-
Notifications
You must be signed in to change notification settings - Fork 6.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CI require a 'lgtm' or 'ok-to-test' labels to run #11251
Conversation
71b39f6
to
95b5207
Compare
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ant31 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Is that going to work for the following :
|
7506379
to
94fa505
Compare
yes Created this PR first to check if the labels are published and can be used for rules. |
/hold |
/ok-to-test |
- Require a 'lgtm' or 'ok-to-test' label for running CI after the moderator stage Signed-off-by: ant31 <2t.antoine@gmail.com>
/assign @VannTen The pipeline is retried automatically when the labels "lgtm" or "ok-to-test" are applied |
/unhold |
The pipeline is retried automatically when the labels "lgtm" or "ok-to-test" are applied
otherwise it will be blocked at the moderator stage.
Maybe it should be `has: lgtm or not(has:needs-ok-to-test)` otherwise it would block CI for org members right ?
|
Also, should we skip CI for `do-not-merge/work-in-progress` ? That's what prow does but we don't necessarily need to do the same.
|
Org member can apply themselve ok-to-test, why would it block CI ?
I think it's fine, the ok-to-test is explicit, you either have it applied or not. |
I suggest we give it a try and chant it quickly if something is not working or annoying. |
Fine by me, that was mainly for consistency with the rest of kubernetes-sigs where the ok-to-test is implicit for org-members. |
@VannTen, yes, it has always been the case. To fix that, failfast-ci would have to 'fail' the sync before and not trigger the pipeline at all, which is doable. |
> What happens if a PR modify the .gitlab-ci.yml
@VannTen, yes, it has always been the case.
To fix that, failfast-ci would have to 'fail' the sync before and not trigger the pipeline at all, which is doable.
Ideally that would happen only if any of the ci files is modified.
Ok, let's go with this and keep that for later, 👍
/lgtm
|
your /lgtm has triggered the pipeline -_- . I'll try to fix that in a follow-up to not run twice( one for ok-to-test, one for lgtm) |
…1251) - Require a 'lgtm' or 'ok-to-test' label for running CI after the moderator stage Signed-off-by: ant31 <2t.antoine@gmail.com>
…1251) - Require a 'lgtm' or 'ok-to-test' label for running CI after the moderator stage Signed-off-by: ant31 <2t.antoine@gmail.com>
What type of PR is this?
/kind cleanup
What this PR does / why we need it:
To stop running 'expensive' CI on all PR without a maintainer review.