-
Notifications
You must be signed in to change notification settings - Fork 194
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use goreleaser to build binaries #601
base: master
Are you sure you want to change the base?
Conversation
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: justinsb The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
This issue is currently awaiting triage. If the repository mantainers determine this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
set -e | ||
set -x | ||
|
||
source $(git rev-parse --show-toplevel)/tools/common |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This assumes #599 , I've split it out for now
.goreleaser.yaml
Outdated
- main: ./cmd/gke-gcloud-auth-plugin | ||
id: gke-gcloud-auth-plugin | ||
no_unique_dist_dir: true | ||
binary: gke-gcloud-auth-plugin/{{.Os}}-{{.Arch}}/{{.Tag}}/gke-gcloud-auth-plugin |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These paths are surprising, but I'm trying to mirror the current GCS structure.
I would have thought that this structure would be more logical:
{{.Tag}}/{{.Os}}-{{.Arch}}/gke-gcloud-auth-plugin
or
gke-gcloud-auth-plugin/{{.Tag}}/{{.Os}}-{{.Arch}}/gke-gcloud-auth-plugin
But in general the current structure implies to me that we're tagging the different architectures separately, which is ... not what we're doing.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@ndixita @BenTheElder do you remember why we ended with these structures?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think they were just trying to get something hosted. I don't have strong opinions other than they should be predictable and uniquely identifiable
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm going to switch to something that is more conventional: project name (because we want to think of these as separate projects, even though they share a repo), then tag, then architecture.
The current staging buckets are basically broken anyway, they upload the binaries named by SHA, which I don't think work with our promotion tools or any tools I've seen in the ecosystem.
Justin ping me once you need reviews |
67a4cb4
to
a97e20f
Compare
In the interests of cleaning things up as we go, I switched to follow the more conventional file paths. I don't think it's breaking because I think today's file paths are incompatible with our promotion tools anyway. This doesn't actually do the upload anyway, so I'd argue it's purely additive. Want to take another look @aojea ? |
Similar to adopting ko for images, we set up a parallel build to the bazel build, with the intention of using that with the normal OSS "push-to-staging and promote" workflow.
a97e20f
to
8feeead
Compare
The Kubernetes project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
Continuing the idea of a parallel simpler build, leveraging goreleaser