Skip to content

Conversation

@driazati
Copy link
Member

@driazati driazati commented Dec 7, 2022

Hardcoding the Docker images in the Jenkinsfiles has the downside that only trusted changes are actually run in CI. Since Docker image updates are pretty frequent, this makes for a pretty bad UX (e.g. CI runs but doesn't actually test the PR). The fix here makes it so the images are read from a different file during CI execution so updates from anyone are picked up.

This PR eliminates the need to use the batch jobs in Jenkins to update Docker images. Docker images are built as part of post-merge CI on main and anyone can trigger a validation run by filing a PR with changed Docker tags.

@tvm-bot
Copy link
Collaborator

tvm-bot commented Dec 7, 2022

Thanks for contributing to TVM! Please refer to the contributing guidelines https://tvm.apache.org/docs/contribute/ for useful information and tips. Please request code reviews from Reviewers by @-ing them in a comment.

Generated by tvm-bot

Copy link
Contributor

@echuraev echuraev left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for nice improvement! LGTM. One minor question which should not affect on merging this PR.

@Mousius
Copy link
Member

Mousius commented Dec 7, 2022

@driazati can you rebase this? 😸

@Mousius Mousius self-requested a review December 7, 2022 11:05
@Mousius Mousius self-assigned this Dec 7, 2022
Hardcoding the Docker images in the Jenkinsfiles has the downside that
only trusted changes are actually run in CI. Since Docker image updates
are pretty frequent, this makes for a pretty bad UX (e.g. CI runs but
doesn't actually test the PR). The fix here makes it so the images are
read from a different file during CI execution so updates from anyone
are picked up.
@driazati driazati merged commit c5b8ab2 into apache:main Dec 9, 2022
fzi-peccia pushed a commit to fzi-peccia/tvm that referenced this pull request Mar 27, 2023
Hardcoding the Docker images in the Jenkinsfiles has the downside that only trusted changes are actually run in CI. Since Docker image updates are pretty frequent, this makes for a pretty bad UX (e.g. CI runs but doesn't actually test the PR). The fix here makes it so the images are read from a different file during CI execution so updates from anyone are picked up.

This PR eliminates the need to use the batch jobs in Jenkins to update Docker images. Docker images are built as part of post-merge CI on `main` and anyone can trigger a validation run by filing a PR with changed Docker tags.
mikeseven pushed a commit to mikeseven/tvm that referenced this pull request Sep 27, 2023
Hardcoding the Docker images in the Jenkinsfiles has the downside that only trusted changes are actually run in CI. Since Docker image updates are pretty frequent, this makes for a pretty bad UX (e.g. CI runs but doesn't actually test the PR). The fix here makes it so the images are read from a different file during CI execution so updates from anyone are picked up.

This PR eliminates the need to use the batch jobs in Jenkins to update Docker images. Docker images are built as part of post-merge CI on `main` and anyone can trigger a validation run by filing a PR with changed Docker tags.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants