Commit Graph

12 Commits

Author SHA1 Message Date
14a610f770 fixup! wip: ci: use fedoraBuild
All checks were successful
RPMs/gasket-driver/pipeline/head This commit looks good
2025-11-23 16:32:51 -06:00
3b6bb8414e fixup! wip: ci: use fedoraBuild
Some checks failed
RPMs/gasket-driver/pipeline/head There was a failure building this commit
2025-11-23 16:07:45 -06:00
866065dc37 wip: ci: use fedoraBuild
All checks were successful
RPMs/gasket-driver/pipeline/head This commit looks good
2025-11-23 14:25:27 -06:00
2684e4b814 Add Conflicts to prevent upgrades
All checks were successful
RPMs/gasket-driver/pipeline/head This commit looks good
Since _kernel_ is an `installonly` package, "upgrading" actually
installs a new version instead of replacing the installed version.
Because of this, the `Requires` tag of _gasket-driver_ does not prevent
upgrading to a new version of the kernel, as the requirement will still
be satisfied by the old version.

To fully prevent upgrading to a new kernel for which there is no
_gasket-driver_ (which would prevent Frigate from starting after the
reboot), we need to add a `Conflicts` tag.  This will not allow RPM to
install a version of _kernel_ newer than the one that matches
_gasket-driver_.
2025-11-22 10:19:07 -06:00
63d4723e8b ci: Add generic webhook trigger
This will allow `updatecheck` to trigger builds by sending an HTTP POST
request when it finds an update for the _kernel_ package.
2025-11-22 10:19:07 -06:00
1a3a502213 Include kernel version in release tag
All checks were successful
RPMs/gasket-driver/pipeline/head This commit looks good
This will allow `dnf` to automatically upgrade the package when a new
build is published for a new kernel release.
2025-11-16 09:30:18 -06:00
5a6e882d45 ci: Fetch sources from local mirror
I've created a mirror of the _gasket-driver_ Git repository, to ensure
it remains available, even if Google decides to remove it or GitHub is
temporarily unavailable.
2025-11-16 09:30:18 -06:00
663a2976ad ci: Publish RPMs to dch Yum repo 2025-11-16 09:30:12 -06:00
7f673e3b5a ci: Sign RPMs 2025-11-16 09:29:52 -06:00
2b7954bb52 ci: Sign the kernel modules
It turns out, everything is already in place to enable kernel module
signing.  All that's necessary is to provide a certificate and private
key at the correct path; if those are present, the modules files will be
signed during `modules_install`.
2025-11-16 09:26:45 -06:00
cdc38a9f5a ci: Begin Jenkins pipeline 2025-11-16 09:26:41 -06:00
80088e46c8 Initial commit 2025-11-16 08:49:30 -06:00