-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable Auto-Release for these images #283
Comments
Isn't it 3? PR build as well? |
I exclude this cases for 2 reasons:
|
They should be trusted at the point of merge though? i.e the last build? It's always something we've struggled a bit with, we waste a lot of time rebuilding something that was fine at the point of merge.
Assuming an up-to-date merge, would be a promotion case on master, if there was an up-to-date build that passed. |
Yep same. With "simple" Docker images or binaries on tiny projects, no problem. But here, not only we have VM images (heavy artifacts, not always downloadable so hard to stage: case of AMIs), but also cross-regions replications as part of the build, and a really heterogeneous set of "artifacts publication" (Azure, AWS and now Docker images). That's why the "optimisation" is scoped to a single trust area:
yep, assuming is the word that perfectly summarize the problem we had and have on this particular repository :D |
Problem: this build takes almost 1 hour to complete. When releasing a new version, we have to build at least 2 times: once on the
main
branch (which has thebuild_type
variables set to the valuestaging
) triggered by a code push (usually a PR merge) and another time for the release, triggered by the tag creation when publishing the draft "GitHub Release".We would want to avoid deploy often, and as soon as possible:
The text was updated successfully, but these errors were encountered: