Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[ci][docker] Read docker image tags during CI runs #13572

Merged
merged 1 commit into from
Dec 9, 2022

Conversation

driazati
Copy link
Member

@driazati driazati commented Dec 7, 2022

Hardcoding the Docker images in the Jenkinsfiles has the downside that only trusted changes are actually run in CI. Since Docker image updates are pretty frequent, this makes for a pretty bad UX (e.g. CI runs but doesn't actually test the PR). The fix here makes it so the images are read from a different file during CI execution so updates from anyone are picked up.

This PR eliminates the need to use the batch jobs in Jenkins to update Docker images. Docker images are built as part of post-merge CI on main and anyone can trigger a validation run by filing a PR with changed Docker tags.

@tvm-bot
Copy link
Collaborator

tvm-bot commented Dec 7, 2022

Thanks for contributing to TVM! Please refer to the contributing guidelines https://tvm.apache.org/docs/contribute/ for useful information and tips. Please request code reviews from Reviewers by @-ing them in a comment.

Generated by tvm-bot

Copy link
Contributor

@echuraev echuraev left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for nice improvement! LGTM. One minor question which should not affect on merging this PR.

ci/jenkins/generated/arm_jenkinsfile.groovy Show resolved Hide resolved
@Mousius
Copy link
Member

Mousius commented Dec 7, 2022

@driazati can you rebase this? 😸

@Mousius Mousius self-requested a review December 7, 2022 11:05
@Mousius Mousius self-assigned this Dec 7, 2022
@driazati driazati force-pushed the dyn_docker_updates branch 5 times, most recently from 4aa341c to ff174f6 Compare December 8, 2022 21:29
Hardcoding the Docker images in the Jenkinsfiles has the downside that
only trusted changes are actually run in CI. Since Docker image updates
are pretty frequent, this makes for a pretty bad UX (e.g. CI runs but
doesn't actually test the PR). The fix here makes it so the images are
read from a different file during CI execution so updates from anyone
are picked up.
@driazati driazati merged commit c5b8ab2 into apache:main Dec 9, 2022
fzi-peccia pushed a commit to fzi-peccia/tvm that referenced this pull request Mar 27, 2023
Hardcoding the Docker images in the Jenkinsfiles has the downside that only trusted changes are actually run in CI. Since Docker image updates are pretty frequent, this makes for a pretty bad UX (e.g. CI runs but doesn't actually test the PR). The fix here makes it so the images are read from a different file during CI execution so updates from anyone are picked up.

This PR eliminates the need to use the batch jobs in Jenkins to update Docker images. Docker images are built as part of post-merge CI on `main` and anyone can trigger a validation run by filing a PR with changed Docker tags.
mikeseven pushed a commit to mikeseven/tvm that referenced this pull request Sep 27, 2023
Hardcoding the Docker images in the Jenkinsfiles has the downside that only trusted changes are actually run in CI. Since Docker image updates are pretty frequent, this makes for a pretty bad UX (e.g. CI runs but doesn't actually test the PR). The fix here makes it so the images are read from a different file during CI execution so updates from anyone are picked up.

This PR eliminates the need to use the batch jobs in Jenkins to update Docker images. Docker images are built as part of post-merge CI on `main` and anyone can trigger a validation run by filing a PR with changed Docker tags.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants