Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ci: clean up rust-openssl workflow #944

Merged
merged 2 commits into from
Nov 9, 2023

Conversation

joshuasing
Copy link
Member

Clean up existing rust workflow.

Changes:

  • Move rust_regress.yml to rust-openssl.yml
  • Restrict GitHub Action token permissions to contents: read
  • Pin actions/checkout to v4
  • Use more common naming schemes
  • Tidy up styling
  • Add manual workflow_dispatch trigger

@botovq
Copy link
Contributor

botovq commented Nov 9, 2023 via email

@joshuasing
Copy link
Member Author

Yes, I have removed the mentioned lines and it appears to still run properly:
https://github.com/joshuasing/libressl-portable/actions/runs/6809749152/job/18516629522

@busterb busterb self-assigned this Nov 9, 2023
@busterb busterb merged commit 3ee9b72 into libressl:master Nov 9, 2023
33 checks passed
@joshuasing joshuasing deleted the ci/improve-rust branch November 9, 2023 12:31
@busterb
Copy link
Contributor

busterb commented Nov 10, 2023

Might want to check out https://github.com/libressl/portable/actions/runs/6819489823 which is results of the first scheduled run.

@joshuasing joshuasing added the CI label Nov 10, 2023
@botovq
Copy link
Contributor

botovq commented Nov 10, 2023 via email

run: |
cd rust-openssl
OPENSSL_DIR=${HOME}/opt
LD_LIBRARY_PATH=${HOME}/opt/lib
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Don't these environment variables need to be exported?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmm, I thought as those are in the same script they should apply to the cargo test line

@botovq
Copy link
Contributor

botovq commented Nov 10, 2023

called `Result::unwrap()` on an `Err` value: ErrorStack([Error { code: 50856204, library: "digital envelope routines", function: "inner_evp_generic_fetch", reason: "unsupported", file: "../crypto/evp/evp_fetch.c", line: 349, data: "Global default library context, Algorithm (SHA1 : 94), Properties (<null>)" }])

inner_evp_generic_fetch is an openssl 3 function that is being called. Presumably because the shell variable isn't picked up by cargo.

@joshuasing
Copy link
Member Author

This exact workflow is somehow working perfectly fine on my fork repository:
https://github.com/joshuasing/libressl-portable/actions/runs/6821208983/job/18551276024 (logs: https://pastes.dev/cgfub1k0TU)

OPENSSL_DIR=${HOME}/opt
LD_LIBRARY_PATH=${HOME}/opt/lib
patch -p1 < ../.github/rust-openssl.patch
cargo test
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you change this into cargo test --verbose, so we can see what's going on please?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sure

@botovq
Copy link
Contributor

botovq commented Jan 30, 2024

The last successful run of this workflow was https://github.com/libressl/portable/actions/runs/7675295067
It has failed for three days now because of Joel's shutdown changes. I am pretty sure I used to get notifications from scheduled CI run failures. Why wasn't I notified? Could you please make sure I get notifications if anything fails in CI?

@busterb
Copy link
Contributor

busterb commented Feb 5, 2024 via email

@busterb
Copy link
Contributor

busterb commented Feb 5, 2024

There is some oddity around how notifications for CI failures work.

I think locally, you need to ensure the below setting is enabled at least:

image

Additionally, it seems to send them to whoever enabled the cron job last
for the workflow?

https://docs.github.com/en/actions/monitoring-and-troubleshooting-workflows/notifications-for-workflow-runs

@botovq
Copy link
Contributor

botovq commented Feb 5, 2024

Thanks. I have all that set, as far as I can see. What good is scheduled CI if you need to make an effort to see its failures?

Anyway. I suspect I got notifications from my fork, which were now turned off in #991 because of the noise. I'll figure something out.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants