Message ID | cover-0.2-00000000000-20220421T124225Z-avarab@gmail.com (mailing list archive) |
---|---|
Headers | show |
Series | CI: don't fail OSX tests due to brew v.s. perforce.com mis-match | expand |
On Thu, Apr 21, 2022 at 02:53:50PM +0200, Ævar Arnfjörð Bjarmason wrote: > For the past days we've again had CI failures due to "brew install" > detecting a SHA-256 mismatch when trying to install the perforce Since the only reason why that is a concern is because it aborts the rest of the run and is a recurring problem, wouldn't it be better to tell the script to continue regardless and therefore skip all perforce tests? Sure, there is a window where that integration could be broken which will be only visible once the perforce cask gets fixed and perforce installs again, but wouldn't that be less intrusive and overall safer than the currently proposed change? Carlo
Carlo Marcelo Arenas Belón <carenas@gmail.com> writes: > On Thu, Apr 21, 2022 at 02:53:50PM +0200, Ævar Arnfjörð Bjarmason wrote: >> For the past days we've again had CI failures due to "brew install" >> detecting a SHA-256 mismatch when trying to install the perforce > > Since the only reason why that is a concern is because it aborts the > rest of the run and is a recurring problem, wouldn't it be better to > tell the script to continue regardless and therefore skip all perforce > tests? > > Sure, there is a window where that integration could be broken which > will be only visible once the perforce cask gets fixed and perforce > installs again, but wouldn't that be less intrusive and overall safer > than the currently proposed change? Good suggestion. Care to come up with an alternative patch (or two)? Thanks.
Ævar Arnfjörð Bjarmason <avarab@gmail.com> writes: > Junio: Despite modifying CI stuff this series merges cleanly with > "seen", and has no semantic conflicts with any outstanding CI changes. > > For the past days we've again had CI failures due to "brew install" > detecting a SHA-256 mismatch when trying to install the perforce > package[1]. E.g. "seen" is now failing: https://github.com/git/git/runs/6104156856?check_suite_focus=true Yup, it was something I've been disturbed by and planning to ping folks about if it continued. > This occurrence of this issue will no doubt be fixed within a few days > as the homebrew-cask repository is updated, i.e. this recipe: > https://github.com/Homebrew/homebrew-cask/commits/master/Casks/perforce.rb > > But for our CI usage being this anal about the check isn't worth it, > here's a passing CI run where we simply forced the installation: > ... > Ævar Arnfjörð Bjarmason (2): > CI: run "brew install perforce" without past workarounds > CI: don't care about SHA256 mismatch on upstream "perforce" package I dunno. Does it open us to a new attack vector in some way?
On Thu, Apr 21 2022, Carlo Marcelo Arenas Belón wrote: > On Thu, Apr 21, 2022 at 02:53:50PM +0200, Ævar Arnfjörð Bjarmason wrote: >> For the past days we've again had CI failures due to "brew install" >> detecting a SHA-256 mismatch when trying to install the perforce > > Since the only reason why that is a concern is because it aborts the > rest of the run and is a recurring problem, wouldn't it be better to > tell the script to continue regardless and therefore skip all perforce > tests? > > Sure, there is a window where that integration could be broken which > will be only visible once the perforce cask gets fixed and perforce > installs again, but wouldn't that be less intrusive and overall safer > than the currently proposed change? I tried to answer all of this in the updated v3 CL. Thanks!: https://lore.kernel.org/git/cover-v2-0.3-00000000000-20220422T085958Z-avarab@gmail.com/