[neon/ubuntu-core/Neon/core22] debian: Update to new variable names

Ben Cooksley null at kde.org
Thu Aug 8 13:07:15 BST 2024


Git commit de72ba89a9be4d17a316a2efd6f524fa64797b0e by Ben Cooksley.
Committed on 08/08/2024 at 12:07.
Pushed by bcooksley into branch 'Neon/core22'.

Update to new variable names

M  +2    -2    debian/neon-core-image-dangerous.yml
M  +2    -2    debian/neon-core-image-signed.yml
M  +2    -2    debian/neon-core-models.yml

https://invent.kde.org/neon/ubuntu-core/-/commit/de72ba89a9be4d17a316a2efd6f524fa64797b0e

diff --git a/debian/neon-core-image-dangerous.yml b/debian/neon-core-image-dangerous.yml
index 3b58419..d91a32c 100644
--- a/debian/neon-core-image-dangerous.yml
+++ b/debian/neon-core-image-dangerous.yml
@@ -3,9 +3,9 @@ neon-core-image-dangerous:
     # Prevent branch pipelines if an MR is open on the branch.
     - if: $CI_COMMIT_BRANCH && $CI_PIPELINE_SOURCE == "push" && $CI_OPEN_MERGE_REQUESTS
       when: never
-    # Only allow this job to run when the environment variables $KDE_NEON_CORE_IMAGE_KEY, $PRIVATE_KEY and $OWNER_TRUST are defined
+    # Only allow this job to run when the environment variables $SNAPCRAFT_STORE_CREDENTIALS, $SNAP_GPG_PRIVATE_KEY and $SNAP_GPG_OWNER_TRUST are defined
     # These are normally defined on protected branches on our normal repository but we do the logic this way to allow someone else to set this up in their fork if they want
-    - if: '$KDE_NEON_CORE_IMAGE_KEY != null && $PRIVATE_KEY != null && $OWNER_TRUST != null'
+    - if: '$SNAPCRAFT_STORE_CREDENTIALS != null && $SNAP_GPG_PRIVATE_KEY != null && $SNAP_GPG_OWNER_TRUST != null'
   variables:
     SNAPCRAFT_BUILD_ENVIRONMENT: "host"
     SNAPCRAFT_MANAGED_MODE: "y"
diff --git a/debian/neon-core-image-signed.yml b/debian/neon-core-image-signed.yml
index f124634..a40b20d 100644
--- a/debian/neon-core-image-signed.yml
+++ b/debian/neon-core-image-signed.yml
@@ -3,9 +3,9 @@ neon-core-image-signed:
     # Prevent branch pipelines if an MR is open on the branch.
     - if: $CI_COMMIT_BRANCH && $CI_PIPELINE_SOURCE == "push" && $CI_OPEN_MERGE_REQUESTS
       when: never
-    # Only allow this job to run when the environment variables $KDE_NEON_CORE_IMAGE_KEY, $PRIVATE_KEY and $OWNER_TRUST are defined
+    # Only allow this job to run when the environment variables $SNAPCRAFT_STORE_CREDENTIALS, $SNAP_GPG_PRIVATE_KEY and $SNAP_GPG_OWNER_TRUST are defined
     # These are normally defined on protected branches on our normal repository but we do the logic this way to allow someone else to set this up in their fork if they want
-    - if: '$KDE_NEON_CORE_IMAGE_KEY != null && $PRIVATE_KEY != null && $OWNER_TRUST != null'
+    - if: '$SNAPCRAFT_STORE_CREDENTIALS != null && $SNAP_GPG_PRIVATE_KEY != null && $SNAP_GPG_OWNER_TRUST != null'
   variables:
     SNAPCRAFT_BUILD_ENVIRONMENT: "host"
     SNAPCRAFT_MANAGED_MODE: "y"
diff --git a/debian/neon-core-models.yml b/debian/neon-core-models.yml
index 39ce3aa..387aca3 100644
--- a/debian/neon-core-models.yml
+++ b/debian/neon-core-models.yml
@@ -3,9 +3,9 @@ neon-core-models:
     # Prevent branch pipelines if an MR is open on the branch.
     - if: $CI_COMMIT_BRANCH && $CI_PIPELINE_SOURCE == "push" && $CI_OPEN_MERGE_REQUESTS
       when: never
-    # Only allow this job to run when the environment variables $KDE_NEON_CORE_IMAGE_KEY, $PRIVATE_KEY and $OWNER_TRUST are defined
+    # Only allow this job to run when the environment variables $SNAPCRAFT_STORE_CREDENTIALS, $SNAP_GPG_PRIVATE_KEY and $SNAP_GPG_OWNER_TRUST are defined
     # These are normally defined on protected branches on our normal repository but we do the logic this way to allow someone else to set this up in their fork if they want
-    - if: '$KDE_NEON_CORE_IMAGE_KEY != null && $PRIVATE_KEY != null && $OWNER_TRUST != null'
+    - if: '$SNAPCRAFT_STORE_CREDENTIALS != null && $SNAP_GPG_PRIVATE_KEY != null && $SNAP_GPG_OWNER_TRUST != null'
   variables:
     SNAPCRAFT_BUILD_ENVIRONMENT: "host"
     SNAPCRAFT_MANAGED_MODE: "y"


More information about the Neon-commits mailing list