizations (from Cargo.toml profile.release)
- `--verbose` - Show detailed output
**Result**: Binaries in `target/release/` directory
**Time**: ~5-10 minutes (first run), ~2-5 minutes (cached)
---
#### Step 11: List Binaries
```yaml
- name: List built binaries
run: |
echo "Built binaries:"
ls -lh target/release/ | grep -E '^-.*x.*'
```
**What**: Lists built executable files
**Why**: Helps verify all binaries were built successfully
**How**:
- `ls -lh` - List files with human-readable sizes
- `grep -E '^-.*x.*'` - Filter for executable files
**Output**: Shows binary names and sizes in logs
---
#### Step 12: Upload Artifacts
```yaml
- name: Upload build artifacts
uses: actions/upload-artifact@v4
```
**What**: Uploads files to Gitea for download
**Why**: Makes binaries available for testing without creating a release
**How**: Uses GitHub's upload action (Gitea compatible)
```yaml
with:
name: binaries-${{ github.sha }}
```
**What**: Artifact name
**Why**: Unique name for this set of binaries
**How**: `${{ github.sha }}` - Git commit SHA (e.g., `binaries-a1b2c3d4`)
```yaml
path: |
target/release/supervisor
target/release/coordinator
target/release/horus
target/release/osiris
target/release/herorunner
target/release/runner_osiris
target/release/runner_sal
```
**What**: Files to upload
**Why**: These are the 7 binaries we want to preserve
**How**: Each line is a file path, `|` allows multi-line list
```yaml
retention-days: 7
```
**What**: How long to keep artifacts
**Why**: Saves storage space by auto-deleting old artifacts
**How**: Gitea automatically deletes after 7 days
```yaml
if-no-files-found: warn
```
**What**: What to do if files don't exist
**Why**: `warn` logs a warning but doesn't fail the workflow
**How**: Useful if some binaries fail to build
**Alternatives**: `error` (fail workflow), `ignore` (silent)
---
## Release Workflow (release.yml)
### Header and Triggers
```yaml
name: Release
```
**What**: Workflow name
**Why**: Identifies this as the release workflow
```yaml
on:
push:
tags:
- 'v*.*.*'
```
**What**: Triggers on version tags
**Why**: Only create releases for version tags
**How**:
- `tags:` - Watches for tag pushes
- `'v*.*.*'` - Glob pattern matching semantic versions
**Matches**: `v1.0.0`, `v2.1.3`, `v0.1.0`
**Doesn't match**: `v1.0`, `1.0.0`, `release-1.0.0`
---
### Job Setup
```yaml
jobs:
build-release:
name: Build Release Binaries
runs-on: ubuntu-latest
```
**Same as CI workflow** - See above for explanation
---
### Steps 1-2: Checkout and Setup
**Same as CI workflow** - See above for explanation
---
#### Step 3: Extract Version
```yaml
- name: Extract version from tag
id: version
```
**What**: Names this step and gives it an ID
**Why**: `id` allows other steps to reference this step's outputs
**How**: Use `${{ steps.version.outputs.VERSION }}` in later steps
```yaml
run: echo "VERSION=${GITHUB_REF#refs/tags/}" >> $GITHUB_OUTPUT
```
**What**: Extracts version from tag name
**Why**: Needed for naming release files
**How**:
- `GITHUB_REF` - Full ref like `refs/tags/v1.0.0`
- `${GITHUB_REF#refs/tags/}` - Bash parameter expansion, removes `refs/tags/` prefix
- Result: `v1.0.0`
- `>> $GITHUB_OUTPUT` - Sets output variable
**Usage**: Later steps access via `${{ steps.version.outputs.VERSION }}`
---
#### Step 4: Build Release Binaries
```yaml
- name: Build release binaries
run: cargo build --workspace --release --verbose
```
**Same as CI workflow** - Builds optimized binaries
**Why here**: Need fresh release builds for distribution
---
#### Step 5: Strip Binaries
```yaml
- name: Strip binaries
run: |
strip target/release/supervisor || true
strip target/release/coordinator || true
# ... etc for all 7 binaries
```
**What**: Removes debug symbols from binaries
**Why**: Reduces binary size by 50-90%
**How**:
- `strip` - Linux command that removes debugging symbols
- `|| true` - Don't fail if strip fails (some binaries might not exist)
**Result**: Smaller binaries, faster downloads
**Example**: 50MB binary → 5MB binary
---
#### Step 6: Create Release Directory
```yaml
- name: Create release directory
run: mkdir -p release-artifacts
```
**What**: Creates directory for release files
**Why**: Organize artifacts before uploading
**How**: `mkdir -p` creates directory (doesn't fail if exists)
---
#### Step 7: Package Binaries
```yaml
