Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[incubator-kie-issues#1783] Excluding kogito-quarkus-test-utils from integration-tests-jobs-service-common #2182

Merged
merged 3 commits into from
Feb 6, 2025

Conversation

gitgabrio
Copy link
Contributor

Fixes apache/incubator-kie-issues#1783

Needed by apache/incubator-kie-kogito-runtimes#3834

This PR excludes kogito-quarkus-test-utils from integration-tests-jobs-service-common to avoid version misalignment and consequent method not found exception

How to replicate CI configuration locally?

Build Chain tool does "simple" maven build(s), the builds are just Maven commands, but because the repositories relates and depends on each other and any change in API or class method could affect several of those repositories there is a need to use build-chain tool to handle cross repository builds and be sure that we always use latest version of the code for each repository.

build-chain tool is a build tool which can be used on command line locally or in Github Actions workflow(s), in case you need to change multiple repositories and send multiple dependent pull requests related with a change you can easily reproduce the same build by executing it on Github hosted environment or locally in your development environment. See local execution details to get more information about it.

How to retest this PR or trigger a specific build:
  • for pull request checks
    Please add comment: Jenkins retest this

  • for a specific pull request check
    Please add comment: Jenkins (re)run [kogito-apps|kogito-examples] tests

  • for quarkus branch checks
    Run checks against Quarkus current used branch
    Please add comment: Jenkins run quarkus-branch

  • for a quarkus branch specific check
    Run checks against Quarkus current used branch
    Please add comment: Jenkins (re)run [kogito-apps|kogito-examples] quarkus-branch

  • for quarkus main checks
    Run checks against Quarkus main branch
    Please add comment: Jenkins run quarkus-main

  • for a specific quarkus main check
    Run checks against Quarkus main branch
    Please add comment: Jenkins (re)run [kogito-apps|kogito-examples] quarkus-main

  • for quarkus lts checks
    Run checks against Quarkus lts branch
    Please add comment: Jenkins run quarkus-lts

  • for a specific quarkus lts check
    Run checks against Quarkus lts branch
    Please add comment: Jenkins (re)run [kogito-apps|kogito-examples] quarkus-lts

  • for native checks
    Run native checks
    Please add comment: Jenkins run native

  • for a specific native check
    Run native checks
    Please add comment: Jenkins (re)run [kogito-apps|kogito-examples] native

  • for native lts checks
    Run native checks against quarkus lts branch
    Please add comment: Jenkins run native-lts

  • for a specific native lts check
    Run native checks against quarkus lts branch
    Please add comment: Jenkins (re)run [kogito-apps|kogito-examples] native-lts

How to backport a pull request to a different branch?

In order to automatically create a backporting pull request please add one or more labels having the following format backport-<branch-name>, where <branch-name> is the name of the branch where the pull request must be backported to (e.g., backport-7.67.x to backport the original PR to the 7.67.x branch).

NOTE: backporting is an action aiming to move a change (usually a commit) from a branch (usually the main one) to another one, which is generally referring to a still maintained release branch. Keeping it simple: it is about to move a specific change or a set of them from one branch to another.

Once the original pull request is successfully merged, the automated action will create one backporting pull request per each label (with the previous format) that has been added.

If something goes wrong, the author will be notified and at this point a manual backporting is needed.

NOTE: this automated backporting is triggered whenever a pull request on main branch is labeled or closed, but both conditions must be satisfied to get the new PR created.

Quarkus-3 PR check is failing ... what to do ? The Quarkus 3 check is applying patches from the `.ci/environments/quarkus-3/patches`.

The first patch, called 0001_before_sh.patch, is generated from Openrewrite .ci/environments/quarkus-3/quarkus3.yml recipe. The patch is created to speed up the check. But it may be that some changes in the PR broke this patch.
No panic, there is an easy way to regenerate it. You just need to comment on the PR:

jenkins rewrite quarkus-3

and it should, after some minutes (~20/30min) apply a commit on the PR with the patch regenerated.

Other patches were generated manually. If any of it fails, you will need to manually update it... and push your changes.

…integration-tests-jobs-service-common to avoid version misalignment and consequent method not found exception
Copy link
Contributor

@fjtirado fjtirado left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Im wondering why kogito-quartus-test-utils is on integration-test-jobs-service-common, but I guess you already look at that and is difficult to solve

@gitgabrio
Copy link
Contributor Author

gitgabrio commented Jan 30, 2025

Im wondering why kogito-quartus-test-utils is on integration-test-jobs-service-common, but I guess you already look at that and is difficult to solve

Hi @fjtirado TBH it was a surprise to find it in the hierarchy of a springboot module.
Since this PR is part of springboot upgrade, that is required to fix a bunch of CVEs, I did not look inside the integration-test-jobs-service-common pom itself (and its usage)
I'm afraid it is just that a dependency has been inserted too high in the dependency tree, but I'm also afraid that starting modify the integration-test-jobs-service-common module would bring in other issues 🤔
Probably is worth a separated ticket: wdyt ?

@pefernan @yesamer @baldimir FYI ^^

@fjtirado
Copy link
Contributor

Yes, I agree, lets open a new ticket. Ill to find time to work on it, because its weird.

@pefernan
Copy link
Contributor

I don't have the context, but this looks like a misconfiguration just to have that dep in a quarkus common module without being aware that it was also used on a springboot... but just a guess.

@kie-ci3
Copy link
Contributor

kie-ci3 commented Jan 30, 2025

PR job #1 was: UNSTABLE
Possible explanation: This should be test failures

Reproducer

build-chain build full_downstream -f 'https://raw.githubusercontent.com/${AUTHOR:apache}/incubator-kie-kogito-pipelines/${BRANCH:main}/.ci/buildchain-config-pr-cdb.yaml' -o 'bc' -p apache/incubator-kie-kogito-apps -u #2182 --skipParallelCheckout

NOTE: To install the build-chain tool, please refer to https://github.com/kiegroup/github-action-build-chain#local-execution

Please look here: https://ci-builds.apache.org/job/KIE/job/kogito/job/main/job/pullrequest_jobs/job/kogito-apps-pr/job/PR-2182/1/display/redirect

Test results:

  • PASSED: 1809
  • FAILED: 2

Those are the test failures:

org.kie.kogito.index.ProcessDataIndexMongoDBIT.testProcessInstanceEvents 1 expectation failed.
JSON path data.UserTaskInstances[0].potentialGroups[0] doesn't match.
Expected: managers
Actual: null
org.kie.kogito.it.trusty.SpringBootTrustyExplainabilityEnd2EndIT.doTest Container startup failed for image org.kie.kogito/integration-tests-trusty-service-springboot:999-SNAPSHOT

@gitgabrio
Copy link
Contributor Author

Jenkins failure due to unrelated cause.

See https://issues.apache.org/jira/browse/INFRA-26506
@jstastny-cz

@gitgabrio gitgabrio merged commit 8746a1a into apache:main Feb 6, 2025
5 of 6 checks passed
@gitgabrio gitgabrio deleted the incubator-kie-issues#1783 branch February 6, 2025 10:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Upgrade springboot version
6 participants