-
-
Notifications
You must be signed in to change notification settings - Fork 14.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Replacing ofBorg with GitHub Actions #355847
Comments
This issue has been mentioned on NixOS Discourse. There might be relevant details there: |
evaluation checks takes too many resource. I'm worried about if github action's machine can run it in reasonable time. |
@Bot-wxt1221 I managed to run it in 5 minutes for naive nix-env evaluation based on the default.nix entry point and 15 minutes using the same logic that ofborg uses: https://github.com/Mic92/nixpkgs/actions/workflows/eval.yml Both seem already faster compared to the hours of waiting for the ofborg queue that we experience today. Also this is not yet the end of the line of optimizations. We still have https://github.com/Mic92/nixpkgs/blob/main/pkgs/top-level/release-attrpaths-superset.nix to split evaluation in smaller parts that can run even in parallel. |
Will PR commands like |
I worry that bot accounts like ryantm-r can easily hit the limit of CI. CC @ryantm |
Yes it's possible:
|
Well. We have to try and see. Just now it's speculation if it works or not. |
Good to know, though huge builds like kernel and its modules, chromium and firefox will obviously not work. And we'll possibly have to setup a blacklist else even individual contributors will hit their limits. |
According to github doc:
So maybe we don't need to worry about time? |
You can run builds for 12h. Obviously we should establish some reasonable timeouts to be a good citizen in the ecosystem. |
Added a ^ meeting date for this. |
Maybe of interest for this issue, at least just for inspiration, but I've also (ab)used GitHub actions to build tests in my project using a dynamically generated matrix. My project uses flakes but this should be adaptable to non-flakes https://github.com/ibizaman/selfhostblocks/blob/main/.github/workflows/build.yaml |
See the meeting notes for today's infra meeting where we mainly discussed the CI situation: https://github.com/NixOS/infra/blob/7688f20babbeb27a10e4d8669fffe4b0ed00e17f/docs/meeting-notes/2024-11-14.md Here is the high-level plan:
Independently from meeting we also have other discussions about how we can develop ofborg in the future. However this might not happen before February, so we need some alternative solution in the meantime if not longer. |
I've opened a draft PR here for evaluating Nixpkgs using GitHub Actions: #356023. For just evaluation (and those only taking 5 minutes on each arch) instead of also building, I don't think we need to do the running-on-forks dance. Building is harder to get, but it's arguably also less important (and very orthogonal to evaluation). |
This issue has been mentioned on NixOS Discourse. There might be relevant details there: |
One important aspect that ofborg currently provides, and that this issue doesn't mention, is the performance report. For the majority of PRs the performance report is not important, but for work on The report currently does not report the impact of |
Could that be another on-demand GitHub actions job? We could even run automatically if certain paths has been changed. |
Building linux kernel is fine on Github Actions, the CPU time is sufficient, it takes less than 2 hours to build Jovian-NixOS linux kernel, and Github Actions offer max 6 hours per run. The only concern is disk space, workarounds:
All of the above workarounds are implemented in https://github.com/azuwis/actions/blob/main/nix/prepare.sh. Well, expect for 2), which can be set by:
|
Sounds good to me. |
I am concerned about building the kernel modules (both in tree and out of tree). |
Well. We should be quickly able to filter out and blacklist packages we don't want to build once the source of truth lives in the repository? Also we can actually stop github actions, which was not possible with ofborg builds. |
@ibizaman did you see this? https://github.com/thecaralice/flake-gha |
Another eval failure on memory: https://github.com/NixOS/nixpkgs/actions/runs/12468993409/job/34801318849 |
The error I am seeing in your link is:
That doesn't seem to be memory related. |
Oh thank you - I just say the message at the bottom stating how much memory is available and I thought it was because of this. Thank you and sorry for the noise :). |
The |
Looks like GitHub is caching some variables (like branch info), even in subsequent re runs. Should be fixed by a (force) push. We can also configure the yml to run on edited events, (which includes base branch change event, pr body updated), like https://github.com/NixOS/nixpkgs/blob/adaa9f280329b5f814e8dc83eceddd42b20f72f4/.github/workflows/nixpkgs-vet.yml#L14C1-L14C51 Wish there was just a |
Couldn't this be solved by using GitHub branch protection rules/rulesets instead of a workflow? |
https://github.com/NixOS/nixpkgs/actions/runs/12563383510/job/35025186249 out of memory (push to master -- subsequent count calculations will fail) |
Some PRs eval "processing" seems to get failed, which fails subsequent Tag job. Example: https://github.com/NixOS/nixpkgs/actions/runs/12563389748/job/35025265089?pr=369760 (#369760) |
looks due to the out of memory failure in #355847 (comment) |
@paparodeo Perhaps we need to increase the swap size/add a swap. #356023 (comment) |
Failure to add the PR's author, who is a maintainer as well, as a reviewer: https://github.com/NixOS/nixpkgs/actions/runs/12580336431/job/35062292601 Introduced in #366046, I guess. |
@wolfgangwalther potential fix: #370186 |
The eval action doesn’t properly fail on warnings, which is a regression from ofborg; see #371223. (It’d be great to get some insight into what attribute is causing the warnings, as that was a consistent pain point of ofborg-eval, but not failing at all is the bigger issue.) |
Another issue regarding Tag subjob of Eval failing on #371701: https://github.com/NixOS/nixpkgs/actions/runs/12646467735/job/35237397411?pr=371701 |
(It didn't fail, it was skipped.) And the reason is that regular merges by GHA are not evaluated by CI, so there is no base job to compare against. |
Hm. That's a problem. Depending on which commit is currently the latest on the target branch, you either get labelling and maintainer pings - or not. Entirely by chance, basically. This needs to work in all cases. I see some options here:
|
Sounds like the most appropriate/easiest option. Perhaps we can reuse nix-backports app token here. It does seem like it has commit perms (Repository: read write) NixOS/org#38 |
Created #372041 |
This is one of the two plans to ensure we can also perform github evaluation checks in the future.
See https://discourse.nixos.org/t/infrastructure-announcement-the-future-of-ofborg-your-help-needed/56025
for more information.
To replace OfBorg’s functions with GitHub Actions the following tasks need to be implemented:
I already created a proof of concept pull request here: #352808
Update
We have our first jitsi meeting to coordinate the migration on the 14.11 (today) at 17:00 UTC (18:00 Berlin time) at https://jitsi.lassul.us/nixos-infra
The text was updated successfully, but these errors were encountered: