-
Notifications
You must be signed in to change notification settings - Fork 290
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improvements to running buf breaking
for workspaces
#3654
Comments
Really like the idea of being able to do a Mainly dropping a +1 for this. |
As a more general solution we might be able to add a new input that resolves modules to the BSR. This would allow any command that takes an input to use it, and avoid the need for the new flag. A workspace input would be required to resolve all named modules at a specific ref/label/commit to the BSR. It would also need the
An issue using the workspace input for breaking changes is that it won't capture module deletions. The workspace would resolve using the current configuration. For example if module B is removed between the main branch and the PR branch the previous |
Re: adding a new input type I like the overall idea of this, especially since workspaces are already a valid input type, it's more around better exposure and resolution of workspaces in different ways. I think we should invest some time this week to discuss what that means. In terms of the implementation suggestions above, a couple of things:
So a workspace is already a dir input, and that is for local workspaces. I know this is a suggestion for basically using a local file to inform resolving a remote workspace, but the way our inputs are resolved, they're either
Yeah, this is both a good thing and bad thing. If something was intentionally removed from a workspace's |
Feature
Right now there are some pain points to running
buf breaking
for workspaces:buf breaking
will error because there is an incongruence in the number of images between the input and the--against
.buf breaking
for a workspace against the registry. The user must runbuf breaking
for each module.buf breaking --against-registry
flag to address this, that would have the following behaviour:name
key in the module config.name
key is set or it is a pre-built image), then the module will be ignored.The text was updated successfully, but these errors were encountered: