-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Does CI fit as a standard xtask? #1
Comments
There are cases where it can be useful to wrap the standard rust tools
We can take the approach of providing community tools that wrap them or create libs for the xtasks. I guess one advantage for community tools is CI times since the CI could download a pre-built binary. |
These are all good questions! I feel that they all have good answers in the xtask world, but, at the same time, I don't think that these answers are obvious, so I agree that maybe it makes sense to remove So, let's remove
It's important that
Actually, being able to set
This I think is orthogonal to xtasks?
I think CI providers allow to specify steps by printing start/end "tags" to stdout using some special syntax? |
Hm, I've decided to just add some cautionary warnings and a link to this issue instead: it still seems to me that for complex multi-provider CI setups |
Not quite. I'm referring to there being no user-visible output (which users and some CIs use to determine if something is hung). I've run into cases where Travis thought my non-hung build was hung and I had to do extra steps to make travis not cancel my builds. |
I think AzDO supports this kind of stuff. I've not noticed it from the others. It is also CI-specific which makes it so helper crates either need to know about your CI, we need a special |
Are you referring to the fact that the user can more easily reproduce what the CI does? That doesn't address the concern that checking for warnings in a CI should only happens in specific contexts. We could make this a flag as well. As for |
I assume it is important for the sake of a user being able to test the standard they are being held to without having to dig into contributing docs or build pipelines? I had concerns over the flag names you mentioned (not quite communicating the policy) but looking at your commit, leaving the flags as implementation defined I think is the right approach. |
I would think that
If |
So you are assuming that a call to
|
Oh, I didn't know that And yeah, I remember there being talk of fixing the warnings issue; i just wasn't sure if it was far enough along to include in my analysis. |
I'm concerned that
xtask ci
will lead to less optimal practices as presented:test
) while others you only run once for performance (rustfmt
,clippy
) but this instead couples the CI tasks togetherRUSTFLAGS=-D warn cargo check
for consistent warnings) while others you need to run in every environmentI say this unsure whether to drop this
xtask
or to find ways to mitigate these concerns.The text was updated successfully, but these errors were encountered: