-
Notifications
You must be signed in to change notification settings - Fork 59
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add advanced/extended CI for gocql #204
Comments
Summary on current findings:
|
I would say this is relatively rare case, and most change would be in code, or in the tests (i.e. sct)
One option you didn't mentioned, is to ditch github actions, and use Jenkins completely for building the extended CI. |
You forgot to mention that github action does hot have built-in solution to trigger certain workflow based on labels it has. |
Not exactly we can have
And check if the right label is present, if it is not the workflow will be visible as skipped and I think that is acceptable |
In this case every PR will have action result record |
Still better than running it from the other workflow I believe, but maybe as @fruch said it is worth to consider just using Jenkins and that would solve problems with labeling as well |
In the context of labeling Jenkins work identically it not triggered by label, it's checking labels We can do a label condition on a whole workflow, and it won't show on the PR, see the post to pypi on python-driver |
Update about triggering Jenkins job: |
Regarding pull-request trigger and secrets: we did have similar problems in Rust Driver when integrating cargo-semver-checks. You can see the current workflow here: https://github.com/scylladb/scylla-rust-driver/blob/main/.github/workflows/semver_checks.yml The PR that introduced it and comments in the code explain how it works and why it is secure: scylladb/scylla-rust-driver#909 The idea is that we can have several jobs in a workflow (which is triggered by pull-request-target).
They don't have write permissions ( Regarding the testability issue of CI when using pull-request-target: when we need to make some changes to this workflow, we create a branch, let's call it X, in the main repo, with the changes for this workflow, and then make some PR to X from a fork - this PR runs the updated CI. |
@dkropachev We have the PR with first extended-ci test that we can run merged, I am not sure if we want to add more/when? I am just wondering about this umbrella issue, should it be closed or should we add more tasks for future development of extended-ci? What do you think? |
Epic to track activities aiming to make the CI more reliable and efficient.
Tasks
The text was updated successfully, but these errors were encountered: