Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
wolf
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Container Registry
Model registry
Operate
Environments
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
mobile_robotics
wolf_projects
wolf_lib
wolf
Commits
5d7b9469
Commit
5d7b9469
authored
3 years ago
by
Joan Vallvé Navarro
Browse files
Options
Downloads
Patches
Plain Diff
Update .gitlab-ci.yml file
parent
36cc74bd
No related branches found
No related tags found
1 merge request
!427
Resolve "Wolf license"
Pipeline
#7318
failed
3 years ago
Changes
1
Pipelines
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
.gitlab-ci.yml
+28
-60
28 additions, 60 deletions
.gitlab-ci.yml
with
28 additions
and
60 deletions
.gitlab-ci.yml
+
28
−
60
View file @
5d7b9469
############ YAML ANCHORS ############
.preliminaries_template
:
&preliminaries_definition
## Install ssh-agent if not already installed, it is required by Docker.
## (change apt-get to yum if you use an RPM-based image)
-
'
which
ssh-agent
||
(
apt-get
update
-y
&&
apt-get
install
openssh-client
-y
)'
## Run ssh-agent (inside the build environment)
-
eval $(ssh-agent -s)
## Add the SSH key stored in SSH_PRIVATE_KEY variable to the agent store
## We're using tr to fix line endings which makes ed25519 keys work
## without extra base64 encoding.
## https://gitlab.com/gitlab-examples/ssh-private-key/issues/1#note_48526556
-
mkdir -p ~/.ssh
-
chmod 700 ~/.ssh
-
echo "$SSH_PRIVATE_KEY" | tr -d '\r' | ssh-add - > /dev/null
# - echo "$SSH_KNOWN_HOSTS" > $HOME/.ssh/known_hosts
-
ssh-keyscan -H -p 2202 gitlab.iri.upc.edu >> $HOME/.ssh/known_hosts
# update apt
-
apt-get update
.build_and_test_template
:
&build_and_test_definition
.build_and_test_template
:
&build_and_test_definition
-
mkdir -pv build
-
mkdir -pv build
-
cd build
-
cd build
...
@@ -19,75 +41,21 @@ license_header:
...
@@ -19,75 +41,21 @@ license_header:
stage
:
license
stage
:
license
image
:
labrobotica/wolf_deps:16.04
image
:
labrobotica/wolf_deps:16.04
before_script
:
before_script
:
## Install ssh-agent if not already installed, it is required by Docker.
-
*preliminaries_definition
## (change apt-get to yum if you use an RPM-based image)
-
'
which
ssh-agent
||
(
apt-get
update
-y
&&
apt-get
install
openssh-client
-y
)'
## Run ssh-agent (inside the build environment)
-
eval $(ssh-agent -s)
## Add the SSH key stored in SSH_PRIVATE_KEY variable to the agent store
## We're using tr to fix line endings which makes ed25519 keys work
## without extra base64 encoding.
## https://gitlab.com/gitlab-examples/ssh-private-key/issues/1#note_48526556
-
mkdir -p ~/.ssh
-
chmod 644 ~/.ssh
-
echo "$SSH_PRIVATE_KEY" | tr -d '\r' | ssh-add - > /dev/null
# - echo "$SSH_KNOWN_HOSTS" > $HOME/.ssh/known_hosts
-
ssh-keyscan -H -p 2202 gitlab.iri.upc.edu >> $HOME/.ssh/known_hosts
# update apt
-
apt-get update
##
## Install ssh-agent if not already installed, it is required by Docker.
## (change apt-get to yum if you use an RPM-based image)
##
#- 'command -v ssh-agent >/dev/null || ( apt-get update -y && apt-get install openssh-client -y )'
##
## Run ssh-agent (inside the build environment)
##
#- eval $(ssh-agent -s)
##
## Add the SSH key stored in SSH_PRIVATE_KEY variable to the agent store
## We're using tr to fix line endings which makes ed25519 keys work
## without extra base64 encoding.
## https://gitlab.com/gitlab-examples/ssh-private-key/issues/1#note_48526556
##
#- echo "$SSH_PRIVATE_KEY" | tr -d '\r' | ssh-add -
##
## Create the SSH directory and give it the right permissions
##
#- mkdir -p ~/.ssh
#- chmod 700 ~/.ssh
##
## Assuming you created the SSH_KNOWN_HOSTS variable, uncomment the
## following two lines.
##
#- echo "$SSH_KNOWN_HOSTS"
#- echo "$SSH_KNOWN_HOSTS" >> ~/.ssh/known_hosts
#- ssh-keyscan -H -p 2202 gitlab.iri.upc.edu
#- ssh-keyscan -H -p 2202 gitlab.iri.upc.edu >> $HOME/.ssh/known_hosts
#- chmod 644 ~/.ssh/known_hosts
script
:
script
:
-
echo "$CI_EMAIL"
-
echo "$CI_USERNAME"
-
git config --global user.email "${CI_EMAIL}"
-
git config --global user.email "${CI_EMAIL}"
-
git config --global user.name "${CI_USERNAME}"
-
git config --global user.name "${CI_USERNAME}"
-
touch prova.txt
-
touch prova.txt
-
git add -f prova.txt
-
git add -f prova.txt
-
git commit -m "added prova.txt" || echo "No changes, nothing to commit!"
-
git commit -m "added prova.txt" || echo "No changes, nothing to commit!"
# we need to extract the ssh/git URL as the runner uses a tokenized URL
# we need to extract the ssh/git URL as the runner uses a tokenized URL
-
export CI_PUSH_REPO=`echo $CI_REPOSITORY_URL | perl -pe 's#.*@(.+?(\:\d+)?)/#git@\1:#'`
-
export CI_PUSH_REPO=`echo
ssh://
$CI_REPOSITORY_URL | perl -pe 's#.*@(.+?(\:\d+)?)/#git@\1:#'`
-
echo "$CI_PUSH_REPO"
-
echo "$CI_PUSH_REPO"
-
git remote set-url --push origin ssh://git@gitlab.iri.upc.edu:2202/mobile_robotics/wolf_projects/wolf_lib/wolf.git
-
git remote set-url --push origin $CI_PUSH_REPO
#- git remote set-url --push origin ssh://git@gitlab.iri.upc.edu:2202/mobile_robotics/wolf_projects/wolf_lib/wolf.git
-
echo "$CI_COMMIT_REF_NAME"
-
echo "$CI_COMMIT_REF_NAME"
# push changes
# push changes
# always return true so that the build does not fail if there are no changes
# always return true so that the build does not fail if there are no changes
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment