Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[9.99.x-prod] remove not productized artifacts from kogito-bom #16

Merged
merged 2 commits into from
Feb 6, 2024

Conversation

rgdoliveira
Copy link
Member

This change is required for OSL 1.32 as there is no upstream release in community.

We usually keep the artifacts that are not productized in the BOM with their upstream version, but for this case it is not possible, hence removing them.

How to replicate CI configuration locally?

Build Chain tool does "simple" maven build(s), the builds are just Maven commands, but because the repositories relates and depends on each other and any change in API or class method could affect several of those repositories there is a need to use build-chain tool to handle cross repository builds and be sure that we always use latest version of the code for each repository.

build-chain tool is a build tool which can be used on command line locally or in Github Actions workflow(s), in case you need to change multiple repositories and send multiple dependent pull requests related with a change you can easily reproduce the same build by executing it on Github hosted environment or locally in your development environment. See local execution details to get more information about it.

How to retest this PR or trigger a specific build:
  • for pull request checks
    Please add comment: Jenkins retest this

  • for a specific pull request check
    Please add comment: Jenkins (re)run [kogito-runtimes|kogito-apps|kogito-examples] tests

  • for quarkus branch checks
    Run checks against Quarkus current used branch
    Please add comment: Jenkins run quarkus-branch

  • for a quarkus branch specific check
    Run checks against Quarkus current used branch
    Please add comment: Jenkins (re)run [kogito-runtimes|kogito-apps|kogito-examples] quarkus-branch

  • for quarkus main checks
    Run checks against Quarkus main branch
    Please add comment: Jenkins run quarkus-main

  • for a specific quarkus main check
    Run checks against Quarkus main branch
    Please add comment: Jenkins (re)run [kogito-runtimes|kogito-apps|kogito-examples] quarkus-main

  • for quarkus lts checks
    Run checks against Quarkus lts branch
    Please add comment: Jenkins run quarkus-lts

  • for native checks
    Run native checks
    Please add comment: Jenkins run native

  • for a specific native check
    Run native checks
    Please add comment: Jenkins (re)run [kogito-runtimes|kogito-apps|kogito-examples] native

How to backport a pull request to a different branch?

In order to automatically create a backporting pull request please add one or more labels having the following format backport-<branch-name>, where <branch-name> is the name of the branch where the pull request must be backported to (e.g., backport-7.67.x to backport the original PR to the 7.67.x branch).

NOTE: backporting is an action aiming to move a change (usually a commit) from a branch (usually the main one) to another one, which is generally referring to a still maintained release branch. Keeping it simple: it is about to move a specific change or a set of them from one branch to another.

Once the original pull request is successfully merged, the automated action will create one backporting pull request per each label (with the previous format) that has been added.

If something goes wrong, the author will be notified and at this point a manual backporting is needed.

NOTE: this automated backporting is triggered whenever a pull request on main branch is labeled or closed, but both conditions must be satisfied to get the new PR created.

@rgdoliveira rgdoliveira requested a review from domhanak February 5, 2024 13:55
@domhanak
Copy link

domhanak commented Feb 6, 2024

@gmunozfe cc

Copy link

@domhanak domhanak left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks reasonable, could we try the pr checks please? :)

kogito-bom/pom.xml Outdated Show resolved Hide resolved
Comment on lines 734 to 735
<dependency>
<groupId>org.kie.kogito</groupId>
<artifactId>kogito-addons-monitoring-elastic</artifactId>
<artifactId>kogito-drools</artifactId>
<version>${project.version}</version>
</dependency>
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

kogito-drools sources are not present, is it fine?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I guess so, it is like this in upstream.

<dependency>
<groupId>org.kie.kogito</groupId>
<artifactId>kogito-addons-quarkus-events-mongodb-deployment</artifactId>
<artifactId>kogito-quarkus-workflow-common</artifactId>
<version>${project.version}</version>
<classifier>sources</classifier>
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

To keep coherence, sources could be added below, wdyt?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yeah, for this case the sources are defined before, I would say it should be changed the order in upstream

<version>${project.version}</version>
</dependency>
<dependency>
<groupId>org.kie.kogito</groupId>
<artifactId>kogito-addons-springboot-events-mongodb</artifactId>
<artifactId>kogito-quarkus-workflow-common-deployment</artifactId>
<version>${project.version}</version>
<classifier>sources</classifier>
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same here

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yeah, for this case the sources are defined before, I would say it should be changed the order in upstream

<groupId>org.kie.kogito</groupId>
<artifactId>kogito-addons-quarkus-process-management-deployment</artifactId>
<artifactId>kogito-quarkus-serverless-workflow-deployment</artifactId>
<version>${project.version}</version>
</dependency>
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Missing sources for this artifact

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

good point, this would need to be fixed in upstream too, but I guess not a blocker.

kogito-bom/pom.xml Outdated Show resolved Hide resolved
kogito-bom/pom.xml Outdated Show resolved Hide resolved
@rgdoliveira
Copy link
Member Author

rgdoliveira commented Feb 6, 2024

I pushed a commit removing the not wanted jar type in the pom that was added by mistake

@rgdoliveira
Copy link
Member Author

Looks reasonable, could we try the pr checks please? :)

I believe this should be fixed by kiegroup/kogito-pipelines#20

@rgdoliveira
Copy link
Member Author

@domhanak for the current failure related to org.kie.kogito:kogito-quarkus-deployment:pom:9.99.0 was not found, it should be fixed by #18

@rgdoliveira
Copy link
Member Author

rgdoliveira commented Feb 6, 2024

I just rebased this PR, fingers crossed it will be green now

@rgdoliveira rgdoliveira merged commit 65e225f into kiegroup:9.99.x-prod Feb 6, 2024
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants