[neon/ubuntu-core/Neon/core22] debian: Update to new variable names
Ben Cooksley
null at kde.org
Thu Aug 8 13:07:15 BST 2024
Git commit de72ba89a9be4d17a316a2efd6f524fa64797b0e by Ben Cooksley.
Committed on 08/08/2024 at 12:07.
Pushed by bcooksley into branch 'Neon/core22'.
Update to new variable names
M +2 -2 debian/neon-core-image-dangerous.yml
M +2 -2 debian/neon-core-image-signed.yml
M +2 -2 debian/neon-core-models.yml
https://invent.kde.org/neon/ubuntu-core/-/commit/de72ba89a9be4d17a316a2efd6f524fa64797b0e
diff --git a/debian/neon-core-image-dangerous.yml b/debian/neon-core-image-dangerous.yml
index 3b58419..d91a32c 100644
--- a/debian/neon-core-image-dangerous.yml
+++ b/debian/neon-core-image-dangerous.yml
@@ -3,9 +3,9 @@ neon-core-image-dangerous:
# Prevent branch pipelines if an MR is open on the branch.
- if: $CI_COMMIT_BRANCH && $CI_PIPELINE_SOURCE == "push" && $CI_OPEN_MERGE_REQUESTS
when: never
- # Only allow this job to run when the environment variables $KDE_NEON_CORE_IMAGE_KEY, $PRIVATE_KEY and $OWNER_TRUST are defined
+ # Only allow this job to run when the environment variables $SNAPCRAFT_STORE_CREDENTIALS, $SNAP_GPG_PRIVATE_KEY and $SNAP_GPG_OWNER_TRUST are defined
# These are normally defined on protected branches on our normal repository but we do the logic this way to allow someone else to set this up in their fork if they want
- - if: '$KDE_NEON_CORE_IMAGE_KEY != null && $PRIVATE_KEY != null && $OWNER_TRUST != null'
+ - if: '$SNAPCRAFT_STORE_CREDENTIALS != null && $SNAP_GPG_PRIVATE_KEY != null && $SNAP_GPG_OWNER_TRUST != null'
variables:
SNAPCRAFT_BUILD_ENVIRONMENT: "host"
SNAPCRAFT_MANAGED_MODE: "y"
diff --git a/debian/neon-core-image-signed.yml b/debian/neon-core-image-signed.yml
index f124634..a40b20d 100644
--- a/debian/neon-core-image-signed.yml
+++ b/debian/neon-core-image-signed.yml
@@ -3,9 +3,9 @@ neon-core-image-signed:
# Prevent branch pipelines if an MR is open on the branch.
- if: $CI_COMMIT_BRANCH && $CI_PIPELINE_SOURCE == "push" && $CI_OPEN_MERGE_REQUESTS
when: never
- # Only allow this job to run when the environment variables $KDE_NEON_CORE_IMAGE_KEY, $PRIVATE_KEY and $OWNER_TRUST are defined
+ # Only allow this job to run when the environment variables $SNAPCRAFT_STORE_CREDENTIALS, $SNAP_GPG_PRIVATE_KEY and $SNAP_GPG_OWNER_TRUST are defined
# These are normally defined on protected branches on our normal repository but we do the logic this way to allow someone else to set this up in their fork if they want
- - if: '$KDE_NEON_CORE_IMAGE_KEY != null && $PRIVATE_KEY != null && $OWNER_TRUST != null'
+ - if: '$SNAPCRAFT_STORE_CREDENTIALS != null && $SNAP_GPG_PRIVATE_KEY != null && $SNAP_GPG_OWNER_TRUST != null'
variables:
SNAPCRAFT_BUILD_ENVIRONMENT: "host"
SNAPCRAFT_MANAGED_MODE: "y"
diff --git a/debian/neon-core-models.yml b/debian/neon-core-models.yml
index 39ce3aa..387aca3 100644
--- a/debian/neon-core-models.yml
+++ b/debian/neon-core-models.yml
@@ -3,9 +3,9 @@ neon-core-models:
# Prevent branch pipelines if an MR is open on the branch.
- if: $CI_COMMIT_BRANCH && $CI_PIPELINE_SOURCE == "push" && $CI_OPEN_MERGE_REQUESTS
when: never
- # Only allow this job to run when the environment variables $KDE_NEON_CORE_IMAGE_KEY, $PRIVATE_KEY and $OWNER_TRUST are defined
+ # Only allow this job to run when the environment variables $SNAPCRAFT_STORE_CREDENTIALS, $SNAP_GPG_PRIVATE_KEY and $SNAP_GPG_OWNER_TRUST are defined
# These are normally defined on protected branches on our normal repository but we do the logic this way to allow someone else to set this up in their fork if they want
- - if: '$KDE_NEON_CORE_IMAGE_KEY != null && $PRIVATE_KEY != null && $OWNER_TRUST != null'
+ - if: '$SNAPCRAFT_STORE_CREDENTIALS != null && $SNAP_GPG_PRIVATE_KEY != null && $SNAP_GPG_OWNER_TRUST != null'
variables:
SNAPCRAFT_BUILD_ENVIRONMENT: "host"
SNAPCRAFT_MANAGED_MODE: "y"
More information about the Neon-commits
mailing list