Skip to content

Conversation

@fscheiner
Copy link
Member

No description provided.

@fscheiner
Copy link
Member Author

fscheiner commented Dec 3, 2021

This should now also enable the building and deployment performed with GitHub Actions but isn't tested yet. I'll merge it into my local master branch to make the GitHub Action work in my fork for a test of the build part. You can of course wait for my report before reviewing this PR, I'll add another comment later.

@matyasselmeci
I assume someone needs to put the ID_GCTUPLOADER secret into the UberFTP repo or move/put it onto the organization level, from where it can be used in each repo below the gridcf organization, too, to make the deployment (uploading of source tarballs) working.

The relevant files (travis-ci/upload_source_tarballs.sh, .github/workflows/build-deploy.yml ) were updated accordingly, but please check for any errors. I chose uberftp as remote base path on repo.gridcf.org, so it's separate from the GCT files.


Don't mind errors for the respecitve test build on Travis-CI for jobs on arm64. Currently the arm64 workers over at Travis-CI do not work reliably and unfortunately Travis-CI cannot differentiate between an actual build error and an error related to the build infrastructure.

Copy link
Member

@msalle msalle left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not an expert on these steps obviously, but it looks fine to me.
One question, perhaps we should use separate ssh keys? And perhaps good to not call it ID_GCTUPLOADER although that's mostly cosmetic of course.

@fscheiner
Copy link
Member Author

I'm not an expert on these steps obviously, but it looks fine to me. One question, perhaps we should use separate ssh keys?

Maybe, but if we could do with one key in the gridcf organization, that could be the easiest solution...

And perhaps good to not call it ID_GCTUPLOADER although that's mostly cosmetic of course.

...and then we could just call it ID_GRIDCF_UPLOADER?

@fscheiner
Copy link
Member Author

Ok, the build works in my fork, see https://github.com/fscheiner/UberFTP/runs/4408475140.

@fscheiner fscheiner mentioned this pull request Dec 3, 2021
6 tasks
@msalle
Copy link
Member

msalle commented Dec 3, 2021

I'm not an expert on these steps obviously, but it looks fine to me. One question, perhaps we should use separate ssh keys?

Maybe, but if we could do with one key in the gridcf organization, that could be the easiest solution...

And perhaps good to not call it ID_GCTUPLOADER although that's mostly cosmetic of course.

...and then we could just call it ID_GRIDCF_UPLOADER?

that sounds perfectly fine. In any case these points shouldn't block you from merging, we can always change things later.

@fscheiner
Copy link
Member Author

that sounds perfectly fine. In any case these points shouldn't block you from merging, we can always change things later.

You're right. Actually I wanted to wait until the secret is in place, but as the deployment only happens when we create a tag, it won't happen (and then possibly fail) until we make the next release anyhow. But still, I'd like to keep this open until @matyasselmeci had a chance to look into it.

Maybe better to also CC to @mtru32 because he created the original workflow for the GCT.

@fscheiner
Copy link
Member Author

@msalle, @matyasselmeci
Ok, time's up, I'm merging this now. But to make it fully work we still need the upload secret in place (see #17 (comment) for the proposed solution)

@fscheiner fscheiner merged commit 271af1c into gridcf:master Dec 9, 2021
@matyasselmeci
Copy link

Hi all,
I think the organization-wide secret (ID_GRIDCF_UPLOADER) would be a better fit here but creating one requires admin privileges on the organization, and I don't have those.

@fscheiner
Copy link
Member Author

Hi all, I think the organization-wide secret (ID_GRIDCF_UPLOADER) would be a better fit here but creating one requires admin privileges on the organization, and I don't have those.

Oh, sorry, Mat, I believed @brianhlin had admin priviilges on the organization, too, but I was wrong. I made you an owner now. :-)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants