-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Publish tags that can be consumed by dependabot #33
Comments
@wuan, does this make sense to you? |
We selected the |
Thanks you for feedback @wuan
It makes sense indeed. Maybe Dependabot will not mind if we keep using this format. I'll try.
That's a bit the point here, there was a few updates we did not yet propagated downstream:
And we can expect more (also by design since #29):
I don't mind keep it manual, but automation with something like gtihub-tag action might save us some time in the mid term already. Said otherwise: do you (or anyone else) see any strong reason I would have missed to keep it manual? |
I've made a test elsewhere, and dependabot fails to find updates based on hash for sure:
Manual or not, I propose to use a semver like |
That should be fine. |
At the end, my tests have shown that Dependabot is dealing correctly with
Thus, the only reason left to use semver is the automation because I suspect it will likely be much easier to automatically bump In the meantime, I've found an other annoying problem to consume thos tags downstream: no support for docker-compose (yet)! |
I think I've missed something there: I bet it will not work for Anyway, semver is likely a better choice... If we do something with Dependabot... |
Just FYI, but that's usually called "CalVer" (i.e versions like 23.5.0 -- as magic-folder uses too) see https://calver.org/ |
I've remove the automation part in the title of the issue as it was secondary. The most important part is to produce tags that can be consume by other processes downstream, starting with dependabot. Though, once we manually publish one of those new tag (CalVer likely), we will have to pay attention to not brake those downstream process. This is where the automation could help I guess... I believe the first new tag will have to be manual anyway.
This should put us on the right path and allow us to verify how to automatically bump those version downstream. Though I'm kind of sad we do not see anything about the upstream version here.
Although hard to test if this will work as I expect because I'm not allowed to delete a wrong tag in Docker Hub (if that's even possible)! Let's make some baby steps I guess. |
I've just pushed 23.2.0 (logs), which did overwrite the latest (as expected from reading the workflow). Note for later: we could save some build time if the tag were automatically released (not re-building the images twice). |
Also, as for now the digests differs between the images published from main branch and from the tag. I believe that automating the release when merging PR into the main branch is the only way we could avoid duplication. |
Anyway: I'm now testing if those tags can be consume downstream by dependabot as expected. |
Looks good:
|
I'd better update the documentation! |
I now have access to the Docker account and I've re-published 'real' tags for But this does not seem to prevent Dependabot to propose PR for older version:
Likely because from a SemVer point of view |
I do not see how/what to update after all. |
In order to fix the SemVer issue, I've manually tagged a few older versions and remove those last ones from Docker Hub:
I've also remove any every non-release tag released before #28 This repository should now be ready to be easily bumped from downstream. |
There is already an issue to improve the documentation (via the overview in Dokcer Hub): |
As today, merging pull request in main branch triggers the publication of the images in Docker Hub based on the short revision hash (e.g: 220a007 ->
220a007
, then d38de20 ->d38de20
).However, our downstream project relies on tags which are created manually (e.g.: 220a007 =
20230214-1
).I believe that once created, pushing the tag triggers the delivery jobs once more to deliver the image in Docker Hub (e.g.:
20230214-1
).Thus we can end up in the current situation where we had a few image updates published on Docker Hub, but w/o the proper tag to be consumed by downstream (e.g.: d006725 !=
20230215-1
)!Maybe there is a good reason for this. But I don't see any.
In addition, it might be required for those tags to be semantically formatted (semver) in order to be consumed downstream by dependabot.
The text was updated successfully, but these errors were encountered: