-
Notifications
You must be signed in to change notification settings - Fork 80
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Setup lts patch #1653
Setup lts patch #1653
Conversation
# NOTE: If you change the QUARKUS_EXTENSIONS value remember to update the scripts/logic/build-quarkus-app.sh too! | ||
# Follow up issue to remove KOGITO_VERSION: https://issues.redhat.com/browse/KOGITO-9270 | ||
- value: kogito-quarkus-serverless-workflow,kogito-addons-quarkus-knative-eventing,smallrye-health,kogito-quarkus-serverless-workflow-devui,kogito-addons-quarkus-source-files,kogito-addons-quarkus-jobs-service-embedded,kogito-addons-quarkus-data-index-inmemory,org.kie.kogito:kogito-addons-quarkus-fabric8-kubernetes-service-catalog:${KOGITO_VERSION},org.kie.kogito:kogito-addons-quarkus-kubernetes:${KOGITO_VERSION} | ||
+ value: kogito-quarkus-serverless-workflow,kogito-addons-quarkus-knative-eventing,smallrye-health,kogito-quarkus-serverless-workflow-devui,kogito-addons-quarkus-source-files,org.kie.kogito:kogito-addons-quarkus-jobs-service-embedded:${KOGITO_VERSION},org.kie.kogito:kogito-addons-quarkus-data-index-inmemory:${KOGITO_VERSION},org.kie.kogito:kogito-addons-quarkus-fabric8-kubernetes-service-catalog:${KOGITO_VERSION},org.kie.kogito:kogito-addons-quarkus-kubernetes:${KOGITO_VERSION} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@spolti just thinking whether we should not have directly this change into the module configuration, aka define all extensions with artifact names
This is because some of them are not existing in Quarkus 2.13 platform and we need to define the whole artifact.
PR job Please look here: https://eng-jenkins-csb-business-automation.apps.ocp-c1.prod.psi.redhat.com/job/KIE/job/kogito/job/main/job/pullrequest/job/kogito-images/1019/display/redirect Console Logs[Pipeline] }Build KIE » kogito » main » pullrequest » kogito-images.build-image PR #1653 - kogito-management-console: https://github.com/kiegroup/kogito-images/pull/1653 completed: UNSTABLE [Pipeline] unstable WARNING: Tests on kogito-management-console seems to have failed [Pipeline] } [Pipeline] // stage [Pipeline] } Build KIE » kogito » main » pullrequest » kogito-images.build-image PR #1653 - kogito-task-console: https://github.com/kiegroup/kogito-images/pull/1653 completed: SUCCESS [Pipeline] } [Pipeline] // stage [Pipeline] } Build KIE » kogito » main » pullrequest » kogito-images.build-image PR #1653 - kogito-s2i-builder: https://github.com/kiegroup/kogito-images/pull/1653 completed: UNSTABLE [Pipeline] unstable WARNING: Tests on kogito-s2i-builder seems to have failed [Pipeline] } [Pipeline] // stage [Pipeline] } [Pipeline] // parallel [Pipeline] } [Pipeline] // script [Pipeline] } [Pipeline] // withEnv [Pipeline] } [Pipeline] // stage [Pipeline] stage [Pipeline] { (Declarative: Post Actions) [Pipeline] script [Pipeline] { [Pipeline] echo [INFO] Clean workspace [Pipeline] cleanWs [WS-CLEANUP] Deleting project workspace... [WS-CLEANUP] Deferred wipeout is used... [WS-CLEANUP] done [Pipeline] echo [INFO] Workspace cleaned [Pipeline] echo [INFO] Cleanup Maven artifacts [Pipeline] sh + rm -rf /home/jenkins/.m2/repository [Pipeline] echo [INFO] .m2/repository cleaned [Pipeline] } [Pipeline] // script [Pipeline] script [Pipeline] { [Pipeline] sh + wget --no-check-certificate -qO - https://eng-jenkins-csb-business-automation.apps.ocp-c1.prod.psi.redhat.com/job/KIE/job/kogito/job/main/job/pullrequest/job/kogito-images/1019/api/json [Pipeline] readJSON [Pipeline] sh |
jenkins retest this |
Hey @radtriste the patch itself looks good to me but I fear it could be hard to maintain in this way, I mean everytime we change So why don't we fully specify all extensions? i.e., |
This is exactly what I propose to Filippe here: https://github.com/kiegroup/kogito-images/pull/1653#discussion_r1276200853 :) |
Ouch sorry, I completely missed you comment!! |
@lampajr hi, does this PR still valid? |
Hey @spolti , I think it depends on what you think about #1653 (comment). Because if you agree to fully specify all extensions in terms of |
@lampajr yeah, I agree with that, the full GAV is better than a patch. Is the CI working for the kogito-images already? |
Ok so we should create a different PR specifying the full GAV for all extensions and then we can close this one as no patch will be needed at that point.
TBH I do not know IIRC the issue was just when using Quarkus LTS |
Closing as outdated |
Following update done on 1.40.x-prod https://github.com/kiegroup/kogito-images/pull/1611
Many thanks for submitting your Pull Request ❤️!
Please make sure your PR meets the following requirements:
[KOGITO|RHPAM-XYZ] Subject
How to retest this PR or trigger a specific build:
(Re)run Jenkins tests
Please add comment: Jenkins [test|retest] this
Prod tests
Please add comment: Jenkins (re)run [prod|Prod|PROD]
How to backport a pull request to a different branch?
In order to automatically create a backporting pull request please add one or more labels having the following format
backport-<branch-name>
, where<branch-name>
is the name of the branch where the pull request must be backported to (e.g.,backport-7.67.x
to backport the original PR to the7.67.x
branch).Once the original pull request is successfully merged, the automated action will create one backporting pull request per each label (with the previous format) that has been added.
If something goes wrong, the author will be notified and at this point a manual backporting is needed.