-
Notifications
You must be signed in to change notification settings - Fork 528
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
allow to sign apt debians #16370
base: compatible
Are you sure you want to change the base?
allow to sign apt debians #16370
Conversation
f931623
to
1f93250
Compare
!ci-build-me |
!ci-nightly-me |
This reverts commit 3c7d449.
b3b6b9b
to
75ce224
Compare
!ci-build-me |
!ci-nightly-me |
Nightly are failing due to develop conflict. When this will be resolved nightly will reach teardown phase and I can prove that publishing is still working good |
I think this is a good opportunity to take a moment to figure out a way to test this kind of PRs i.e., those involving the publishing of container images and Debians, or Post Tear Down, in general. As these are moved to the "Tear Down" phase, which is not started unless ALL previous Jobs pass; CI does not really perform a test of the involved code if there are conflicts with At this moment, we would only be able to test ANY change to the publishing phase "after the fact" i.e., merging. I want to call attention to this and maybe discuss a path for testing "Post Tear Down" Jobs. What do you think? @dkijania |
@SanabriaRusso Good point.From one side, merges checks are really useful as they help us distribute effort of merging compatible/develop to master way before we need it. From other side they are a bit painful as we need to create separate PR and molest reviews for approvals. In this particular PR is tested my code on another pipeline which was tear down only. I modified my code so it always wanted to publish already built debians from nightly. Once it was ok. I ran nightly. I agree that it is not really fun testing such pr but they are not very frequent. However, moving merges into separate group and work more on more tailored pipeline IMHO is a good direction alone |
Another PR ss part of grand debian repo improvment plan:
notion.so/o1labs/Enterprise-debian-repository-118e79b1f91080cc98cddb337347413a
In order to leverage security of our debian repository we should allow to sign our packages. This PR introduces optional sign operation when uploading debians to debian repo. Currently it is disabled, not to break current process