- name: Package binaries
run: |
# Package each binary as a tarball
for binary in supervisor coordinator horus osiris herorunner runner_osiris runner_sal; do
```
**What**: Loops through all binary names
**Why**: Package each binary separately
**How**: Bash for loop
```yaml
if [ -f "target/release/$binary" ]; then
```
**What**: Checks if binary file exists
**Why**: Skip if binary wasn't built
**How**: `-f` tests if file exists
```yaml
tar -czf "release-artifacts/${binary}-${{ steps.version.outputs.VERSION }}-linux-x86_64.tar.gz" \
-C target/release "$binary"
```
**What**: Creates compressed tarball
**Why**: Standard distribution format for Linux binaries
**How**:
- `tar` - Archive tool
- `-c` - Create archive
- `-z` - Compress with gzip
- `-f` - Output filename
- `-C target/release` - Change to this directory first
- `"$binary"` - File to archive
**Result**: File like `supervisor-v1.0.0-linux-x86_64.tar.gz`
**Naming convention**: `{name}-{version}-{platform}-{arch}.tar.gz`
```yaml
echo "Packaged $binary"
else
echo "Warning: $binary not found, skipping"
fi
done
```
**What**: Logs success or warning
**Why**: Helps debug if binaries are missing
**How**: Simple echo statements
---
#### Step 8: Generate Checksums
```yaml
- name: Generate checksums
run: |
cd release-artifacts
sha256sum *.tar.gz > checksums.txt
cat checksums.txt
```
**What**: Creates SHA256 checksums for all tarballs
**Why**: Allows users to verify download integrity
**How**:
- `cd release-artifacts` - Change to artifact directory
- `sha256sum *.tar.gz` - Calculate SHA256 hash for each tarball
- `> checksums.txt` - Save to file
- `cat checksums.txt` - Display in logs
**Result**: File with lines like:
```
a1b2c3d4... supervisor-v1.0.0-linux-x86_64.tar.gz
e5f6g7h8... coordinator-v1.0.0-linux-x86_64.tar.gz
```
---
#### Step 9: Create Release
```yaml
- name: Create Release
uses: actions/gitea-release@v1
```
**What**: Uses Gitea's release action
**Why**: Creates a release with attached files
**How**: Calls Gitea API to create release
```yaml
with:
files: release-artifacts/*
```
**What**: Files to attach to release
**Why**: Makes binaries downloadable
**How**: Glob pattern uploads all files in directory
```yaml
token: ${{ secrets.GITHUB_TOKEN }}
```
**What**: Authentication token
**Why**: Needed to create releases via API
**How**: Gitea automatically provides this secret
**Security**: Token is scoped to this repository only
```yaml
tag_name: ${{ steps.version.outputs.VERSION }}
```
**What**: Tag to create release for
**Why**: Associates release with the tag
**How**: Uses version extracted in step 3
```yaml
name: Release ${{ steps.version.outputs.VERSION }}
```
**What**: Release title
**Why**: Displayed in releases page
**How**: Combines "Release" + version (e.g., "Release v1.0.0")
```yaml
body: |
## Horus Release ${{ steps.version.outputs.VERSION }}
### Binaries
This release includes the following binaries for Linux x86_64:
- `supervisor` - Hero Supervisor service
# ... etc
```
**What**: Release description (markdown)
**Why**: Provides context and instructions
**How**: Multi-line string with markdown formatting
**Result**: Rendered as formatted text in release page
```yaml
draft: false
```
**What**: Publish immediately
**Why**: Make release public right away
**How**: `false` = published, `true` = draft
**Alternative**: Set to `true` to review before publishing
```yaml
prerelease: false
```
**What**: Mark as stable release
**Why**: Indicates this is production-ready
**How**: `false` = stable, `true` = pre-release (beta, alpha)
**When to use `true`**: For tags like `v1.0.0-beta.1`
---
## Testing Guide
### Testing CI Workflow Locally
Before pushing, test locally:
```bash
# 1. Check compilation
cargo check --workspace --verbose
# 2. Run tests
cargo test --workspace --verbose
# 3. Run clippy
cargo clippy --workspace -- -D warnings
# 4. Check formatting
cargo fmt --all -- --check
# 5. Build release
cargo build --workspace --release --verbose
# 6. Verify binaries exist
ls -lh target/release/ | grep -E '^-.*x.*'
```
**Expected result**: All commands should succeed with exit code 0
---
### Testing CI Workflow in Gitea
```bash
# 1. Create a test branch
git checkout -b test-ci
# 2. Make a small change (e.g., add a comment)
echo "// Test CI" >> bin/supervisor/src/main.rs
# 3. Commit and push
git add .
git commit -m "test: Trigger CI workflow"
git push origin test-ci
# 4. Check Gitea Actions
# Navigate to: https://git.ourworld.tf/peternashaat/horus/actions
```
**Expected result**:
- Workflow appears in Actions tab
- All steps complete successfully (green checkmarks)
- Artifacts are uploaded
**To download artifacts**:
1. Click on the workflow run
2. Scroll to "Artifacts" section
3. Click to download
---
### Testing Release Workflow Locally
Simulate release build:
```bash
# 1. Build release binaries
cargo build --workspace --release --verbose
# 2. Strip binaries
strip target/release/supervisor || true
strip target/release/coordinator || true
# ... etc
# 3. Create test directory
mkdir -p test-release
# 4. Package binaries
for binary in supervisor coordinator horus osiris herorunner runner_osiris runner_sal; do
if [ -f "target/release/$binary" ]; then
tar -czf "test-release/${binary}-v0.0.1-test-linux-x86_64.tar.gz" \
-C target/release "$binary"
echo "Packaged $binary"
fi
done
# 5. Generate checksums
cd test-release
sha256sum *.tar.gz > checksums.txt
cat checksums.txt
cd ..
# 6. Test extraction
cd test-release
tar -xzf supervisor-v0.0.1-test-linux-x86_64.tar.gz
./supervisor --help
cd ..
```
**Expected result**:
- All binaries package successfully
- Checksums are generated
- Binary extracts and runs
---
### Testing Release Workflow in Gitea
```bash
# 1. Ensure code is ready
git checkout main
git pull
# 2. Create a test tag
git tag v0.1.0-test
# 3. Push the tag
git push origin v0.1.0-test
# 4. Check Gitea
# Navigate to: https://git.ourworld.tf/peternashaat/horus/releases
```
**Expected result**:
- Release appears in Releases tab
- All 7 binaries are attached as `.tar.gz` files
- `checksums.txt` is attached
- Release notes are properly formatted
**To test download**:
```bash
# Download a binary
wget https://git.ourworld.tf/peternashaat/horus/releases/download/v0.1.0-test/supervisor-v0.1.0-test-linux-x86_64.tar.gz
# Extract
tar -xzf supervisor-v0.1.0-test-linux-x86_64.tar.gz
# Test
chmod +x supervisor
./supervisor --help
```
**Cleanup test release**:
1. Go to Releases page
2. Click on the test release
3. Click "Delete" button
---
## Common Patterns Explained
### Why `|| true`?
```yaml
strip target/release/supervisor || true
```
**What**: Bash OR operator
**Why**: Prevents step from failing if command fails
**How**:
- If `strip` succeeds (exit 0), continue
- If `strip` fails (exit non-zero), `|| true` runs and returns 0
**Use case**: Some binaries might not exist, don't fail the whole workflow
---
### Why `${{ }}` Syntax?
```yaml
${{ github.sha }}
${{ steps.version.outputs.VERSION }}
```
**What**: GitHub Actions expression syntax
**Why**: Access variables and context
**How**: Gitea evaluates these at runtime
**Types**:
- `github.*` - Workflow context (sha, ref, actor, etc.)
- `secrets.*` - Secret variables
- `steps.*` - Output from previous steps
- `runner.*` - Runner information (os, arch, etc.)
---
### Why `--workspace`?
```yaml
cargo build --workspace
```
**What**: Cargo flag to include all workspace members
**Why**: Your project is a workspace with multiple packages
**How**: Cargo reads `Cargo.toml` [workspace] section
**Without it**: Only builds the root package
**With it**: Builds all 7 binaries
---
### Why Separate CI and Release Workflows?
**CI Workflow**:
- Runs frequently (every push)
- Fast feedback
- Doesn't create releases
**Release Workflow**:
- Runs rarely (only on tags)
- Slower (includes packaging)
- Creates permanent artifacts
**Benefit**: Fast CI doesn't slow down development, releases are deliberate
---
### Why Cache Three Directories?
1. **`~/.cargo/registry`** - Downloaded crate files
- Changes when: Dependencies are added/updated
- Size: ~500MB - 2GB
2. **`~/.cargo/git`** - Git dependencies
- Changes when: Git dependencies are updated
- Size: ~100MB - 500MB
3. **`target/`** - Compiled artifacts
- Changes when: Code or dependencies change
- Size: ~2GB - 10GB
**Together**: Reduce build time from 15 minutes to 2 minutes
---
### Why `hashFiles('**/Cargo.lock')`?
**What**: Generates hash of Cargo.lock
**Why**: Cache key changes when dependencies change
**How**:
- `**/Cargo.lock` - Find all Cargo.lock files
- `hashFiles()` - Generate SHA256 hash
**Result**: Different hash = different cache = rebuild dependencies
**Benefit**: Cache is invalidated when dependencies change
---
## Summary
Both workflows follow best practices:
**Fast feedback** - CI runs on every push
**Comprehensive testing** - Check, test, lint, format
**Optimized builds** - Caching reduces build time
**Automated releases** - Tag-based release creation
**Secure** - Uses scoped tokens, no manual secrets
**Reproducible** - Pinned action versions
**User-friendly** - Clear release notes and instructions
For more information, see [README.md](./README.md).

View File

@@ -46,20 +46,49 @@ jobs:
restore-keys: |
${{ runner.os }}-cargo-build-target-
- name: Check code
run: cargo check --workspace --verbose
# 👇 Don't fail CI on hero-runner's warnings
- name: Check code (all crates under bin/)
env:
RUSTFLAGS: "--cap-lints=warn"
run: |
set -euo pipefail
find bin -name Cargo.toml -print0 | while IFS= read -r -d '' manifest; do
echo "=== cargo check --manifest-path $manifest ==="
cargo check --manifest-path "$manifest" --verbose
done
- name: Run tests
run: cargo test --workspace --verbose
# 👇 Same trick for tests, otherwise theyd fail for the same reason
- name: Run tests (all crates under bin/)
env:
RUSTFLAGS: "--cap-lints=warn"
run: |
set -euo pipefail
find bin -name Cargo.toml -print0 | while IFS= read -r -d '' manifest; do
echo "=== cargo test --manifest-path $manifest ==="
cargo test --manifest-path "$manifest" --verbose
done
- name: Run clippy
run: cargo clippy --workspace -- -D warnings
# Clippy stays strict (still uses -D warnings for clippy lints).
# If this later fails because of hero-runner, we can also add RUSTFLAGS here.
- name: Run clippy (all crates under bin/)
run: |
set -euo pipefail
find bin -name Cargo.toml -print0 | while IFS= read -r -d '' manifest; do
echo "=== cargo clippy --manifest-path $manifest ==="
cargo clippy --manifest-path "$manifest" -- -D warnings
done
- name: Check formatting
run: cargo fmt --all -- --check
- name: Build release binaries
run: cargo build --workspace --release --verbose
# Build was already succeeding; leaving it without cap-lints is fine.
- name: Build release binaries (all crates under bin/)
run: |
set -euo pipefail
find bin -name Cargo.toml -print0 | while IFS= read -r -d '' manifest; do
echo "=== cargo build --manifest-path $manifest --release ==="
cargo build --manifest-path "$manifest" --release --verbose
done
- name: List built binaries
run: |
@@ -79,4 +108,4 @@ jobs:
target/release/runner_osiris
target/release/runner_sal
retention-days: 7
if-no-files-found: warn
if-no-files-found: warn

View File

@@ -7,94 +7,109 @@ on:
jobs:
build-release:
name: Build Release Binaries
name: Build Release Binaries via hero-git installer
runs-on: ubuntu-latest
env:
IMAGE_NAME: hero-git:latest
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Setup Rust toolchain
uses: actions-rust-lang/setup-rust-toolchain@v1
with:
toolchain: stable
- name: Extract version from tag
id: version
run: echo "VERSION=${GITHUB_REF#refs/tags/}" >> $GITHUB_OUTPUT
- name: Build release binaries
run: cargo build --workspace --release --verbose
- name: Strip binaries
run: echo "VERSION=${GITHUB_REF#refs/tags/}" >> "$GITHUB_OUTPUT"
- name: Ensure hero-git image exists
run: |
strip target/release/supervisor || true
strip target/release/coordinator || true
strip target/release/horus || true
strip target/release/osiris || true
strip target/release/herorunner || true
strip target/release/runner_osiris || true
strip target/release/runner_sal || true
if ! docker image inspect "$IMAGE_NAME" >/dev/null 2>&1; then
echo "ERROR: Docker image '$IMAGE_NAME' not found on runner."
echo "Build it manually on the runner with:"
echo " docker build -t $IMAGE_NAME -f Dockerfile ."
exit 1
fi
- name: Prepare bin output dir
run: mkdir -p hero-bin
- name: Run horus_full_install installer in container
run: |
set -euxo pipefail
docker run --rm \
-v "$PWD/hero-bin:/root/hero/bin" \
-e HEROLIB_REF=development_nile_installers \
"$IMAGE_NAME" \
bash -lc '
set -euxo pipefail
cd /opt/herolib
./examples/installers/horus/horus_full_install.vsh
echo "===== AFTER INSTALL, ls -R /root/hero ====="
ls -R /root/hero || true
'
- name: List built binaries
run: ls -al hero-bin
- name: Create release directory
run: mkdir -p release-artifacts
- name: Package binaries
run: |
# Package each binary as a tarball
for binary in supervisor coordinator horus osiris herorunner runner_osiris runner_sal; do
if [ -f "target/release/$binary" ]; then
if [ -f "hero-bin/$binary" ]; then
tar -czf "release-artifacts/${binary}-${{ steps.version.outputs.VERSION }}-linux-x86_64.tar.gz" \
-C target/release "$binary"
-C hero-bin "$binary"
echo "Packaged $binary"
else
echo "Warning: $binary not found, skipping"
fi
done
- name: Generate checksums
run: |
cd release-artifacts
sha256sum *.tar.gz > checksums.txt
cat checksums.txt
if ls *.tar.gz >/dev/null 2>&1; then
sha256sum *.tar.gz > checksums.txt
cat checksums.txt
else
echo "ERROR: no .tar.gz artifacts were produced; check previous steps (likely the installer didnt build any binaries)."
exit 1
fi
- name: Create Release
uses: actions/gitea-release@v1
uses: akkuman/gitea-release-action@v1
with:
files: release-artifacts/*
token: ${{ secrets.GITHUB_TOKEN }}
token: ${{ secrets.TOKEN_GITEA }}
tag_name: ${{ steps.version.outputs.VERSION }}
name: Release ${{ steps.version.outputs.VERSION }}
body: |
## Horus Release ${{ steps.version.outputs.VERSION }}
### Binaries
This release includes the following binaries for Linux x86_64:
- `supervisor` - Hero Supervisor service
- `coordinator` - Hero Coordinator service
- `horus` - Horus main binary
- `osiris` - Osiris server
- `herorunner` - Hero runner
- `runner_osiris` - Osiris runner
- `runner_sal` - SAL runner
### Installation
Download the appropriate binary for your system:
Built via the herolib V installer (`horus_full_install.vsh`) inside
the `hero-git:latest` image and packaged for Linux x86_64:
- `supervisor`
- `coordinator`
- `horus`
- `osiris`
- `herorunner`
- `runner_osiris`
- `runner_sal`
### Installation (example)
```bash
# Example: Download and install supervisor
wget https://git.ourworld.tf/peternashaat/horus/releases/download/${{ steps.version.outputs.VERSION }}/supervisor-${{ steps.version.outputs.VERSION }}-linux-x86_64.tar.gz
wget https://git.ourworld.tf/herocode/horus/releases/download/${{ steps.version.outputs.VERSION }}/supervisor-${{ steps.version.outputs.VERSION }}-linux-x86_64.tar.gz
tar -xzf supervisor-${{ steps.version.outputs.VERSION }}-linux-x86_64.tar.gz
chmod +x supervisor
sudo mv supervisor /usr/local/bin/
```
### Verification
Verify the integrity of downloaded files using the checksums:
```bash
sha256sum -c checksums.txt
```
### Changes
See commit history for detailed changes in this release.
draft: false
prerelease: false
prerelease: false

43
docker/Dockerfile Normal file
View File

@@ -0,0 +1,43 @@
FROM ubuntu:24.04 AS base
# Includes a bunch of stuff hero will try to install later, so we don't have to
# do that on each new container launch
RUN apt update && apt install -y ssh wget unzip build-essential git redis-server sudo autoconf libtool iputils-ping net-tools rsync curl mc tmux libsqlite3-dev xz-utils git-lfs ufw libpq-dev
RUN wget https://github.com/vlang/v/releases/latest/download/v_linux.zip && \
unzip v_linux.zip && \
cd v && \
./v symlink
# Install bun.sh for docusaurus
RUN curl -fsSL https://bun.sh/install | bash
# Make a new stage so we can invalidate the cache by passing --no-cache-filter
FROM base AS clone
RUN git clone https://github.com/Incubaid/herolib /opt/herolib
RUN git clone https://github.com/incubaid/docusaurus_template /root/code/github/incubaid/docusaurus_template
# Warm the bun node modules cache
RUN cd /root/code/github/incubaid/docusaurus_template/template && /root/.bun/bin/bun install
RUN mkdir -p /root/.vmodules/incubaid
# Make a place for users to mount their ssh key file. We will copy to .ssh and
# change permissions in entrypoint script
RUN mkdir -p /root/ssh
COPY entrypoint.sh /bin/entrypoint.sh
RUN chmod +x /bin/entrypoint.sh
# Make a new stage so we can invalidate the cache by passing --no-cache-filter
FROM clone AS fetch
# Fetch to freshen the repos with minimal work
RUN cd /opt/herolib && git fetch
RUN cd /root/code/github/incubaid/docusaurus_template && git fetch
ENTRYPOINT ["/bin/entrypoint.sh"]

268
docker/Readme.md Normal file
View File

@@ -0,0 +1,268 @@
# `hero-git` Docker Image
This directory contains a reusable Docker image and entrypoint script used to build Hero / Horus binaries via the V-based **herolib** installers.
It is designed for two main use cases:
1. **Local development / testing** run the herolib CLI (`hero`) and Horus installers in a clean, reproducible environment.
2. **CI / Release builds** build Horus binaries inside this image (using `horus_full_install.vsh`) and export them as release artifacts.
---
## Files
### `Dockerfile`
The `Dockerfile` builds an Ubuntu-based image with all dependencies needed for `herolib` and its installers.
Key points:
* Base: `ubuntu:24.04`
* Installs system tooling:
* `ssh`, `wget`, `curl`, `unzip`, `build-essential`, `git`, `git-lfs`
* `redis-server`, `libsqlite3-dev`, `libpq-dev`, `autoconf`, `libtool`, `net-tools`, `iputils-ping`, `rsync`, `mc`, `tmux`, `ufw`, `xz-utils`
* Installs **V** compiler:
* Downloads `v_linux.zip` from the official V GitHub releases
* Unzips it and runs `./v symlink` so `v` is on the `PATH`
* Installs **Bun** (used for the docusaurus docs template):
* `curl -fsSL https://bun.sh/install | bash`
* Clones:
* `https://github.com/Incubaid/herolib` into `/opt/herolib`
* `https://github.com/incubaid/docusaurus_template` into `/root/code/github/incubaid/docusaurus_template`
* Warms Bun dependencies for the docusaurus template (for faster re-use):
* `cd /root/code/github/incubaid/docusaurus_template/template && bun install`
* Prepares directories:
* `/root/.vmodules/incubaid` used by V module resolution
* `/root/ssh` optional mount point for SSH keys
* Copies `entrypoint.sh` into the image and marks it executable.
The containers entrypoint is set to the custom script `/bin/entrypoint.sh`.
---
### `entrypoint.sh`
The entrypoint script is responsible for:
1. Starting **Redis** in the background.
2. Optionally configuring **SSH** (if keys are provided).
3. Selecting the correct `herolib` source (mounted or cloned).
4. Checking out the desired `herolib` branch.
5. Building the `hero` CLI with V and making it available as `/bin/hero`.
6. Finally, executing any command passed to `docker run`.
#### Behavior in detail
```bash
#!/bin/bash
set -euo pipefail
# Start Redis in the background
redis-server --daemonize yes
# Optional SSH setup: only if /root/ssh has keys
if [ -d /root/ssh ] && compgen -G "/root/ssh/*" > /dev/null; then
mkdir -p /root/.ssh
cp -r /root/ssh/* /root/.ssh/
chmod 600 /root/.ssh/*
eval "$(ssh-agent)"
ssh-add /root/.ssh/*
fi
# Support optionally bind-mounting a local herolib into the container.
# If /opt/herolib_mount exists, we use that; otherwise we use the cloned /opt/herolib
rm -f /root/.vmodules/freeflowuniverse/herolib
if [ -d "/opt/herolib_mount" ]; then
ln -s /opt/herolib_mount/lib /root/.vmodules/incubaid/herolib
cd /opt/herolib_mount
else
ln -s /opt/herolib/lib /root/.vmodules/incubaid/herolib
cd /opt/herolib
git fetch
git checkout "${HEROLIB_REF:-development}"
git pull
fi
cd cli
echo "Building hero..."
v -enable-globals hero.v > build.log 2>&1 || (cat build.log && exit 1)
ln -s "$(realpath hero)" /bin/hero
cd /root
# If a command was provided to `docker run`, execute it as-is.
# Example: docker run hero-git:latest bash -lc 'cd /opt/herolib && ./examples/installers/horus/horus_full_install.vsh'
if [ "$#" -gt 0 ]; then
exec "$@"
else
# No command passed → give an interactive shell
exec bash
fi
```
#### Important environment variables
* `HEROLIB_REF`
* Git ref (branch, tag, or commit) used when checking out `/opt/herolib`.
* Default: `development`.
* Example for CI: `HEROLIB_REF=development_nile_installers`.
#### Optional mounts
* `/opt/herolib_mount`
* If you bind-mount your local `herolib` repo here, the container will use it instead of the cloned `/opt/herolib`.
* Useful for local development when you want to test uncommitted changes.
* `/root/ssh`
* Optional directory containing SSH keys (e.g. `id_ed25519`) if you need to access private repositories.
* If present and non-empty, keys are copied to `/root/.ssh` and added to an SSH agent.
---
## What this image is used for
### 1. Local development / experimentation
You can drop into the container and manually run installers or commands against `herolib`:
```bash
# Interactive shell with default branch
docker run -it --rm hero-git:latest
# Use a specific herolib ref
docker run -it --rm -e HEROLIB_REF=development_nile_installers hero-git:latest
# Mount a local herolib repo and use that instead of the cloned one
docker run -it --rm \
-v "$PWD/herolib:/opt/herolib_mount" \
hero-git:latest
```
Inside the container you can then run:
```bash
cd /opt/herolib
./examples/installers/horus/horus_full_install.vsh
```
### 2. CI / Release builds for Horus
In CI (e.g. the `release.yml` workflow), this image is used to build Horus binaries via the V-based installer script:
* The workflow:
1. Ensures `hero-git:latest` is available on the self-hosted runner.
2. Creates a local directory (e.g. `hero-bin/`) on the runner.
3. Runs the container, mounting `hero-bin/` into `/root/hero/bin`.
4. Inside the container, executes `./examples/installers/horus/horus_full_install.vsh` from `/opt/herolib`.
5. The installer writes the compiled Horus binaries into `/root/hero/bin`, which appear on the host inside `hero-bin/`.
6. The workflow then packages those binaries into `.tar.gz` archives and uploads them as release artifacts.
Example CI step:
```yaml
- name: Run horus_full_install installer in container
run: |
set -euxo pipefail
docker run --rm \
-v "$PWD/hero-bin:/root/hero/bin" \
-e HEROLIB_REF=development_nile_installers \
hero-git:latest \
bash -lc '
set -euxo pipefail
cd /opt/herolib
./examples/installers/horus/horus_full_install.vsh
echo "===== AFTER INSTALL, ls -R /root/hero ====="
ls -R /root/hero || true
'
```
After this step, `hero-bin/` on the host should contain binaries like:
* `supervisor`
* `coordinator`
* `horus`
* `osiris`
* `herorunner`
* `runner_osiris`
* `runner_sal`
These are then packaged and attached to the Gitea release.
---
## How to build the image
From the directory containing the `Dockerfile` and `entrypoint.sh`:
```bash
# Build the image (force a clean rebuild)
docker build --no-cache -t hero-git:latest .
# Verify entrypoint contents
docker run --rm --entrypoint cat hero-git:latest /bin/entrypoint.sh | tail -n 20
```
You should see the `exec "$@"` block at the end of the script, which ensures that commands passed to `docker run` are executed as-is inside the container.
---
## How to run the image (examples)
### Basic interactive usage
```bash
# Default branch (HEROLIB_REF=development)
docker run -it --rm hero-git:latest
# Specific herolib ref
export HEROLIB_REF=development_nile_installers
docker run -it --rm \
-e HEROLIB_REF=$HEROLIB_REF \
hero-git:latest
```
### Build Horus binaries into a host directory
```bash
mkdir -p hero-bin
docker run --rm \
-v "$PWD/hero-bin:/root/hero/bin" \
-e HEROLIB_REF=development_nile_installers \
hero-git:latest \
bash -lc '
set -euxo pipefail
cd /opt/herolib
./examples/installers/horus/horus_full_install.vsh
ls -al /root/hero/bin
'
ls -al hero-bin
```
You should now see the built Horus binaries on the host in `hero-bin/`.
---
## Summary
* The `hero-git:latest` image encapsulates all dependencies required to build Horus via `herolib`.
* `entrypoint.sh`:
* Starts Redis
* Optionally configures SSH
* Selects and updates the `herolib` checkout
* Builds the `hero` CLI once
* Runs any command passed to the container (e.g. Horus installers)
* CI uses this image to run `horus_full_install.vsh` and collect Horus binaries from `/root/hero/bin` for releases.

44
docker/entrypoint.sh Normal file
View File

@@ -0,0 +1,44 @@
#!/bin/bash
set -euo pipefail
# Start Redis in the background
redis-server --daemonize yes
# Optional SSH setup: only if /root/ssh has keys
if [ -d /root/ssh ] && compgen -G "/root/ssh/*" > /dev/null; then
mkdir -p /root/.ssh
cp -r /root/ssh/* /root/.ssh/
chmod 600 /root/.ssh/*
eval "$(ssh-agent)"
ssh-add /root/.ssh/*
fi
# Support optionally bind-mounting a local herolib into the container.
# If /opt/herolib_mount exists, we use that; otherwise we use the cloned /opt/herolib
rm -f /root/.vmodules/freeflowuniverse/herolib
if [ -d "/opt/herolib_mount" ]; then
ln -s /opt/herolib_mount/lib /root/.vmodules/incubaid/herolib
cd /opt/herolib_mount
else
ln -s /opt/herolib/lib /root/.vmodules/incubaid/herolib
cd /opt/herolib
git fetch
git checkout "${HEROLIB_REF:-development}"
git pull
fi
# Build hero CLI once so it's available as /bin/hero
cd cli
echo "Building hero..."
v -enable-globals hero.v > build.log 2>&1 || (cat build.log && exit 1)
ln -s "$(realpath hero)" /bin/hero
cd /root
# If a command was provided to `docker run`, execute it as-is.
if [ "$#" -gt 0 ]; then
exec "$@"
else
# No command passed → give an interactive shell
exec bash
fi