apply clippy fixes for 1.88.0 beta #39107
Workflow file for this run
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Build and Test | |
on: | |
push: | |
branches: | |
- main | |
- release | |
- release-proxy | |
- release-compute | |
pull_request: | |
defaults: | |
run: | |
shell: bash -euxo pipefail {0} | |
concurrency: | |
# Allow only one workflow per any non-`main` branch. | |
group: ${{ github.workflow }}-${{ github.ref_name }}-${{ github.ref_name == 'main' && github.sha || 'anysha' }} | |
cancel-in-progress: true | |
env: | |
RUST_BACKTRACE: 1 | |
COPT: '-Werror' | |
# A concurrency group that we use for e2e-tests runs, matches `concurrency.group` above with `github.repository` as a prefix | |
E2E_CONCURRENCY_GROUP: ${{ github.repository }}-e2e-tests-${{ github.ref_name }}-${{ github.ref_name == 'main' && github.sha || 'anysha' }} | |
jobs: | |
check-permissions: | |
if: ${{ !contains(github.event.pull_request.labels.*.name, 'run-no-ci') }} | |
uses: ./.github/workflows/check-permissions.yml | |
with: | |
github-event-name: ${{ github.event_name }} | |
cancel-previous-e2e-tests: | |
needs: [ check-permissions ] | |
if: github.event_name == 'pull_request' | |
runs-on: ubuntu-22.04 | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- name: Cancel previous e2e-tests runs for this PR | |
env: | |
GH_TOKEN: ${{ secrets.CI_ACCESS_TOKEN }} | |
run: | | |
gh workflow --repo neondatabase/cloud \ | |
run cancel-previous-in-concurrency-group.yml \ | |
--field concurrency_group="${{ env.E2E_CONCURRENCY_GROUP }}" | |
files-changed: | |
needs: [ check-permissions ] | |
runs-on: [ self-hosted, small ] | |
timeout-minutes: 3 | |
outputs: | |
check-rust-dependencies: ${{ steps.files-changed.outputs.rust_dependencies }} | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- name: Checkout | |
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | |
with: | |
submodules: true | |
- name: Check for file changes | |
uses: step-security/paths-filter@v3 | |
id: files-changed | |
with: | |
token: ${{ secrets.GITHUB_TOKEN }} | |
filters: .github/file-filters.yaml | |
meta: | |
needs: [ check-permissions ] | |
uses: ./.github/workflows/_meta.yml | |
with: | |
github-event-name: ${{ github.event_name }} | |
github-event-json: ${{ toJSON(github.event) }} | |
build-build-tools-image: | |
needs: [ check-permissions ] | |
uses: ./.github/workflows/build-build-tools-image.yml | |
secrets: inherit | |
check-codestyle-python: | |
needs: [ meta, check-permissions, build-build-tools-image ] | |
# No need to run on `main` because we this in the merge queue. We do need to run this in `.*-rc-pr` because of hotfixes. | |
if: ${{ contains(fromJSON('["pr", "storage-rc-pr", "proxy-rc-pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
uses: ./.github/workflows/_check-codestyle-python.yml | |
with: | |
build-tools-image: ${{ needs.build-build-tools-image.outputs.image }}-bookworm | |
secrets: inherit | |
check-codestyle-jsonnet: | |
needs: [ meta, check-permissions, build-build-tools-image ] | |
# We do need to run this in `.*-rc-pr` because of hotfixes. | |
if: ${{ contains(fromJSON('["pr", "push-main", "storage-rc-pr", "proxy-rc-pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
runs-on: [ self-hosted, small ] | |
container: | |
image: ${{ needs.build-build-tools-image.outputs.image }} | |
credentials: | |
username: ${{ github.actor }} | |
password: ${{ secrets.GITHUB_TOKEN }} | |
options: --init | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- name: Checkout | |
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | |
- name: Check Jsonnet code formatting | |
run: | | |
make -C compute jsonnetfmt-test | |
# Check that the vendor/postgres-* submodules point to the | |
# corresponding REL_*_STABLE_neon branches. | |
check-submodules: | |
needs: [ check-permissions ] | |
runs-on: ubuntu-22.04 | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- name: Checkout | |
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | |
with: | |
submodules: true | |
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2 | |
id: check-if-submodules-changed | |
with: | |
filters: | | |
vendor: | |
- 'vendor/**' | |
- name: Check vendor/postgres-v14 submodule reference | |
if: steps.check-if-submodules-changed.outputs.vendor == 'true' | |
uses: jtmullen/submodule-branch-check-action@ab0d3a69278e3fa0a2d4f3be3199d2514b676e13 # v1.3.0 | |
with: | |
path: "vendor/postgres-v14" | |
fetch_depth: "50" | |
sub_fetch_depth: "50" | |
pass_if_unchanged: true | |
- name: Check vendor/postgres-v15 submodule reference | |
if: steps.check-if-submodules-changed.outputs.vendor == 'true' | |
uses: jtmullen/submodule-branch-check-action@ab0d3a69278e3fa0a2d4f3be3199d2514b676e13 # v1.3.0 | |
with: | |
path: "vendor/postgres-v15" | |
fetch_depth: "50" | |
sub_fetch_depth: "50" | |
pass_if_unchanged: true | |
- name: Check vendor/postgres-v16 submodule reference | |
if: steps.check-if-submodules-changed.outputs.vendor == 'true' | |
uses: jtmullen/submodule-branch-check-action@ab0d3a69278e3fa0a2d4f3be3199d2514b676e13 # v1.3.0 | |
with: | |
path: "vendor/postgres-v16" | |
fetch_depth: "50" | |
sub_fetch_depth: "50" | |
pass_if_unchanged: true | |
- name: Check vendor/postgres-v17 submodule reference | |
if: steps.check-if-submodules-changed.outputs.vendor == 'true' | |
uses: jtmullen/submodule-branch-check-action@ab0d3a69278e3fa0a2d4f3be3199d2514b676e13 # v1.3.0 | |
with: | |
path: "vendor/postgres-v17" | |
fetch_depth: "50" | |
sub_fetch_depth: "50" | |
pass_if_unchanged: true | |
check-codestyle-rust: | |
needs: [ meta, check-permissions, build-build-tools-image ] | |
# No need to run on `main` because we this in the merge queue. We do need to run this in `.*-rc-pr` because of hotfixes. | |
if: ${{ contains(fromJSON('["pr", "storage-rc-pr", "proxy-rc-pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
uses: ./.github/workflows/_check-codestyle-rust.yml | |
with: | |
build-tools-image: ${{ needs.build-build-tools-image.outputs.image }}-bookworm | |
archs: '["x64", "arm64"]' | |
secrets: inherit | |
check-dependencies-rust: | |
needs: [ meta, files-changed, build-build-tools-image ] | |
# No need to run on `main` because we this in the merge queue. We do need to run this in `.*-rc-pr` because of hotfixes. | |
if: ${{ needs.files-changed.outputs.check-rust-dependencies == 'true' && contains(fromJSON('["pr", "storage-rc-pr", "proxy-rc-pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
uses: ./.github/workflows/cargo-deny.yml | |
with: | |
build-tools-image: ${{ needs.build-build-tools-image.outputs.image }}-bookworm | |
secrets: inherit | |
validate-compute-manifest: | |
runs-on: ubuntu-22.04 | |
needs: [ meta, check-permissions ] | |
# We do need to run this in `.*-rc-pr` because of hotfixes. | |
if: ${{ contains(fromJSON('["pr", "push-main", "storage-rc-pr", "proxy-rc-pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | |
- name: Set up Node.js | |
uses: actions/setup-node@49933ea5288caeca8642d1e84afbd3f7d6820020 # v4.4.0 | |
with: | |
node-version: '24' | |
- name: Validate manifest against schema | |
run: | | |
make -C compute manifest-schema-validation | |
build-and-test-locally: | |
needs: [ meta, build-build-tools-image ] | |
# We do need to run this in `.*-rc-pr` because of hotfixes. | |
if: ${{ contains(fromJSON('["pr", "push-main", "storage-rc-pr", "proxy-rc-pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
strategy: | |
fail-fast: false | |
matrix: | |
arch: [ x64, arm64 ] | |
# Do not build or run tests in debug for release branches | |
build-type: ${{ fromJSON((startsWith(github.ref_name, 'release') && github.event_name == 'push') && '["release"]' || '["debug", "release"]') }} | |
include: | |
- build-type: release | |
arch: arm64 | |
uses: ./.github/workflows/_build-and-test-locally.yml | |
with: | |
arch: ${{ matrix.arch }} | |
build-tools-image: ${{ needs.build-build-tools-image.outputs.image }}-bookworm | |
build-tag: ${{ needs.meta.outputs.build-tag }} | |
build-type: ${{ matrix.build-type }} | |
# Run tests on all Postgres versions in release builds and only on the latest version in debug builds. | |
# Run without LFC on v17 release and debug builds only. For all the other cases LFC is enabled. | |
test-cfg: | | |
${{ matrix.build-type == 'release' && '[{"pg_version":"v14", "lfc_state": "with-lfc"}, | |
{"pg_version":"v15", "lfc_state": "with-lfc"}, | |
{"pg_version":"v16", "lfc_state": "with-lfc"}, | |
{"pg_version":"v17", "lfc_state": "with-lfc"}, | |
{"pg_version":"v17", "lfc_state": "without-lfc"}]' | |
|| '[{"pg_version":"v17", "lfc_state": "without-lfc" }]' }} | |
secrets: inherit | |
# Keep `benchmarks` job outside of `build-and-test-locally` workflow to make job failures non-blocking | |
get-benchmarks-durations: | |
if: github.ref_name == 'main' || contains(github.event.pull_request.labels.*.name, 'run-benchmarks') | |
outputs: | |
json: ${{ steps.get-benchmark-durations.outputs.json }} | |
needs: [ check-permissions, build-build-tools-image ] | |
runs-on: [ self-hosted, small ] | |
container: | |
image: ${{ needs.build-build-tools-image.outputs.image }}-bookworm | |
credentials: | |
username: ${{ github.actor }} | |
password: ${{ secrets.GITHUB_TOKEN }} | |
options: --init | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- name: Checkout | |
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | |
- name: Cache poetry deps | |
uses: tespkg/actions-cache@b7bf5fcc2f98a52ac6080eb0fd282c2f752074b1 # v1.8.0 | |
with: | |
endpoint: ${{ vars.HETZNER_CACHE_REGION }}.${{ vars.HETZNER_CACHE_ENDPOINT }} | |
bucket: ${{ vars.HETZNER_CACHE_BUCKET }} | |
accessKey: ${{ secrets.HETZNER_CACHE_ACCESS_KEY }} | |
secretKey: ${{ secrets.HETZNER_CACHE_SECRET_KEY }} | |
use-fallback: false | |
path: ~/.cache/pypoetry/virtualenvs | |
key: v2-${{ runner.os }}-${{ runner.arch }}-python-deps-bookworm-${{ hashFiles('poetry.lock') }} | |
- name: Install Python deps | |
run: ./scripts/pysync | |
- name: get benchmark durations | |
id: get-benchmark-durations | |
env: | |
TEST_RESULT_CONNSTR: ${{ secrets.REGRESS_TEST_RESULT_CONNSTR_NEW }} | |
run: | | |
poetry run ./scripts/benchmark_durations.py "${TEST_RESULT_CONNSTR}" \ | |
--days 10 \ | |
--output /tmp/benchmark_durations.json | |
echo "json=$(jq --compact-output '.' /tmp/benchmark_durations.json)" >> $GITHUB_OUTPUT | |
benchmarks: | |
# `!failure() && !cancelled()` is required because the workflow depends on the job that can be skipped: `deploy` in PRs | |
if: github.ref_name == 'main' || (contains(github.event.pull_request.labels.*.name, 'run-benchmarks') && !failure() && !cancelled()) | |
needs: [ check-permissions, build-build-tools-image, get-benchmarks-durations, deploy ] | |
permissions: | |
id-token: write # aws-actions/configure-aws-credentials | |
statuses: write | |
contents: write | |
pull-requests: write | |
runs-on: [ self-hosted, unit-perf ] | |
container: | |
image: ${{ needs.build-build-tools-image.outputs.image }}-bookworm | |
credentials: | |
username: ${{ github.actor }} | |
password: ${{ secrets.GITHUB_TOKEN }} | |
# for changed limits, see comments on `options:` earlier in this file | |
options: --init --shm-size=512mb --ulimit memlock=67108864:67108864 | |
strategy: | |
fail-fast: false | |
matrix: | |
# the amount of groups (N) should be reflected in `extra_params: --splits N ...` | |
pytest_split_group: [ 1, 2, 3, 4, 5 ] | |
build_type: [ release ] | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- name: Checkout | |
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | |
- name: Pytest benchmarks | |
uses: ./.github/actions/run-python-test-set | |
with: | |
build_type: ${{ matrix.build_type }} | |
test_selection: performance | |
run_in_parallel: false | |
save_perf_report: ${{ github.ref_name == 'main' }} | |
# test_pageserver_max_throughput_getpage_at_latest_lsn is run in separate workflow periodic_pagebench.yml because it needs snapshots | |
extra_params: --splits 5 --group ${{ matrix.pytest_split_group }} --ignore=test_runner/performance/pageserver/pagebench/test_pageserver_max_throughput_getpage_at_latest_lsn.py | |
benchmark_durations: ${{ needs.get-benchmarks-durations.outputs.json }} | |
pg_version: v16 | |
aws-oidc-role-arn: ${{ vars.DEV_AWS_OIDC_ROLE_ARN }} | |
env: | |
VIP_VAP_ACCESS_TOKEN: "${{ secrets.VIP_VAP_ACCESS_TOKEN }}" | |
PERF_TEST_RESULT_CONNSTR: "${{ secrets.PERF_TEST_RESULT_CONNSTR }}" | |
TEST_RESULT_CONNSTR: "${{ secrets.REGRESS_TEST_RESULT_CONNSTR_NEW }}" | |
PAGESERVER_VIRTUAL_FILE_IO_ENGINE: tokio-epoll-uring | |
SYNC_BETWEEN_TESTS: true | |
# XXX: no coverage data handling here, since benchmarks are run on release builds, | |
# while coverage is currently collected for the debug ones | |
report-benchmarks-results-to-slack: | |
needs: [ benchmarks, create-test-report ] | |
if: github.ref_name == 'main' && !cancelled() && contains(fromJSON('["success", "failure"]'), needs.benchmarks.result) | |
runs-on: ubuntu-22.04 | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- uses: slackapi/slack-github-action@485a9d42d3a73031f12ec201c457e2162c45d02d # v2.0.0 | |
with: | |
method: chat.postMessage | |
token: ${{ secrets.SLACK_BOT_TOKEN }} | |
payload: | | |
channel: "${{ vars.SLACK_ON_CALL_STORAGE_STAGING_STREAM }}" | |
text: | | |
Benchmarks on main: *${{ needs.benchmarks.result }}* | |
- <${{ needs.create-test-report.outputs.report-url }}|Allure report> | |
- <${{ github.event.head_commit.url }}|${{ github.sha }}> | |
create-test-report: | |
needs: [ check-permissions, build-and-test-locally, coverage-report, build-build-tools-image, benchmarks ] | |
if: ${{ !cancelled() && contains(fromJSON('["skipped", "success"]'), needs.check-permissions.result) }} | |
permissions: | |
id-token: write # aws-actions/configure-aws-credentials | |
statuses: write | |
contents: write | |
pull-requests: write | |
outputs: | |
report-url: ${{ steps.create-allure-report.outputs.report-url }} | |
runs-on: [ self-hosted, small ] | |
container: | |
image: ${{ needs.build-build-tools-image.outputs.image }}-bookworm | |
credentials: | |
username: ${{ github.actor }} | |
password: ${{ secrets.GITHUB_TOKEN }} | |
options: --init | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | |
- name: Create Allure report | |
if: ${{ !cancelled() }} | |
id: create-allure-report | |
uses: ./.github/actions/allure-report-generate | |
with: | |
store-test-results-into-db: true | |
aws-oidc-role-arn: ${{ vars.DEV_AWS_OIDC_ROLE_ARN }} | |
env: | |
REGRESS_TEST_RESULT_CONNSTR_NEW: ${{ secrets.REGRESS_TEST_RESULT_CONNSTR_NEW }} | |
- uses: actions/github-script@60a0d83039c74a4aee543508d2ffcb1c3799cdea # v7.0.1 | |
if: ${{ !cancelled() }} | |
with: | |
# Retry script for 5XX server errors: https://github.com/actions/github-script#retries | |
retries: 5 | |
script: | | |
const report = { | |
reportUrl: "${{ steps.create-allure-report.outputs.report-url }}", | |
reportJsonUrl: "${{ steps.create-allure-report.outputs.report-json-url }}", | |
} | |
const coverage = { | |
coverageUrl: "${{ needs.coverage-report.outputs.coverage-html }}", | |
summaryJsonUrl: "${{ needs.coverage-report.outputs.coverage-json }}", | |
} | |
const script = require("./scripts/comment-test-report.js") | |
await script({ | |
github, | |
context, | |
fetch, | |
report, | |
coverage, | |
}) | |
coverage-report: | |
if: ${{ !startsWith(github.ref_name, 'release') }} | |
needs: [ check-permissions, build-build-tools-image, build-and-test-locally ] | |
permissions: | |
id-token: write # aws-actions/configure-aws-credentials | |
statuses: write | |
contents: write | |
runs-on: [ self-hosted, small ] | |
container: | |
image: ${{ needs.build-build-tools-image.outputs.image }}-bookworm | |
credentials: | |
username: ${{ github.actor }} | |
password: ${{ secrets.GITHUB_TOKEN }} | |
options: --init | |
strategy: | |
fail-fast: false | |
matrix: | |
build_type: [ debug ] | |
outputs: | |
coverage-html: ${{ steps.upload-coverage-report-new.outputs.report-url }} | |
coverage-json: ${{ steps.upload-coverage-report-new.outputs.summary-json }} | |
steps: | |
# Need `fetch-depth: 0` for differential coverage (to get diff between two commits) | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | |
with: | |
submodules: true | |
fetch-depth: 0 | |
- name: Get Neon artifact | |
uses: ./.github/actions/download | |
with: | |
name: neon-${{ runner.os }}-${{ runner.arch }}-${{ matrix.build_type }}-artifact | |
path: /tmp/neon | |
aws-oidc-role-arn: ${{ vars.DEV_AWS_OIDC_ROLE_ARN }} | |
- name: Get coverage artifact | |
uses: ./.github/actions/download | |
with: | |
name: coverage-data-artifact | |
path: /tmp/coverage | |
aws-oidc-role-arn: ${{ vars.DEV_AWS_OIDC_ROLE_ARN }} | |
- name: Merge coverage data | |
run: scripts/coverage "--profraw-prefix=$GITHUB_JOB" --dir=/tmp/coverage merge | |
- name: Build coverage report | |
env: | |
COMMIT_URL: ${{ github.server_url }}/${{ github.repository }}/commit/${{ github.event.pull_request.head.sha || github.sha }} | |
run: | | |
scripts/coverage --dir=/tmp/coverage \ | |
report \ | |
--input-objects=/tmp/coverage/binaries.list \ | |
--commit-url=${COMMIT_URL} \ | |
--format=github | |
scripts/coverage --dir=/tmp/coverage \ | |
report \ | |
--input-objects=/tmp/coverage/binaries.list \ | |
--format=lcov | |
- name: Build coverage report NEW | |
id: upload-coverage-report-new | |
env: | |
BUCKET: neon-github-public-dev | |
# A differential coverage report is available only for PRs. | |
# (i.e. for pushes into main/release branches we have a regular coverage report) | |
COMMIT_SHA: ${{ github.event.pull_request.head.sha || github.sha }} | |
BASE_SHA: ${{ github.event.pull_request.base.sha || github.sha }} | |
run: | | |
CURRENT="${COMMIT_SHA}" | |
BASELINE="$(git merge-base $BASE_SHA $CURRENT)" | |
cp /tmp/coverage/report/lcov.info ./${CURRENT}.info | |
GENHTML_ARGS="--ignore-errors path,unmapped,empty --synthesize-missing --demangle-cpp rustfilt --output-directory lcov-html ${CURRENT}.info" | |
# Use differential coverage if the baseline coverage exists. | |
# It can be missing if the coverage repoer wasn't uploaded yet or tests has failed on BASELINE commit. | |
if aws s3 cp --only-show-errors s3://${BUCKET}/code-coverage/${BASELINE}/lcov.info ./${BASELINE}.info; then | |
git diff ${BASELINE} ${CURRENT} -- '*.rs' > baseline-current.diff | |
GENHTML_ARGS="--baseline-file ${BASELINE}.info --diff-file baseline-current.diff ${GENHTML_ARGS}" | |
fi | |
genhtml ${GENHTML_ARGS} | |
aws s3 cp --only-show-errors --recursive ./lcov-html/ s3://${BUCKET}/code-coverage/${COMMIT_SHA}/lcov | |
REPORT_URL=https://${BUCKET}.s3.amazonaws.com/code-coverage/${COMMIT_SHA}/lcov/index.html | |
echo "report-url=${REPORT_URL}" >> $GITHUB_OUTPUT | |
REPORT_URL=https://${BUCKET}.s3.amazonaws.com/code-coverage/${COMMIT_SHA}/lcov/summary.json | |
echo "summary-json=${REPORT_URL}" >> $GITHUB_OUTPUT | |
- uses: actions/github-script@60a0d83039c74a4aee543508d2ffcb1c3799cdea # v7.0.1 | |
env: | |
REPORT_URL_NEW: ${{ steps.upload-coverage-report-new.outputs.report-url }} | |
COMMIT_SHA: ${{ github.event.pull_request.head.sha || github.sha }} | |
with: | |
# Retry script for 5XX server errors: https://github.com/actions/github-script#retries | |
retries: 5 | |
script: | | |
const { REPORT_URL_NEW, COMMIT_SHA } = process.env | |
await github.rest.repos.createCommitStatus({ | |
owner: context.repo.owner, | |
repo: context.repo.repo, | |
sha: `${COMMIT_SHA}`, | |
state: 'success', | |
target_url: `${REPORT_URL_NEW}`, | |
context: 'Code coverage report NEW', | |
}) | |
trigger-e2e-tests: | |
# !failure() && !cancelled() because it depends on jobs that can get skipped | |
if: >- | |
${{ | |
( | |
( | |
needs.meta.outputs.run-kind == 'pr' | |
&& ( | |
!github.event.pull_request.draft | |
|| contains(github.event.pull_request.labels.*.name, 'run-e2e-tests-in-draft') | |
) | |
) | |
|| contains(fromJSON('["push-main", "storage-rc-pr", "proxy-rc-pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind) | |
) | |
&& !failure() && !cancelled() | |
}} | |
needs: [ check-permissions, push-neon-image-dev, push-compute-image-dev, meta ] | |
uses: ./.github/workflows/trigger-e2e-tests.yml | |
with: | |
github-event-name: ${{ github.event_name }} | |
github-event-json: ${{ toJSON(github.event) }} | |
secrets: inherit | |
neon-image-arch: | |
needs: [ check-permissions, build-build-tools-image, meta ] | |
if: ${{ contains(fromJSON('["push-main", "pr", "storage-rc-pr", "proxy-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
strategy: | |
matrix: | |
arch: [ x64, arm64 ] | |
runs-on: ${{ fromJSON(format('["self-hosted", "{0}"]', matrix.arch == 'arm64' && 'large-arm64' || 'large')) }} | |
permissions: | |
packages: write | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | |
with: | |
submodules: true | |
ref: ${{ needs.meta.outputs.sha }} | |
- uses: neondatabase/dev-actions/set-docker-config-dir@6094485bf440001c94a94a3f9e221e81ff6b6193 | |
- uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0 | |
with: | |
cache-binary: false | |
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0 | |
with: | |
username: ${{ secrets.NEON_DOCKERHUB_USERNAME }} | |
password: ${{ secrets.NEON_DOCKERHUB_PASSWORD }} | |
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0 | |
with: | |
registry: ghcr.io | |
username: ${{ github.actor }} | |
password: ${{ secrets.GITHUB_TOKEN }} | |
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0 | |
with: | |
registry: cache.neon.build | |
username: ${{ secrets.NEON_CI_DOCKERCACHE_USERNAME }} | |
password: ${{ secrets.NEON_CI_DOCKERCACHE_PASSWORD }} | |
- uses: docker/build-push-action@471d1dc4e07e5cdedd4c2171150001c434f0b7a4 # v6.15.0 | |
with: | |
context: . | |
# ARM-specific flags are recommended for Graviton ≥ 2, these flags are also supported by Ampere Altra (Azure) | |
# https://github.com/aws/aws-graviton-getting-started/blob/57dc813626d0266f1cc12ef83474745bb1f31fb4/rust.md | |
build-args: | | |
ADDITIONAL_RUSTFLAGS=${{ matrix.arch == 'arm64' && '-Ctarget-feature=+lse -Ctarget-cpu=neoverse-n1' || '' }} | |
GIT_VERSION=${{ github.event.pull_request.head.sha || github.sha }} | |
BUILD_TAG=${{ needs.meta.outputs.release-tag || needs.meta.outputs.build-tag }} | |
TAG=${{ needs.build-build-tools-image.outputs.image-tag }}-bookworm | |
DEBIAN_VERSION=bookworm | |
provenance: false | |
push: true | |
pull: true | |
file: Dockerfile | |
cache-from: type=registry,ref=cache.neon.build/neon:cache-bookworm-${{ matrix.arch }} | |
cache-to: ${{ github.ref_name == 'main' && format('type=registry,ref=cache.neon.build/neon:cache-{0}-{1},mode=max', 'bookworm', matrix.arch) || '' }} | |
tags: | | |
ghcr.io/neondatabase/neon:${{ needs.meta.outputs.build-tag }}-bookworm-${{ matrix.arch }} | |
neon-image: | |
needs: [ neon-image-arch, meta ] | |
if: ${{ contains(fromJSON('["push-main", "pr", "storage-rc-pr", "proxy-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
runs-on: ubuntu-22.04 | |
permissions: | |
id-token: write # aws-actions/configure-aws-credentials | |
statuses: write | |
contents: read | |
packages: write | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0 | |
with: | |
registry: ghcr.io | |
username: ${{ github.actor }} | |
password: ${{ secrets.GITHUB_TOKEN }} | |
- name: Create multi-arch image | |
run: | | |
docker buildx imagetools create -t ghcr.io/neondatabase/neon:${{ needs.meta.outputs.build-tag }} \ | |
-t ghcr.io/neondatabase/neon:${{ needs.meta.outputs.build-tag }}-bookworm \ | |
ghcr.io/neondatabase/neon:${{ needs.meta.outputs.build-tag }}-bookworm-x64 \ | |
ghcr.io/neondatabase/neon:${{ needs.meta.outputs.build-tag }}-bookworm-arm64 | |
compute-node-image-arch: | |
needs: [ check-permissions, meta ] | |
if: ${{ contains(fromJSON('["push-main", "pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
permissions: | |
id-token: write # aws-actions/configure-aws-credentials | |
statuses: write | |
contents: read | |
packages: write | |
strategy: | |
fail-fast: false | |
matrix: | |
version: | |
# Much data was already generated on old PG versions with bullseye's | |
# libraries, the locales of which can cause data incompatibilities. | |
# However, new PG versions should be build on newer images, | |
# as that reduces the support burden of old and ancient distros. | |
- pg: v14 | |
debian: bullseye | |
- pg: v15 | |
debian: bullseye | |
- pg: v16 | |
debian: bullseye | |
- pg: v17 | |
debian: bookworm | |
arch: [ x64, arm64 ] | |
runs-on: ${{ fromJSON(format('["self-hosted", "{0}"]', matrix.arch == 'arm64' && 'large-arm64' || 'large')) }} | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | |
with: | |
submodules: true | |
ref: ${{ needs.meta.outputs.sha }} | |
- uses: neondatabase/dev-actions/set-docker-config-dir@6094485bf440001c94a94a3f9e221e81ff6b6193 | |
- uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0 | |
with: | |
cache-binary: false | |
# Disable parallelism for docker buildkit. | |
# As we already build everything with `make -j$(nproc)`, running it in additional level of parallelisam blows up the Runner. | |
buildkitd-config-inline: | | |
[worker.oci] | |
max-parallelism = 1 | |
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0 | |
with: | |
username: ${{ secrets.NEON_DOCKERHUB_USERNAME }} | |
password: ${{ secrets.NEON_DOCKERHUB_PASSWORD }} | |
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0 | |
with: | |
registry: ghcr.io | |
username: ${{ github.actor }} | |
password: ${{ secrets.GITHUB_TOKEN }} | |
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0 | |
with: | |
registry: cache.neon.build | |
username: ${{ secrets.NEON_CI_DOCKERCACHE_USERNAME }} | |
password: ${{ secrets.NEON_CI_DOCKERCACHE_PASSWORD }} | |
- name: Build compute-node image | |
uses: docker/build-push-action@471d1dc4e07e5cdedd4c2171150001c434f0b7a4 # v6.15.0 | |
with: | |
context: . | |
build-args: | | |
GIT_VERSION=${{ github.event.pull_request.head.sha || github.sha }} | |
PG_VERSION=${{ matrix.version.pg }} | |
BUILD_TAG=${{ needs.meta.outputs.release-tag || needs.meta.outputs.build-tag }} | |
DEBIAN_VERSION=${{ matrix.version.debian }} | |
provenance: false | |
push: true | |
pull: true | |
file: compute/compute-node.Dockerfile | |
cache-from: type=registry,ref=cache.neon.build/compute-node-${{ matrix.version.pg }}:cache-${{ matrix.version.debian }}-${{ matrix.arch }} | |
cache-to: ${{ github.ref_name == 'main' && format('type=registry,ref=cache.neon.build/compute-node-{0}:cache-{1}-{2},mode=max', matrix.version.pg, matrix.version.debian, matrix.arch) || '' }} | |
tags: | | |
ghcr.io/neondatabase/compute-node-${{ matrix.version.pg }}:${{ needs.meta.outputs.build-tag }}-${{ matrix.version.debian }}-${{ matrix.arch }} | |
- name: Build neon extensions test image | |
if: matrix.version.pg >= 'v16' | |
uses: docker/build-push-action@471d1dc4e07e5cdedd4c2171150001c434f0b7a4 # v6.15.0 | |
with: | |
context: . | |
build-args: | | |
GIT_VERSION=${{ github.event.pull_request.head.sha || github.sha }} | |
PG_VERSION=${{ matrix.version.pg }} | |
BUILD_TAG=${{ needs.meta.outputs.release-tag || needs.meta.outputs.build-tag }} | |
DEBIAN_VERSION=${{ matrix.version.debian }} | |
provenance: false | |
push: true | |
pull: true | |
file: compute/compute-node.Dockerfile | |
target: extension-tests | |
cache-from: type=registry,ref=cache.neon.build/compute-node-${{ matrix.version.pg }}:cache-${{ matrix.version.debian }}-${{ matrix.arch }} | |
tags: | | |
ghcr.io/neondatabase/neon-test-extensions-${{ matrix.version.pg }}:${{needs.meta.outputs.build-tag}}-${{ matrix.version.debian }}-${{ matrix.arch }} | |
compute-node-image: | |
needs: [ compute-node-image-arch, meta ] | |
if: ${{ contains(fromJSON('["push-main", "pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
permissions: | |
id-token: write # aws-actions/configure-aws-credentials | |
statuses: write | |
contents: read | |
packages: write | |
runs-on: ubuntu-22.04 | |
strategy: | |
matrix: | |
version: | |
# see the comment for `compute-node-image-arch` job | |
- pg: v14 | |
debian: bullseye | |
- pg: v15 | |
debian: bullseye | |
- pg: v16 | |
debian: bullseye | |
- pg: v17 | |
debian: bookworm | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0 | |
with: | |
registry: ghcr.io | |
username: ${{ github.actor }} | |
password: ${{ secrets.GITHUB_TOKEN }} | |
- name: Create multi-arch compute-node image | |
run: | | |
docker buildx imagetools create -t ghcr.io/neondatabase/compute-node-${{ matrix.version.pg }}:${{ needs.meta.outputs.build-tag }} \ | |
-t ghcr.io/neondatabase/compute-node-${{ matrix.version.pg }}:${{ needs.meta.outputs.build-tag }}-${{ matrix.version.debian }} \ | |
ghcr.io/neondatabase/compute-node-${{ matrix.version.pg }}:${{ needs.meta.outputs.build-tag }}-${{ matrix.version.debian }}-x64 \ | |
ghcr.io/neondatabase/compute-node-${{ matrix.version.pg }}:${{ needs.meta.outputs.build-tag }}-${{ matrix.version.debian }}-arm64 | |
- name: Create multi-arch neon-test-extensions image | |
if: matrix.version.pg >= 'v16' | |
run: | | |
docker buildx imagetools create -t ghcr.io/neondatabase/neon-test-extensions-${{ matrix.version.pg }}:${{ needs.meta.outputs.build-tag }} \ | |
-t ghcr.io/neondatabase/neon-test-extensions-${{ matrix.version.pg }}:${{ needs.meta.outputs.build-tag }}-${{ matrix.version.debian }} \ | |
ghcr.io/neondatabase/neon-test-extensions-${{ matrix.version.pg }}:${{ needs.meta.outputs.build-tag }}-${{ matrix.version.debian }}-x64 \ | |
ghcr.io/neondatabase/neon-test-extensions-${{ matrix.version.pg }}:${{ needs.meta.outputs.build-tag }}-${{ matrix.version.debian }}-arm64 | |
vm-compute-node-image-arch: | |
needs: [ check-permissions, meta, compute-node-image ] | |
if: ${{ contains(fromJSON('["push-main", "pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
runs-on: ${{ fromJSON(format('["self-hosted", "{0}"]', matrix.arch == 'arm64' && 'large-arm64' || 'large')) }} | |
permissions: | |
contents: read | |
packages: write | |
strategy: | |
fail-fast: false | |
matrix: | |
arch: [ amd64, arm64 ] | |
version: | |
- pg: v14 | |
debian: bullseye | |
- pg: v15 | |
debian: bullseye | |
- pg: v16 | |
debian: bullseye | |
- pg: v17 | |
debian: bookworm | |
env: | |
VM_BUILDER_VERSION: v0.46.0 | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | |
- name: Downloading vm-builder | |
run: | | |
curl -fL https://github.com/neondatabase/autoscaling/releases/download/$VM_BUILDER_VERSION/vm-builder-${{ matrix.arch }} -o vm-builder | |
chmod +x vm-builder | |
- uses: neondatabase/dev-actions/set-docker-config-dir@6094485bf440001c94a94a3f9e221e81ff6b6193 | |
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0 | |
with: | |
registry: ghcr.io | |
username: ${{ github.actor }} | |
password: ${{ secrets.GITHUB_TOKEN }} | |
# Note: we need a separate pull step here because otherwise vm-builder will try to pull, and | |
# it won't have the proper authentication (written at v0.6.0) | |
- name: Pulling compute-node image | |
run: | | |
docker pull ghcr.io/neondatabase/compute-node-${{ matrix.version.pg }}:${{ needs.meta.outputs.build-tag }} | |
- name: Build vm image | |
run: | | |
./vm-builder \ | |
-size=2G \ | |
-spec=compute/vm-image-spec-${{ matrix.version.debian }}.yaml \ | |
-src=ghcr.io/neondatabase/compute-node-${{ matrix.version.pg }}:${{ needs.meta.outputs.build-tag }} \ | |
-dst=ghcr.io/neondatabase/vm-compute-node-${{ matrix.version.pg }}:${{ needs.meta.outputs.build-tag }}-${{ matrix.arch }} \ | |
-target-arch=linux/${{ matrix.arch }} | |
- name: Pushing vm-compute-node image | |
run: | | |
docker push ghcr.io/neondatabase/vm-compute-node-${{ matrix.version.pg }}:${{ needs.meta.outputs.build-tag }}-${{ matrix.arch }} | |
vm-compute-node-image: | |
needs: [ vm-compute-node-image-arch, meta ] | |
if: ${{ contains(fromJSON('["push-main", "pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
permissions: | |
packages: write | |
runs-on: ubuntu-22.04 | |
strategy: | |
matrix: | |
version: | |
# see the comment for `compute-node-image-arch` job | |
- pg: v14 | |
- pg: v15 | |
- pg: v16 | |
- pg: v17 | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0 | |
with: | |
registry: ghcr.io | |
username: ${{ github.actor }} | |
password: ${{ secrets.GITHUB_TOKEN }} | |
- name: Create multi-arch compute-node image | |
run: | | |
docker buildx imagetools create -t ghcr.io/neondatabase/vm-compute-node-${{ matrix.version.pg }}:${{ needs.meta.outputs.build-tag }} \ | |
ghcr.io/neondatabase/vm-compute-node-${{ matrix.version.pg }}:${{ needs.meta.outputs.build-tag }}-amd64 \ | |
ghcr.io/neondatabase/vm-compute-node-${{ matrix.version.pg }}:${{ needs.meta.outputs.build-tag }}-arm64 | |
test-images: | |
needs: [ check-permissions, meta, neon-image, compute-node-image ] | |
# Depends on jobs that can get skipped | |
if: >- | |
${{ | |
!failure() | |
&& !cancelled() | |
&& contains(fromJSON('["push-main", "pr", "storage-rc-pr", "proxy-rc-pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind) | |
}} | |
strategy: | |
fail-fast: false | |
matrix: | |
arch: [ x64, arm64 ] | |
pg_version: [v16, v17] | |
permissions: | |
packages: read | |
runs-on: ${{ fromJSON(format('["self-hosted", "{0}"]', matrix.arch == 'arm64' && 'small-arm64' || 'small')) }} | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | |
- uses: neondatabase/dev-actions/set-docker-config-dir@6094485bf440001c94a94a3f9e221e81ff6b6193 | |
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0 | |
with: | |
username: ${{ secrets.NEON_DOCKERHUB_USERNAME }} | |
password: ${{ secrets.NEON_DOCKERHUB_PASSWORD }} | |
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0 | |
with: | |
registry: ghcr.io | |
username: ${{ github.actor }} | |
password: ${{ secrets.GITHUB_TOKEN }} | |
# `ghcr.io/neondatabase/neon` contains multiple binaries, all of them use the same input for the version into the same version formatting library. | |
# Pick pageserver as currently the only binary with extra "version" features printed in the string to verify. | |
# Regular pageserver version string looks like | |
# Neon page server git-env:32d14403bd6ab4f4520a94cbfd81a6acef7a526c failpoints: true, features: [] | |
# Bad versions might loop like: | |
# Neon page server git-env:local failpoints: true, features: ["testing"] | |
# Ensure that we don't have bad versions. | |
- name: Verify image versions | |
shell: bash # ensure no set -e for better error messages | |
if: ${{ contains(fromJSON('["push-main", "pr", "storage-rc-pr", "proxy-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
run: | | |
pageserver_version=$(docker run --rm ghcr.io/neondatabase/neon:${{ needs.meta.outputs.build-tag }} "/bin/sh" "-c" "/usr/local/bin/pageserver --version") | |
echo "Pageserver version string: $pageserver_version" | |
if ! echo "$pageserver_version" | grep -qv 'git-env:local' ; then | |
echo "Pageserver version should not be the default Dockerfile one" | |
exit 1 | |
fi | |
if ! echo "$pageserver_version" | grep -qv '"testing"' ; then | |
echo "Pageserver version should have no testing feature enabled" | |
exit 1 | |
fi | |
- name: Verify docker-compose example and test extensions | |
timeout-minutes: 60 | |
env: | |
TAG: >- | |
${{ | |
needs.meta.outputs.run-kind == 'compute-rc-pr' | |
&& needs.meta.outputs.previous-storage-release | |
|| needs.meta.outputs.build-tag | |
}} | |
COMPUTE_TAG: >- | |
${{ | |
contains(fromJSON('["storage-rc-pr", "proxy-rc-pr"]'), needs.meta.outputs.run-kind) | |
&& needs.meta.outputs.previous-compute-release | |
|| needs.meta.outputs.build-tag | |
}} | |
TEST_EXTENSIONS_TAG: >- | |
${{ | |
contains(fromJSON('["storage-rc-pr", "proxy-rc-pr"]'), needs.meta.outputs.run-kind) | |
&& needs.meta.outputs.previous-compute-release | |
|| needs.meta.outputs.build-tag | |
}} | |
TEST_VERSION_ONLY: ${{ matrix.pg_version }} | |
run: ./docker-compose/docker_compose_test.sh | |
- name: Print logs and clean up docker-compose test | |
if: always() | |
run: | | |
docker compose --profile test-extensions -f ./docker-compose/docker-compose.yml logs || true | |
docker compose --profile test-extensions -f ./docker-compose/docker-compose.yml down | |
- name: Test extension upgrade | |
timeout-minutes: 20 | |
if: ${{ contains(fromJSON('["pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
env: | |
TAG: >- | |
${{ | |
false | |
|| needs.meta.outputs.run-kind == 'pr' && needs.meta.outputs.build-tag | |
|| needs.meta.outputs.run-kind == 'compute-rc-pr' && needs.meta.outputs.previous-storage-release | |
}} | |
TEST_EXTENSIONS_TAG: ${{ needs.meta.outputs.previous-compute-release }} | |
NEW_COMPUTE_TAG: ${{ needs.meta.outputs.build-tag }} | |
OLD_COMPUTE_TAG: ${{ needs.meta.outputs.previous-compute-release }} | |
run: ./docker-compose/test_extensions_upgrade.sh | |
- name: Print logs and clean up | |
if: always() | |
run: | | |
docker compose --profile test-extensions -f ./docker-compose/docker-compose.yml logs || true | |
docker compose --profile test-extensions -f ./docker-compose/docker-compose.yml down | |
generate-image-maps: | |
needs: [ meta ] | |
runs-on: ubuntu-22.04 | |
outputs: | |
neon-dev: ${{ steps.generate.outputs.neon-dev }} | |
neon-prod: ${{ steps.generate.outputs.neon-prod }} | |
compute-dev: ${{ steps.generate.outputs.compute-dev }} | |
compute-prod: ${{ steps.generate.outputs.compute-prod }} | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | |
with: | |
sparse-checkout: .github/scripts/generate_image_maps.py | |
sparse-checkout-cone-mode: false | |
- name: Generate Image Maps | |
id: generate | |
run: python3 .github/scripts/generate_image_maps.py | |
env: | |
SOURCE_TAG: >- | |
${{ | |
contains(fromJSON('["storage-release", "compute-release", "proxy-release"]'), needs.meta.outputs.run-kind) | |
&& needs.meta.outputs.release-pr-run-id | |
|| needs.meta.outputs.build-tag | |
}} | |
TARGET_TAG: ${{ needs.meta.outputs.build-tag }} | |
BRANCH: "${{ github.ref_name }}" | |
DEV_ACR: "${{ vars.AZURE_DEV_REGISTRY_NAME }}" | |
PROD_ACR: "${{ vars.AZURE_PROD_REGISTRY_NAME }}" | |
DEV_AWS: "${{ vars.NEON_DEV_AWS_ACCOUNT_ID }}" | |
PROD_AWS: "${{ vars.NEON_PROD_AWS_ACCOUNT_ID }}" | |
AWS_REGION: "${{ vars.AWS_ECR_REGION }}" | |
push-neon-image-dev: | |
needs: [ meta, generate-image-maps, neon-image ] | |
if: ${{ !failure() && !cancelled() && contains(fromJSON('["push-main", "pr", "storage-release", "storage-rc-pr", "proxy-release", "proxy-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
uses: ./.github/workflows/_push-to-container-registry.yml | |
permissions: | |
id-token: write # Required for aws/azure login | |
packages: write # required for pushing to GHCR | |
with: | |
image-map: '${{ needs.generate-image-maps.outputs.neon-dev }}' | |
aws-region: ${{ vars.AWS_ECR_REGION }} | |
aws-account-id: "${{ vars.NEON_DEV_AWS_ACCOUNT_ID }}" | |
aws-role-to-assume: "gha-oidc-neon-admin" | |
azure-client-id: ${{ vars.AZURE_DEV_CLIENT_ID }} | |
azure-subscription-id: ${{ vars.AZURE_DEV_SUBSCRIPTION_ID }} | |
azure-tenant-id: ${{ vars.AZURE_TENANT_ID }} | |
acr-registry-name: ${{ vars.AZURE_DEV_REGISTRY_NAME }} | |
secrets: inherit | |
push-compute-image-dev: | |
needs: [ meta, generate-image-maps, vm-compute-node-image ] | |
if: ${{ !failure() && !cancelled() && contains(fromJSON('["push-main", "pr", "compute-release", "compute-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
uses: ./.github/workflows/_push-to-container-registry.yml | |
permissions: | |
id-token: write # Required for aws/azure login | |
packages: write # required for pushing to GHCR | |
with: | |
image-map: '${{ needs.generate-image-maps.outputs.compute-dev }}' | |
aws-region: ${{ vars.AWS_ECR_REGION }} | |
aws-account-id: "${{ vars.NEON_DEV_AWS_ACCOUNT_ID }}" | |
aws-role-to-assume: "gha-oidc-neon-admin" | |
azure-client-id: ${{ vars.AZURE_DEV_CLIENT_ID }} | |
azure-subscription-id: ${{ vars.AZURE_DEV_SUBSCRIPTION_ID }} | |
azure-tenant-id: ${{ vars.AZURE_TENANT_ID }} | |
acr-registry-name: ${{ vars.AZURE_DEV_REGISTRY_NAME }} | |
secrets: inherit | |
push-neon-image-prod: | |
needs: [ meta, generate-image-maps, neon-image, test-images ] | |
# Depends on jobs that can get skipped | |
if: ${{ !failure() && !cancelled() && contains(fromJSON('["storage-release", "proxy-release"]'), needs.meta.outputs.run-kind) }} | |
uses: ./.github/workflows/_push-to-container-registry.yml | |
permissions: | |
id-token: write # Required for aws/azure login | |
packages: write # required for pushing to GHCR | |
with: | |
image-map: '${{ needs.generate-image-maps.outputs.neon-prod }}' | |
aws-region: ${{ vars.AWS_ECR_REGION }} | |
aws-account-id: "${{ vars.NEON_PROD_AWS_ACCOUNT_ID }}" | |
aws-role-to-assume: "gha-oidc-neon-admin" | |
azure-client-id: ${{ vars.AZURE_PROD_CLIENT_ID }} | |
azure-subscription-id: ${{ vars.AZURE_PROD_SUBSCRIPTION_ID }} | |
azure-tenant-id: ${{ vars.AZURE_TENANT_ID }} | |
acr-registry-name: ${{ vars.AZURE_PROD_REGISTRY_NAME }} | |
secrets: inherit | |
push-compute-image-prod: | |
needs: [ meta, generate-image-maps, vm-compute-node-image, test-images ] | |
# Depends on jobs that can get skipped | |
if: ${{ !failure() && !cancelled() && needs.meta.outputs.run-kind == 'compute-release' }} | |
uses: ./.github/workflows/_push-to-container-registry.yml | |
permissions: | |
id-token: write # Required for aws/azure login | |
packages: write # required for pushing to GHCR | |
with: | |
image-map: '${{ needs.generate-image-maps.outputs.compute-prod }}' | |
aws-region: ${{ vars.AWS_ECR_REGION }} | |
aws-account-id: "${{ vars.NEON_PROD_AWS_ACCOUNT_ID }}" | |
aws-role-to-assume: "gha-oidc-neon-admin" | |
azure-client-id: ${{ vars.AZURE_PROD_CLIENT_ID }} | |
azure-subscription-id: ${{ vars.AZURE_PROD_SUBSCRIPTION_ID }} | |
azure-tenant-id: ${{ vars.AZURE_TENANT_ID }} | |
acr-registry-name: ${{ vars.AZURE_PROD_REGISTRY_NAME }} | |
secrets: inherit | |
push-neon-test-extensions-image-dockerhub: | |
if: ${{ contains(fromJSON('["push-main", "pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
needs: [ meta, compute-node-image ] | |
uses: ./.github/workflows/_push-to-container-registry.yml | |
permissions: | |
packages: write | |
id-token: write | |
with: | |
image-map: | | |
{ | |
"ghcr.io/neondatabase/neon-test-extensions-v16:${{ needs.meta.outputs.build-tag }}": [ | |
"docker.io/neondatabase/neon-test-extensions-v16:${{ needs.meta.outputs.build-tag }}" | |
], | |
"ghcr.io/neondatabase/neon-test-extensions-v17:${{ needs.meta.outputs.build-tag }}": [ | |
"docker.io/neondatabase/neon-test-extensions-v17:${{ needs.meta.outputs.build-tag }}" | |
] | |
} | |
secrets: inherit | |
add-latest-tag-to-neon-test-extensions-image: | |
if: ${{ needs.meta.outputs.run-kind == 'push-main' }} | |
needs: [ meta, compute-node-image ] | |
uses: ./.github/workflows/_push-to-container-registry.yml | |
permissions: | |
packages: write | |
id-token: write | |
with: | |
image-map: | | |
{ | |
"ghcr.io/neondatabase/neon-test-extensions-v16:${{ needs.meta.outputs.build-tag }}": [ | |
"docker.io/neondatabase/neon-test-extensions-v16:latest", | |
"ghcr.io/neondatabase/neon-test-extensions-v16:latest" | |
], | |
"ghcr.io/neondatabase/neon-test-extensions-v17:${{ needs.meta.outputs.build-tag }}": [ | |
"docker.io/neondatabase/neon-test-extensions-v17:latest", | |
"ghcr.io/neondatabase/neon-test-extensions-v17:latest" | |
] | |
} | |
secrets: inherit | |
add-release-tag-to-neon-test-extensions-image: | |
if: ${{ needs.meta.outputs.run-kind == 'compute-release' }} | |
needs: [ meta ] | |
uses: ./.github/workflows/_push-to-container-registry.yml | |
permissions: | |
packages: write | |
id-token: write | |
with: | |
image-map: | | |
{ | |
"ghcr.io/neondatabase/neon-test-extensions-v16:${{ needs.meta.outputs.release-pr-run-id }}": [ | |
"docker.io/neondatabase/neon-test-extensions-v16:${{ needs.meta.outputs.build-tag }}", | |
"ghcr.io/neondatabase/neon-test-extensions-v16:${{ needs.meta.outputs.build-tag }}" | |
], | |
"ghcr.io/neondatabase/neon-test-extensions-v17:${{ needs.meta.outputs.release-pr-run-id }}": [ | |
"docker.io/neondatabase/neon-test-extensions-v17:${{ needs.meta.outputs.build-tag }}", | |
"ghcr.io/neondatabase/neon-test-extensions-v17:${{ needs.meta.outputs.build-tag }}" | |
] | |
} | |
secrets: inherit | |
trigger-custom-extensions-build-and-wait: | |
needs: [ check-permissions, meta ] | |
if: ${{ contains(fromJSON('["push-main", "pr", "compute-release", "compute-rc-pr"]'), needs.meta.outputs.run-kind) }} | |
runs-on: ubuntu-22.04 | |
permissions: | |
id-token: write # aws-actions/configure-aws-credentials | |
statuses: write | |
contents: write | |
pull-requests: write | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- name: Set PR's status to pending and request a remote CI test | |
run: | | |
COMMIT_SHA=${{ github.event.pull_request.head.sha || github.sha }} | |
REMOTE_REPO="${{ github.repository_owner }}/build-custom-extensions" | |
curl -f -X POST \ | |
https://api.github.com/repos/${{ github.repository }}/statuses/$COMMIT_SHA \ | |
-H "Accept: application/vnd.github.v3+json" \ | |
--user "${{ secrets.CI_ACCESS_TOKEN }}" \ | |
--data \ | |
"{ | |
\"state\": \"pending\", | |
\"context\": \"build-and-upload-extensions\", | |
\"description\": \"[$REMOTE_REPO] Remote CI job is about to start\" | |
}" | |
curl -f -X POST \ | |
https://api.github.com/repos/$REMOTE_REPO/actions/workflows/build_and_upload_extensions.yml/dispatches \ | |
-H "Accept: application/vnd.github.v3+json" \ | |
--user "${{ secrets.CI_ACCESS_TOKEN }}" \ | |
--data \ | |
"{ | |
\"ref\": \"main\", | |
\"inputs\": { | |
\"ci_job_name\": \"build-and-upload-extensions\", | |
\"commit_hash\": \"$COMMIT_SHA\", | |
\"remote_repo\": \"${{ github.repository }}\", | |
\"compute_image_tag\": \"${{ needs.meta.outputs.build-tag }}\", | |
\"remote_branch_name\": \"${{ github.ref_name }}\" | |
} | |
}" | |
- name: Wait for extension build to finish | |
env: | |
GH_TOKEN: ${{ secrets.CI_ACCESS_TOKEN }} | |
run: | | |
TIMEOUT=5400 # 90 minutes, usually it takes ~2-3 minutes, but if runners are busy, it might take longer | |
INTERVAL=15 # try each N seconds | |
last_status="" # a variable to carry the last status of the "build-and-upload-extensions" context | |
for ((i=0; i <= TIMEOUT; i+=INTERVAL)); do | |
sleep $INTERVAL | |
# Get statuses for the latest commit in the PR / branch | |
gh api \ | |
-H "Accept: application/vnd.github+json" \ | |
-H "X-GitHub-Api-Version: 2022-11-28" \ | |
"/repos/${{ github.repository }}/statuses/${{ github.event.pull_request.head.sha || github.sha }}" > statuses.json | |
# Get the latest status for the "build-and-upload-extensions" context | |
last_status=$(jq --raw-output '[.[] | select(.context == "build-and-upload-extensions")] | sort_by(.created_at)[-1].state' statuses.json) | |
if [ "${last_status}" = "pending" ]; then | |
# Extension build is still in progress. | |
continue | |
elif [ "${last_status}" = "success" ]; then | |
# Extension build is successful. | |
exit 0 | |
else | |
# Status is neither "pending" nor "success", exit the loop and fail the job. | |
break | |
fi | |
done | |
# Extension build failed, print `statuses.json` for debugging and fail the job. | |
jq '.' statuses.json | |
echo >&2 "Status of extension build is '${last_status}' != 'success'" | |
exit 1 | |
deploy: | |
needs: [ check-permissions, push-neon-image-dev, push-compute-image-dev, push-neon-image-prod, push-compute-image-prod, meta, trigger-custom-extensions-build-and-wait ] | |
# `!failure() && !cancelled()` is required because the workflow depends on the job that can be skipped: `push-neon-image-prod` and `push-compute-image-prod` | |
if: ${{ contains(fromJSON('["push-main", "storage-release", "proxy-release", "compute-release"]'), needs.meta.outputs.run-kind) && !failure() && !cancelled() }} | |
permissions: | |
id-token: write # aws-actions/configure-aws-credentials | |
statuses: write | |
contents: write | |
runs-on: [ self-hosted, small ] | |
container: ${{ vars.NEON_DEV_AWS_ACCOUNT_ID }}.dkr.ecr.${{ vars.AWS_ECR_REGION }}.amazonaws.com/ansible:latest | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | |
- name: Create git tag and GitHub release | |
if: ${{ contains(fromJSON('["storage-release", "proxy-release", "compute-release"]'), needs.meta.outputs.run-kind) }} | |
uses: actions/github-script@60a0d83039c74a4aee543508d2ffcb1c3799cdea # v7.0.1 | |
env: | |
TAG: "${{ needs.meta.outputs.build-tag }}" | |
BRANCH: "${{ github.ref_name }}" | |
PREVIOUS_RELEASE: >- | |
${{ | |
false | |
|| needs.meta.outputs.run-kind == 'storage-release' && needs.meta.outputs.previous-storage-release | |
|| needs.meta.outputs.run-kind == 'proxy-release' && needs.meta.outputs.previous-proxy-release | |
|| needs.meta.outputs.run-kind == 'compute-release' && needs.meta.outputs.previous-compute-release | |
|| 'unknown' | |
}} | |
with: | |
retries: 5 | |
script: | | |
const { TAG, BRANCH, PREVIOUS_RELEASE } = process.env | |
try { | |
const existingRef = await github.rest.git.getRef({ | |
owner: context.repo.owner, | |
repo: context.repo.repo, | |
ref: `tags/${TAG}`, | |
}); | |
if (existingRef.data.object.sha !== context.sha) { | |
throw new Error(`Tag ${TAG} already exists but points to a different commit (expected: ${context.sha}, actual: ${existingRef.data.object.sha}).`); | |
} | |
console.log(`Tag ${TAG} already exists and points to ${context.sha} as expected.`); | |
} catch (error) { | |
if (error.status !== 404) { | |
throw error; | |
} | |
console.log(`Tag ${TAG} does not exist. Creating it...`); | |
await github.rest.git.createRef({ | |
owner: context.repo.owner, | |
repo: context.repo.repo, | |
ref: `refs/tags/${TAG}`, | |
sha: context.sha, | |
}); | |
console.log(`Tag ${TAG} created successfully.`); | |
} | |
try { | |
const existingRelease = await github.rest.repos.getReleaseByTag({ | |
owner: context.repo.owner, | |
repo: context.repo.repo, | |
tag: TAG, | |
}); | |
console.log(`Release for tag ${TAG} already exists (ID: ${existingRelease.data.id}).`); | |
} catch (error) { | |
if (error.status !== 404) { | |
throw error; | |
} | |
console.log(`Release for tag ${TAG} does not exist. Creating it...`); | |
// Find the PR number using the commit SHA | |
const pullRequests = await github.rest.pulls.list({ | |
owner: context.repo.owner, | |
repo: context.repo.repo, | |
state: 'closed', | |
base: BRANCH, | |
}); | |
const pr = pullRequests.data.find(pr => pr.merge_commit_sha === context.sha); | |
const prNumber = pr ? pr.number : null; | |
const releaseNotes = [ | |
prNumber | |
? `Release PR https://github.com/${context.repo.owner}/${context.repo.repo}/pull/${prNumber}.` | |
: 'Release PR not found.', | |
`Diff with the previous release https://github.com/${context.repo.owner}/${context.repo.repo}/compare/${PREVIOUS_RELEASE}...${TAG}.` | |
].join('\n\n'); | |
await github.rest.repos.createRelease({ | |
owner: context.repo.owner, | |
repo: context.repo.repo, | |
tag_name: TAG, | |
body: releaseNotes, | |
}); | |
console.log(`Release for tag ${TAG} created successfully.`); | |
} | |
- name: Trigger deploy workflow | |
env: | |
GH_TOKEN: ${{ secrets.CI_ACCESS_TOKEN }} | |
RUN_KIND: ${{ needs.meta.outputs.run-kind }} | |
run: | | |
case ${RUN_KIND} in | |
push-main) | |
gh workflow --repo neondatabase/infra run deploy-dev.yml --ref main -f branch=main -f dockerTag=${{needs.meta.outputs.build-tag}} -f deployPreprodRegion=false | |
;; | |
storage-release) | |
gh workflow --repo neondatabase/infra run deploy-dev.yml --ref main \ | |
-f deployPgSniRouter=false \ | |
-f deployProxy=false \ | |
-f deployStorage=true \ | |
-f deployStorageBroker=false \ | |
-f deployStorageController=true \ | |
-f branch=main \ | |
-f dockerTag=${{needs.meta.outputs.build-tag}} \ | |
-f deployPreprodRegion=true | |
gh workflow --repo neondatabase/infra run deploy-prod.yml --ref main \ | |
-f deployStorage=true \ | |
-f deployStorageBroker=false \ | |
-f deployStorageController=true \ | |
-f branch=main \ | |
-f dockerTag=${{needs.meta.outputs.build-tag}} | |
;; | |
proxy-release) | |
gh workflow --repo neondatabase/infra run deploy-dev.yml --ref main \ | |
-f deployPgSniRouter=true \ | |
-f deployProxy=true \ | |
-f deployStorage=false \ | |
-f deployStorageBroker=false \ | |
-f deployStorageController=false \ | |
-f branch=main \ | |
-f dockerTag=${{needs.meta.outputs.build-tag}} \ | |
-f deployPreprodRegion=true | |
gh workflow --repo neondatabase/infra run deploy-proxy-prod.yml --ref main \ | |
-f deployPgSniRouter=true \ | |
-f deployProxyLink=true \ | |
-f deployPrivatelinkProxy=true \ | |
-f deployProxyScram=true \ | |
-f deployProxyAuthBroker=true \ | |
-f branch=main \ | |
-f dockerTag=${{needs.meta.outputs.build-tag}} | |
;; | |
compute-release) | |
gh workflow --repo neondatabase/infra run deploy-compute-dev.yml --ref main -f dockerTag=${{needs.meta.outputs.build-tag}} | |
;; | |
*) | |
echo "RUN_KIND (value '${RUN_KIND}') is not set to either 'push-main', 'storage-release', 'proxy-release' or 'compute-release'" | |
exit 1 | |
;; | |
esac | |
notify-release-deploy-failure: | |
needs: [ meta, deploy ] | |
# We want this to run even if (transitive) dependencies are skipped, because deploy should really be successful on release branch workflow runs. | |
if: contains(fromJSON('["storage-release", "compute-release", "proxy-release"]'), needs.meta.outputs.run-kind) && needs.deploy.result != 'success' && always() | |
runs-on: ubuntu-22.04 | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- name: Post release-deploy failure to team slack channel | |
uses: slackapi/slack-github-action@485a9d42d3a73031f12ec201c457e2162c45d02d # v2.0.0 | |
env: | |
TEAM_ONCALL: >- | |
${{ | |
fromJSON(format('{ | |
"storage-release": "<!subteam^{0}|@oncall-storage>", | |
"compute-release": "<!subteam^{1}|@oncall-compute>", | |
"proxy-release": "<!subteam^{2}|@oncall-proxy>" | |
}', | |
vars.SLACK_ONCALL_STORAGE_GROUP, | |
vars.SLACK_ONCALL_COMPUTE_GROUP, | |
vars.SLACK_ONCALL_PROXY_GROUP | |
))[needs.meta.outputs.run-kind] | |
}} | |
CHANNEL: >- | |
${{ | |
fromJSON(format('{ | |
"storage-release": "{0}", | |
"compute-release": "{1}", | |
"proxy-release": "{2}" | |
}', | |
vars.SLACK_STORAGE_CHANNEL_ID, | |
vars.SLACK_COMPUTE_CHANNEL_ID, | |
vars.SLACK_PROXY_CHANNEL_ID | |
))[needs.meta.outputs.run-kind] | |
}} | |
with: | |
method: chat.postMessage | |
token: ${{ secrets.SLACK_BOT_TOKEN }} | |
payload: | | |
channel: ${{ env.CHANNEL }} | |
text: | | |
🔴 ${{ env.TEAM_ONCALL }}: deploy job on release branch had unexpected status "${{ needs.deploy.result }}" <${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}|GitHub Run>. | |
# The job runs on `release` branch and copies compatibility data and Neon artifact from the last *release PR* to the latest directory | |
promote-compatibility-data: | |
needs: [ meta, deploy ] | |
permissions: | |
id-token: write # aws-actions/configure-aws-credentials | |
statuses: write | |
contents: read | |
# `!failure() && !cancelled()` is required because the workflow transitively depends on the job that can be skipped: `push-neon-image-prod` and `push-compute-image-prod` | |
if: github.ref_name == 'release' && !failure() && !cancelled() | |
runs-on: ubuntu-22.04 | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2 | |
with: | |
aws-region: eu-central-1 | |
role-to-assume: ${{ vars.DEV_AWS_OIDC_ROLE_ARN }} | |
role-duration-seconds: 3600 | |
- name: Promote compatibility snapshot and Neon artifact | |
env: | |
BUCKET: neon-github-public-dev | |
AWS_REGION: eu-central-1 | |
COMMIT_SHA: ${{ github.sha }} | |
RUN_ID: ${{ needs.meta.outputs.release-pr-run-id }} | |
run: | | |
old_prefix="artifacts/${COMMIT_SHA}/${RUN_ID}" | |
new_prefix="artifacts/latest" | |
files_to_promote=() | |
files_on_s3=$(aws s3api list-objects-v2 --bucket ${BUCKET} --prefix ${old_prefix} | jq -r '.Contents[]?.Key' || true) | |
for arch in X64 ARM64; do | |
for build_type in debug release; do | |
neon_artifact_filename="neon-Linux-${arch}-${build_type}-artifact.tar.zst" | |
s3_key=$(echo "${files_on_s3}" | grep ${neon_artifact_filename} | sort --version-sort | tail -1 || true) | |
if [ -z "${s3_key}" ]; then | |
echo >&2 "Neither s3://${BUCKET}/${old_prefix}/${neon_artifact_filename} nor its version from previous attempts exist" | |
exit 1 | |
fi | |
files_to_promote+=("s3://${BUCKET}/${s3_key}") | |
for pg_version in v14 v15 v16 v17; do | |
# We run less tests for debug builds, so we don't need to promote them | |
if [ "${build_type}" == "debug" ] && { [ "${arch}" == "ARM64" ] || [ "${pg_version}" != "v17" ] ; }; then | |
continue | |
fi | |
compatibility_data_filename="compatibility-snapshot-${arch}-${build_type}-pg${pg_version}.tar.zst" | |
s3_key=$(echo "${files_on_s3}" | grep ${compatibility_data_filename} | sort --version-sort | tail -1 || true) | |
if [ -z "${s3_key}" ]; then | |
echo >&2 "Neither s3://${BUCKET}/${old_prefix}/${compatibility_data_filename} nor its version from previous attempts exist" | |
exit 1 | |
fi | |
files_to_promote+=("s3://${BUCKET}/${s3_key}") | |
done | |
done | |
done | |
for f in "${files_to_promote[@]}"; do | |
time aws s3 cp --only-show-errors ${f} s3://${BUCKET}/${new_prefix}/ | |
done | |
pin-build-tools-image: | |
needs: [ build-build-tools-image, test-images, build-and-test-locally ] | |
# `!failure() && !cancelled()` is required because the job (transitively) depends on jobs that can be skipped | |
if: github.ref_name == 'main' && !failure() && !cancelled() | |
uses: ./.github/workflows/pin-build-tools-image.yml | |
with: | |
from-tag: ${{ needs.build-build-tools-image.outputs.image-tag }} | |
secrets: inherit | |
# This job simplifies setting branch protection rules (in GitHub UI) | |
# by allowing to set only this job instead of listing many others. | |
# It also makes it easier to rename or parametrise jobs (using matrix) | |
# which requires changes in branch protection rules | |
# | |
# Note, that we can't add external check (like `neon-cloud-e2e`) we still need to use GitHub UI for that. | |
# | |
# https://github.com/neondatabase/neon/settings/branch_protection_rules | |
conclusion: | |
if: always() | |
# Format `needs` differently to make the list more readable. | |
# Usually we do `needs: [...]` | |
needs: | |
- meta | |
- build-and-test-locally | |
- check-codestyle-python | |
- check-codestyle-rust | |
- check-dependencies-rust | |
- files-changed | |
- push-compute-image-dev | |
- push-neon-image-dev | |
- test-images | |
- trigger-custom-extensions-build-and-wait | |
runs-on: ubuntu-22.04 | |
steps: | |
# The list of possible results: | |
# https://docs.github.com/en/actions/learn-github-actions/contexts#needs-context | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0 | |
with: | |
egress-policy: audit | |
- name: Fail the job if any of the dependencies do not succeed | |
run: exit 1 | |
if: | | |
contains(needs.*.result, 'failure') | |
|| contains(needs.*.result, 'cancelled') | |
|| (needs.check-dependencies-rust.result == 'skipped' && needs.files-changed.outputs.check-rust-dependencies == 'true' && contains(fromJSON('["pr", "storage-rc-pr", "proxy-rc-pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind)) | |
|| (needs.build-and-test-locally.result == 'skipped' && contains(fromJSON('["pr", "push-main", "storage-rc-pr", "proxy-rc-pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind)) | |
|| (needs.check-codestyle-python.result == 'skipped' && contains(fromJSON('["pr", "storage-rc-pr", "proxy-rc-pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind)) | |
|| (needs.check-codestyle-rust.result == 'skipped' && contains(fromJSON('["pr", "storage-rc-pr", "proxy-rc-pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind)) | |
|| needs.files-changed.result == 'skipped' | |
|| (needs.push-compute-image-dev.result == 'skipped' && contains(fromJSON('["push-main", "pr", "compute-release", "compute-rc-pr"]'), needs.meta.outputs.run-kind)) | |
|| (needs.push-neon-image-dev.result == 'skipped' && contains(fromJSON('["push-main", "pr", "storage-release", "storage-rc-pr", "proxy-release", "proxy-rc-pr"]'), needs.meta.outputs.run-kind)) | |
|| (needs.test-images.result == 'skipped' && contains(fromJSON('["push-main", "pr", "storage-rc-pr", "proxy-rc-pr", "compute-rc-pr"]'), needs.meta.outputs.run-kind)) | |
|| (needs.trigger-custom-extensions-build-and-wait.result == 'skipped' && contains(fromJSON('["push-main", "pr", "compute-release", "compute-rc-pr"]'), needs.meta.outputs.run-kind)) |