From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.3 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 02400C433DB for ; Tue, 16 Feb 2021 12:45:10 +0000 (UTC) Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 56A3161606 for ; Tue, 16 Feb 2021 12:45:09 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 56A3161606 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=redhat.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Received: from localhost ([::1]:52148 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1lBzj2-0002B9-5C for qemu-devel@archiver.kernel.org; Tue, 16 Feb 2021 07:45:08 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]:52292) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1lBziB-0001m7-Dn for qemu-devel@nongnu.org; Tue, 16 Feb 2021 07:44:15 -0500 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:20568) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.90_1) (envelope-from ) id 1lBzi8-0007MT-Kj for qemu-devel@nongnu.org; Tue, 16 Feb 2021 07:44:14 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1613479450; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=sA6P+JZaiqRNAVohG3uEWRKdgkremKdc1mvtSSRshRk=; b=EnxpT1lGuSksJt3y7vPgM4H8hjNjQkeNqE2esTMO0ecuoTOW9AVZUMlDGOhDF+rKhWe4yF IaClAIbXe/UdcEOl7LuNC1+zb2UXlAD689I2ycwwYq4gZpLL3PMXR3KLYfWYttlqTmPecF tehg84i7LMNnkMSmlJQvODyAKRZKds8= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-93-AHIlNqQ_PrKJZ0dWtwZItw-1; Tue, 16 Feb 2021 07:44:03 -0500 X-MC-Unique: AHIlNqQ_PrKJZ0dWtwZItw-1 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 85906C290; Tue, 16 Feb 2021 12:44:02 +0000 (UTC) Received: from redhat.com (ovpn-112-215.ams2.redhat.com [10.36.112.215]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 63B971981B; Tue, 16 Feb 2021 12:43:57 +0000 (UTC) Date: Tue, 16 Feb 2021 12:43:54 +0000 From: Daniel =?utf-8?B?UC4gQmVycmFuZ8Op?= To: Thomas Huth , Alex =?utf-8?Q?Benn=C3=A9e?= , Philippe =?utf-8?Q?Mathieu-Daud=C3=A9?= , qemu-devel@nongnu.org, Wainer dos Santos Moschetta Subject: Re: [PATCH 1/3] gitlab: always build container images Message-ID: References: <20210208163339.1159514-1-berrange@redhat.com> <20210208163339.1159514-2-berrange@redhat.com> <20210209095829.GC1166421@redhat.com> <20210210111700.GE1240644@redhat.com> MIME-Version: 1.0 In-Reply-To: <20210210111700.GE1240644@redhat.com> User-Agent: Mutt/2.0.5 (2021-01-21) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=berrange@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit Received-SPF: pass client-ip=216.205.24.124; envelope-from=berrange@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -27 X-Spam_score: -2.8 X-Spam_bar: -- X-Spam_report: (-2.8 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: Daniel =?utf-8?B?UC4gQmVycmFuZ8Op?= Errors-To: qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Sender: "Qemu-devel" On Wed, Feb 10, 2021 at 11:17:00AM +0000, Daniel P. Berrangé wrote: > On Tue, Feb 09, 2021 at 09:58:29AM +0000, Daniel P. Berrangé wrote: > > On Tue, Feb 09, 2021 at 07:37:51AM +0100, Thomas Huth wrote: > > > On 08/02/2021 17.33, Daniel P. Berrangé wrote: > > > [...] > > > > For example, consider pushing 5 commits, one of which contains a > > > > dockerfile change. This will trigger a CI pipeline for the > > > > containers. Now consider you do some more work on the branch and push 3 > > > > further commits, so you now have a branch of 8 commits. For the second > > > > push GitLab will only look at the 3 most recent commits, the other 5 > > > > were already present. Thus GitLab will not realize that the branch has > > > > dockerfile changes that need to trigger the container build. > > > > > > > > This can cause real world problems: > > > > > > > > - Push 5 commits to branch "foo", including a dockerfile change > > > > > > > > => rebuilds the container images with content from "foo" > > > > => build jobs runs against containers from "foo" > > > > > > > > - Refresh your master branch with latest upstream master > > > > > > > > => rebuilds the container images with content from "master" > > > > => build jobs runs against containers from "master" > > > > > > > > - Push 3 more commits to branch "foo", with no dockerfile change > > > > > > > > => no container rebuild triggers > > > > => build jobs runs against containers from "master" > > > > > > > > The "changes" conditional in gitlab is OK, *provided* your build > > > > jobs are not relying on any external state from previous builds. > > > > > > > > This is NOT the case in QEMU, because we are building container > > > > images and these are cached. This is a scenario in which the > > > > "changes" conditional is not usuable. > > > > > > > > The only other way to avoid this problem would be to use the git > > > > branch name as the container image tag, instead of always using > > > > "latest". > > > I'm basically fine with your patch, but let me ask one more thing: Won't we > > > still have the problem if the user pushes to different branches > > > simultaneously? E.g. the user pushes to "foo" with changes to dockerfiles, > > > containers start to get rebuild, then pushes to master without waiting for > > > the previous CI to finish, then the containers get rebuild from the "master" > > > job without the local changes to the dockerfiles. Then in the "foo" CI > > > pipelines the following jobs might run with the containers that have been > > > built by the "master" job... > > > > Yes, this is the issue I describe in the cover letter. > > > > > So if we really want to get it bulletproof, do we have to use the git branch > > > name as the container image tag? > > > > That is possible, but I'm somewhat loathe to do that, as it means the > > container registry in developers forks will accumulate a growing list > > of image tags. I know gitlab will force expire once it gets beyond a > > certain number of tags, but it still felt pretty wasteful of space > > to create so many tags. > > > > Having said that, maybe this is not actually wasteful if we always > > use the "master" as a cache for docker, then the "new" images we > > build on each branch will just re-use existing docker layers and > > thus not add to disk usage. We'd only see extra usage if the branch > > contained changes to dockerfiles. > > The challenge here is that I need the docker tag name to be in an env > variable in the gitlab-ci.yml file. > > I can directly use $CI_COMMIT_REF_NAME to get the branch name but > the list of valid characters for a git branch is way more permissive > than valid characters for a docker tag. > > So we need to filter the git branch name to form a valid docker tag, > and AFAICT, there's no way todo that when setting a global env variable > in the gitlab-ci.yml. I can only do filtering once in the before_script: > stage, and that's too late to use it in the image name for the job. I've thought of a solution here. We can tag the images with $CI_COMMIT_SHORT_SHA , and the build jobs can reference them with image: $CI_REGISTRY_IMAGE/qemu/$IMAGE:$CI_COMMIT_SHORT_SHA In the continer build script, we then *also* tag them with a sanitized version of $CI_COMMIT_REF_NAME, and also use this as the cache to pull from when building the image. The main downside here is that we'll end up creating alot of tags, but most will have the same content so shouldn't be too bad. Regards, Daniel -- |: https://berrange.com -o- https://www.flickr.com/photos/dberrange :| |: https://libvirt.org -o- https://fstop138.berrange.com :| |: https://entangle-photo.org -o- https://www.instagram.com/dberrange :|