Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Let dapendabot to auto-update docker for release 3.4&3.5. #17613

Merged
merged 1 commit into from
Mar 21, 2024

Conversation

liangyuanpeng
Copy link
Contributor

@liangyuanpeng liangyuanpeng commented Mar 19, 2024

Please read https://github.com/etcd-io/etcd/blob/main/CONTRIBUTING.md#contribution-flow.

Now we will automatically upgrade the docker image in the main branch, let's treat release-3.4 and release-3.5 similarly

Releated:

@k8s-ci-robot
Copy link

Hi @liangyuanpeng. Thanks for your PR.

I'm waiting for a etcd-io member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@liangyuanpeng
Copy link
Contributor Author

/cc @jmhbnz

@k8s-ci-robot k8s-ci-robot requested a review from jmhbnz March 19, 2024 02:19
@jmhbnz
Copy link
Member

jmhbnz commented Mar 19, 2024

/ok-to-test

Copy link
Member

@jmhbnz jmhbnz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM - Thanks @liangyuanpeng

Based on my understanding of target-branch dependabot will scan main, detect an update is possible, and then raise a pull request against all three branches which seems like a good approach.

If dependabot is scanning main but opening pr against release-3.5 I am not sure how it will figure out that there are actually 4x Dockerfiles in release-3.5 etc to update but lets give it a try and see what happens.

@liangyuanpeng
Copy link
Contributor Author

If dependabot is scanning main but opening pr against release-3.5 I am not sure how it will figure out that there are actually 4x Dockerfiles in release-3.5 etc to update but lets give it a try and see what happens.

@jmhbnz Thanks for your qulick reply.
I have verifyed in my fork repo and I think i forgot put the test link here, the dependabot will create the PR for release-3.4 and release-3.5,

check:

@jmhbnz
Copy link
Member

jmhbnz commented Mar 19, 2024

I have verifyed in my fork repo and I think i forgot put the test link here, the dependabot will create the PR for release-3.4 and release-3.5,

Brilliant, those pr's look perfect, thanks!

@jmhbnz jmhbnz mentioned this pull request Mar 19, 2024
2 tasks
@ahrtr
Copy link
Member

ahrtr commented Mar 19, 2024

I am not sure whether or not it's a good practice to always automatically bump to the latest version for the stable releases. Probably not. Usually we only bump dependencies for stable releases when there are any CVEs or critical/major bug fixes. The same for base image?

We can let this PR in, but I think we do need to figure out a best practice to bump the base image for the stable releases.

@jmhbnz
Copy link
Member

jmhbnz commented Mar 19, 2024

I am not sure whether or not it's a good practice to always automatically bump to the latest version for the stable releases. Probably not. Usually we only bump dependencies for stable releases when there are any CVEs or critical/major bug fixes. The same for base image?

Good question - Historically we always used latest for image tag which meant our stable releases were always using latest image versions when releases were published. This pull request reduces manual effort for backports to keep using up to date base images, while still retaining reproducible builds via image digests so I think the pr is still a good idea.

@ahrtr
Copy link
Member

ahrtr commented Mar 19, 2024

No strong opinion.

A temporary compromised solution I can think of is to bump the base image version for stable releases monthly instead of weekly, at least we have longer time to verify the base image in workflow before each patch releases.

Signed-off-by: Lan Liang <gcslyp@gmail.com>
@liangyuanpeng liangyuanpeng force-pushed the autoupdate_docker_release branch from 178f409 to 5620268 Compare March 20, 2024 00:34
@liangyuanpeng
Copy link
Contributor Author

Usually we only bump dependencies for stable releases when there are any CVEs or critical/major bug fixes. The same for base image?

Make sense, this PR #17600 have not any CVE problem in the base image.
If there is no CVE problem in the base image, then whether to upgrade the base image of the release branch depends on the release team. If the answer is no, then you only need to close the PR of dapadanbot is enough.

stable releases monthly instead of weekly,

Updated.

Copy link
Member

@ahrtr ahrtr left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

Thanks

@serathius serathius merged commit b2e15d6 into etcd-io:main Mar 21, 2024
39 checks passed
@jmhbnz jmhbnz mentioned this pull request Mar 21, 2024
3 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

Successfully merging this pull request may close these issues.

5 participants