Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

191 test khiopspydev docker images before pushing them to the registry #226

Conversation

popescu-v
Copy link
Collaborator

closes #191

@popescu-v popescu-v added this to the 10.2.3.0 milestone Aug 7, 2024
@popescu-v popescu-v linked an issue Aug 7, 2024 that may be closed by this pull request
@popescu-v popescu-v force-pushed the 191-test-khiopspydev-docker-images-before-pushing-them-to-the-registry branch 2 times, most recently from f1018d5 to d82e70e Compare August 7, 2024 18:17
@popescu-v popescu-v self-assigned this Aug 8, 2024
@tramora
Copy link
Collaborator

tramora commented Aug 19, 2024

If I understood well, the docker image for dev will be still named (and tagged) this way :

khiopspydev-<OS among ubuntu22.04 and rocky9>:<khiops revision>.<image revision, number starting from 0>

If the image is built against the dev or main git branches an additional "latest" tag is set

It seems that the image revision is set manuallly by the user. There may be a risk that 2 users set the same image revision and thus overwrite the image. But it may be an acceptable risk.

@popescu-v
Copy link
Collaborator Author

If I understood well, the docker image for dev will be still named (and tagged) this way :

khiopspydev-<OS among ubuntu22.04 and rocky9>:<khiops revision>.<image revision, number starting from 0>

If the image is built against the dev or main git branches an additional "latest" tag is set

It seems that the image revision is set manuallly by the user. There may be a risk that 2 users set the same image revision and thus overwrite the image. But it may be an acceptable risk.

Yes, IMHO it is an acceptable risk. Otherwise, we would need a different mechanism for ensuring no override occurs, e.g. use the commit hash in / as the image revision part of the Docker image tag (less readable)?

.github/workflows/api-docs.yml Outdated Show resolved Hide resolved
.github/workflows/dev-docker.yml Outdated Show resolved Hide resolved
.github/workflows/api-docs.yml Outdated Show resolved Hide resolved
.github/workflows/dev-docker.yml Outdated Show resolved Hide resolved
.github/workflows/pip.yml Outdated Show resolved Hide resolved
@popescu-v popescu-v force-pushed the 191-test-khiopspydev-docker-images-before-pushing-them-to-the-registry branch 2 times, most recently from 64ea4c6 to 0aeb5ce Compare August 22, 2024 15:24
- don't push image to GH registry by default
- use versioning for the Docker image
- drop the `test` job for the Docker images: Khiops packages are tested upstream
- add 'latest' Docker tag to image if on `dev` or `main` branches
To this end, add separate development Docker image tag output.
Indeed, `env` is not accessible in the `image` context, because it's not
in a step (see
https://docs.github.com/en/actions/writing-workflows/choosing-what-your-workflow-does/contexts#env-context).
The `maison` dependency just had a new 2.0 release with breaking changes
(https://github.com/dbatten5/maison/releases/tag/v2.0.0) which break
yamlfix (see lyz-code/yamlfix#286).
@popescu-v popescu-v force-pushed the 191-test-khiopspydev-docker-images-before-pushing-them-to-the-registry branch from 0aeb5ce to 184b9d3 Compare August 22, 2024 15:47
Indeed, `.feature_evaluated_importances` is a 1-D array with one scalar
(the level) per feature.

Note: this is launched as a test only when "long" unit tests are enabled.
@popescu-v popescu-v merged commit 81a7415 into dev Aug 23, 2024
31 checks passed
@popescu-v popescu-v deleted the 191-test-khiopspydev-docker-images-before-pushing-them-to-the-registry branch August 23, 2024 11:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Improve Development Docker Image Build Workflow
3 participants