-
Notifications
You must be signed in to change notification settings - Fork 479
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Move cargo-deny into a separate workflow on a schedule #10289
base: main
Are you sure you want to change the base?
Conversation
6e2aa6a
to
f83d74a
Compare
7403 tests run: 7017 passed, 0 failed, 386 skipped (full report)Flaky tests (3)Postgres 16
Postgres 15
Code coverage* (full report)
* collected from Rust tests only The comment gets automatically updated with the latest test results
ae45eff at 2025-01-24T10:04:38.828Z :recycle: |
Great idea! We should probably talk about which team needs to ensure a "healthy" cargo-deny state, should it fail.
note that the the compute image includes rust components as well. Both postgres plugins written in Rust (which are built via git clone + cargo build, so are not managed by the Cargo.lock in this repo), as well as stuff from the |
95947bc
to
bf20692
Compare
.github/workflows/cargo-deny.yml
Outdated
on: | ||
pull_request: | ||
paths: | ||
- 'Cargo.lock' | ||
schedule: | ||
- cron: '0 0 * * *' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For PRs we don't want to have a separate workflow, but rather explicitly call a reusable workflow from the build_and_test
workflow, reasoning is here:
neon/.github/workflows/build_and_test.yml
Lines 1257 to 1265 in 7d4bfcd
# This job simplifies setting branch protection rules (in GitHub UI) | |
# by allowing to set only this job instead of listing many others. | |
# It also makes it easier to rename or parametrise jobs (using matrix) | |
# which requires changes in branch protection rules | |
# | |
# Note, that we can't add external check (like `neon-cloud-e2e`) we still need to use GitHub UI for that. | |
# | |
# https://github.com/neondatabase/neon/settings/branch_protection_rules | |
conclusion: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This makes the bit of filtering it to Cargo.lock
changes a bit more complex, but is still doable. In some places we use tj-actions/changed-files
(4 results), in others we use dorny/paths-filter
(18 results). Should we standardize on one action for this?
72f54d9
to
b31ed90
Compare
https://github.com/neondatabase/neon/actions/runs/12931148735/job/36064437643?pr=10289 did not run cargo-deny, and https://github.com/neondatabase/neon/actions/runs/12931246215/job/36064743303?pr=10289 did. Should I remove the anyhow bump again? |
48e22c5
to
ae45eff
Compare
Problem
There are two (related) problems with the previous handling of
cargo-deny
:Summary of changes
We split out
cargo-deny
into a separate workflow that runs on all PRs that touchCargo.lock
, and on a schedule onmain
,release
,release-compute
andrelease-proxy
to find new advisories.