Fix secure image build to require single approval for all node types#8522
Conversation
Dependency Review✅ No vulnerabilities or license issues or OpenSSF Scorecard issues found.Snapshot WarningsEnsure that dependencies are being submitted on PR branches and consider enabling retry-on-snapshot-warnings. See the documentation for more information and troubleshooting advice. Scanned FilesNone |
📝 WalkthroughWalkthroughThe pull request removes the Changes
Estimated code review effort🎯 1 (Trivial) | ⏱️ ~2 minutes Poem
🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches📝 Generate docstrings
🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
Codecov Report✅ All modified and coverable lines are covered by tests. 📢 Thoughts on this report? Let us know! |
|
tested on this build: https://github.com/onflow/flow-go/actions/runs/24105973354, working as expected, one approval kicks off the build for all node types. |
This workflow used to work in a way that presented approval for all private image builds (all node types). Now it only presents one image build approval and we must wait until the build is finished and only then we can approve another image, so this makes this very slow and painful, requiring multiple approvals for all node types.
Likely root-cause was: 32fae53#diff-28c4d7956687a734acfd9629ddffb1a980c1228b92364743dfc80e08db2fc398R127 - this PR reverts the introduction of
max-parallel: 1parameter for secure build.When max-parallel: 1 is set on a matrix job that also has an environment: gate, GitHub Actions processes matrix instances sequentially — each instance arrives at the environment's required-reviewer gate in isolation, triggering a separate approval prompt. With 6 roles in the matrix, this produced 6 sequential approvals instead of one.
Removing max-parallel: 1 allows all matrix instances to start simultaneously. Since they all target the same secure builds environment, GitHub batches them into a single approval request.
Summary by CodeRabbit