-
Notifications
You must be signed in to change notification settings - Fork 13.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Jenkins CI: update containers tag to 2019-01-25 #11295
Conversation
945be37
to
8e11d86
Compare
v4 HW seems to be down. @dagar |
@lamping7 seems like FW test also tends to fail here... |
The failures are awkwardly hard to find a pattern. Sometimes it fails to find |
Are there two containers with the same |
There previous tag was replaced and it was rebuilt with the new PR.
Well they should be. Are we able to clear build cache? Would it make any difference? |
My understanding is that docker checks the tag or label of the image. If it has it, it just uses it. The container wouldn't be used across jobs, but the image would. |
Docker checks the tag and triggers a build for that tag. If you actually delete the tag and then create a tag with the same name, it will trigger a new build of the container, but that time with the latest Dockerfile. So I believe that in Docker Hub you already have the appropriate container built. Now it's a matter of Jenkins get the latest container. |
Yes. That's my point. Jenkins physical machine possibly has the older version of the same tag. |
Ok so to make sure we guarantee the correct container on the machines, we can issue a new tag tomorrow and then update this PR. |
@lamping7 although for the |
Error:
Hmmm.... I had a feeling we'd uncover other things with this move. PS. Isn't it tomorrow where you are? |
This does not influence. That's only related with ROS tfs. The tf gets fixed as soon as MAVROS starts receiving local position from the FCU. Note: That's related with the |
What are all these?
It armed, then 10s later disarmed and never moved. |
@lamping7 the |
Nothing custom. We use MAVROS |
For better granularity and increased flexibility, in |
I moved us away from that a while back when I did cleanup. The point was to not have to maintain it here and keep it simple for users trying to replicate this. I wasn't expecting a breaking change like that. |
It now expects that you send a value to be scaled inside the plugin using the thrust_scaling. Setting it to 1 may work if you are actually sending the values already between 0 and 1. Though, we still need to change it upstream I guess. |
@lamping7 the containers are now fixed. The problem now is on the MAVROS side. And we won't have a release soon regarding that. So should we look into an alternative for now to load custom Note: only fails for the attitude controller. |
MAVROS fix: mavlink/mavros#1161. This should be brought in a minor release, but that's dependent on @vooon. |
@dagar any input on the HW build failure? |
@TSC21 We're sending a 0-1 value (a constant 0.7 actually) here. As for updating the container: We don't need to keep them all back. We can use #11294. How do you feel about me incorporating the container tag change over there (just for .ci/Jenkinsfile-SITL_tests) instead of here? This will let us keep the tag back for just the attitude test for now and show that the PR over there works. |
@lamping7 Sounds good. So let's push #11294 and then I will rebase this one against it so to update the rest of the tags. |
Also I merged mavlink/mavros#1161. This will get in in a further MAVROS release. |
Should we do anything before that's available? |
Why don't we just specify the version of mavros inside the dockerfile? We can choose the version before the breaking change was introduced. |
Superseded |
This brings also a fix on the
ros-kinetic
container by reverting back to Python2.7 and avoid problems with not found dependencies, aspx4tools
.