-
Notifications
You must be signed in to change notification settings - Fork 129
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Optimise image rebuilding #276
Comments
Just pulling new base image might be good. But newly released (security) patches are normally not released to the docker images, until a new minor release of the distribution is released. |
The Debian images at the base of our images ancestry are at least updated monthly (the Alpine images only more infrequently), but you're right, we probably should upgrade packages in our build process. |
In my opinion it's the job of the base image provider to release updates and security fixes and the consumers (we) can/should rely on this -> separation of concerns. |
@thomascube I agree, but as long as upstream doesn't do that I would still prefer to have up-to-date images. And as we call them "production-ready" they should be solid – no matter who did what. |
Since today our image are rebuilt weekly.
Most of the time this will make sense because the upstream image changed, but sometimes the runner will run in vain. In order to prevent that we could use Renovate to check if the upstream images actually changed.
(Idea originally by @thomascube in #270 (comment))
The text was updated successfully, but these errors were encountered: