github.com/argoproj/argo-cd@v1.8.7/docs/developer-guide/ci.md (about)

     1  # Continuous Integration (CI)
     2  
     3  ## Troubleshooting CI checks
     4  
     5  You can click on the "Details" link next to the failed step to get more information about the failure.
     6  
     7  ![Failed GitHub Action](ci-pipeline-failed.png)
     8  
     9  To read more about The GitHub actions are configured in [`ci-build.yaml`](https://github.com/argoproj/argo-cd/blob/master/.github/workflows/ci-build.yaml).
    10  
    11  ### Can I retrigger the checks without pushing a new commit?
    12  
    13  Since the CI pipeline is triggered on Git commits, there is currently no (known) way on how to retrigger the CI checks without pushing a new commit to your branch.
    14  
    15  If you are absolutely sure that the failure was due to a failure in the pipeline, and not an error within the changes you commited, you can push an empty commit to your branch, thus retriggering the pipeline without any code changes. To do so, issue
    16  
    17  ```bash
    18  git commit --allow-empty -m "Retrigger CI pipeline"
    19  git push origin <yourbranch>
    20  ```
    21  
    22  ### Why does the build step fail?
    23  
    24  First, make sure the failing build step succeeds on your machine. Remember the containerized build toolchain is available, too.
    25  
    26  If the build is failing at the `Ensuring Gopkg.lock is up-to-date` step, you need to update the dependencies before you push your commits. Run `make dep-ensure` and `make dep` and commit the changes to `Gopkg.lock` to your branch.
    27  
    28  ### Why does the codegen step fail?
    29  
    30  If the codegen step fails with "Check nothing has changed...", chances are high that you did not run `make codegen`, or did not commit the changes it made. You should double check by running `make codegen` followed by `git status` in the local working copy of your branch. Commit any changes and push them to your GH branch to have the CI check it again.
    31  
    32  A second common case for this is, when you modified any of the auto generated assets, as these will be overwritten upon `make codegen`.
    33  
    34  Generally, this step runs `codegen` and compares the outcome against the Git branch it has checked out. If there are differences, the step will fail.
    35  
    36  See [What checked-in code is generated and where does it come from?](faq.md#what-checked-in-code-is-generated-and-how-is-it-generated) for more information.
    37  
    38  ### Why does the lint step fail?
    39  
    40  Your code failed to lint correctly, or modifications were performed by the `golangci-lint` process.
    41  
    42  * You should run `make lint`, or `golangci-lint run` on your local branch and fix all the issues.
    43  
    44  * If you receive an error like, ```File is not `goimports`-ed (goimports)```, the file is not formatted correctly. Run `gofmt -w $file.go` to resolve this linter error.
    45  
    46  ### Why does the test or e2e steps fail?
    47  
    48  You should check for the cause of the failure in the check's detail page as described above. This will give you the name of the test that has failed, and details about why. If your test are passing locally (using the virtualized toolchain), chances are that the test might be flaky and will pass the next time it is run. Please retrigger the CI pipeline as described above and see if the test step now passes.
    49  
    50  ## Updating The Builder Image
    51  
    52  Login to Docker Hub:
    53  
    54  ```bash
    55  docker login
    56  ```
    57  
    58  Build image:
    59  
    60  ```bash
    61  make builder-image IMAGE_NAMESPACE=argoproj IMAGE_TAG=v1.0.0
    62  ```
    63  
    64  ## Public CD
    65  
    66  Every commit to master is built and published to `docker.pkg.github.com/argoproj/argo-cd/argocd:<version>-<short-sha>`. The list of images is available at
    67  https://github.com/argoproj/argo-cd/packages.
    68  
    69  !!! note
    70      Github docker registry [requires](https://github.community/t5/GitHub-Actions/docker-pull-from-public-GitHub-Package-Registry-fail-with-quot/m-p/32888#M1294) authentication to read
    71      even publicly available packages. Follow the steps from Kubernetes [documentation](https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry)
    72      to configure image pull secret if you want to use `docker.pkg.github.com/argoproj/argo-cd/argocd` image.
    73  
    74  The image is automatically deployed to the dev Argo CD instance: [https://cd.apps.argoproj.io/](https://cd.apps.argoproj.io/)