Move CI from Travis to GitHub Workflows #2994
Closed
+270
−131
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Motivation
While Travis is a great tool, it has its problematic times. Currently almost every CI fails in one instance because of some network problems.
We already discussed this in the Discord a bit, and I think no one was really bound to Travis and the move to GitHub Workflows was generally supported.
Changes
This PR removes the .travis.yml file from the repository, so Travis is no longer triggered on merges.
Instead, I've created three workflow files according to the documentation.
The standard build workflow.
opened
,synchronize
andreopened
events. This is adjustable.build
andbuild_NetCore
.build
job:The
build
job contains a matrix: a list of Mono versions to use and a list of build configurations. It does one pass for each possibleconfiguration
+mono
combination (just like Travis did).The mono versions in the list are
5.20
,6.4
,6.6
and6.8
. So I removed5.16
and6.0
and added6.8
again compared to our current Travis config. I'm happy to change the versions, this was basically just what I filled in to have something for this workflow.It first removes the preinstalled Mono version (currently 6.4 on Ubuntu 18.04 workers, see this page)
Then it adds the Mono repository for the Mono version of this pass, and installs
mono-complete
. This step, as on Travis, takes the longest (~10 minutes). Unfortunately apt packages are not cacheable.Then it installs
libcurl4-openssl-dev
andxvfb
.Afterwards it tries to restore two caches for NuGet packages I've set up. They are keyed with the hash of the
packages.config
and all.csproj
files, so every change to those files (potentially changing our dependencies) invalidates them. In this case the packages are just downloaded as usual before build.The it's build time! Same command as before, nothing's changed there.
The
./build test+only
command has axvfb-run
prefixed, this is needed because I couldn't get xvfb to run as a service as it did in Travis. But I don't think that's a problem.If anything failed before, we get a nice message in the Discord. Note: This runs for PRs! So yes, we will get notifications for CI fails in PRs. This is easily changeable if it's too spammy.
build_NetCore
job:dotnet
. But the configuration matrix is there and containsDebug_NetCore
andRelease_NetCore
.3.1.1
(runtime) /3.1.101
(SDK).The deploy workflow
--delete
option:I couldn't really test this workflow, because it needs secrets set for the Docker Hub, to redeploy our Infra services and for the S3.
The release workflow:
upload_url
andtag_name
(i.e. the CKAN version)upload-release-asset
action for every single file we want to upload...It uploads the
ckan.exe
,AutoUpdater.exe
,ckan_*.deb
,CKAN.dmg
andckan-*.rpm
.You can click around in my repo to see what it looks like: https://github.com/DasSkelett/CKAN/actions
Examples:
Overview for one run of
build
for a PR: https://github.com/DasSkelett/CKAN/actions/runs/36093128And how it looks on the corresponding PR page: DasSkelett#7
The log output of a
release
run after creating a new CKAN release: https://github.com/DasSkelett/CKAN/runs/428138462?check_suite_focus=trueSecrets
We (as in someone with admin right in this repository) need to set some secrets for this to work:
DISCORD_WEBHOOK
DOCKERHUB_PASSWORD
DOCKERHUB_USERNAME
maybe? Was not a secret in Travis, but could make sense.AWS_SECRET_ACCESS_KEY
AWS_ACCESS_KEY_ID
maybe? Was not a secret in Travis, but could make sense.Future additions
We can extend this more in the future if we want.
It's really easiy to also upload artifacts to GitHub itself during actions. This could replace the S3 (or exist alongside) and we would have the artifacts more accessible here in the repository. We could upload an artifact during the deploy workflow (the one that is run after merges/pushes to master).
They are downlaodable via the API: https://developer.github.com/v3/actions/artifacts/