summaryrefslogtreecommitdiff
path: root/.gitlab-ci.yml
Commit message (Collapse)AuthorAgeFilesLines
* ci: Fix artifact recollection at build stageCarlos Garnacho2023-02-071-1/+2
| | | | | | | | | | From https://docs.gitlab.com/ee/ci/yaml/#artifactspaths it doesn't look like gitlab yaml does not expect shell command execution there. CI does indeed complain about this: WARNING: invalid path "": unexpected command substitution at 1:1 Fix this by using a glob pattern.
* build: Use gcr4 by default, but have an option to use gcr3 tooMilan Crha2022-07-191-1/+1
| | | | | The gcr4 replaces gcr3, thus make it possible to use either of the two, while defaulting to gcr4, as it'll live for a longer time.
* .gitlab-ci.yml: Install libgweather4Javier Jardón2022-02-101-1/+1
|
* ci: Only run on "crun" tagged runners for nowBenjamin Berg2022-02-101-6/+10
| | | | | | The others are not erroring out correctly for close_range syscalls, causing issues when spawning. So use the "crun" runners and disable "asan" as there is no overlap.
* .gitlab-ci.yml: Try to use fedora 36Javier Jardón2022-02-101-2/+2
|
* ci: Install libXfixes-develOlivier Fourdan2021-07-261-0/+1
| | | | | libXfixes 6.0 provides the new ClientDisconnectMode that clients can use to declare themselves as to-be-terminated.
* ci: Remove xorg-x11-utils package is gone and is not neededBenjamin Berg2021-07-161-1/+1
|
* ci: Update CI template and runner tagsBenjamin Berg2020-12-111-5/+2
| | | | | | The new FDO templates do not need privileged runners anymore. Also, those do not exist and the asan should be run on the asan runner instead.
* ci: Update CI to use newer fdo templatesBenjamin Berg2020-05-251-4/+11
|
* ci: Update to adjust fdo template changes and switch to rawhideBenjamin Berg2020-03-201-8/+7
| | | | | The used template was changed. Also switch back to rawhide as it is working again now (requiring a dependency update).
* ci: Move to use the wayland ci-templates from freedesktop.orgBenjamin Berg2020-02-181-61/+73
| | | | This also fixes building the image inside non-privileged containers.
* ci: Separate shared variables to *docker_common_variablesBartłomiej Piotrowski2019-11-301-9/+8
|
* ci: Switch to docker:stable-dind to avoid breaking changesBartłomiej Piotrowski2019-11-301-1/+1
|
* ci: Disable TLS to allow building with new dockerBenjamin Berg2019-11-301-0/+6
| | | | | | The images have not been updated for a while due to a docker TLS issue. Disabling it fixes this, see https://about.gitlab.com/blog/2019/07/31/docker-in-docker-with-docker-19-dot-03/
* CI: Allow failures of delivery task for nowBenjamin Berg2019-02-051-0/+2
| | | | | | Currently the coverage report is not generating, causing the delivery to also fail. As we are already allowing a coverage failure, do the same for delivery.
* CI: Build with -Db_lundef for msanBenjamin Berg2019-02-051-1/+1
| | | | This is needed to build libgsd.
* CI: Enable verbose output during testingBenjamin Berg2019-02-051-1/+1
|
* CI: Allow coverage to failBenjamin Berg2019-02-051-0/+2
| | | | | It appears to be broken currently on rawhide. Assume that this is just an intermitten failure and hope it will just start working eventually.
* CI: Also store build directory when the job failedBenjamin Berg2019-02-051-0/+1
|
* CI: Add exceptions to not run for scheduled tasksBenjamin Berg2019-02-041-0/+14
|
* CI: create and save Docker images in GNOME GitLabClaudio André2019-02-041-0/+64
|
* CI: add code coverage reportClaudio André2019-02-041-0/+44
| | | | | It works only if enabled via CI/CD Settings. More info available at https://docs.gitlab.com/ee/user/project/pipelines/settings.html#test-coverage-parsing.
* CI: add ASAN, MSAN, TSAN and UBSAN SanitizersClaudio André2019-02-041-0/+32
| | | | | | | | | | | | | | | | | | | | | | | AddressSanitizer (or ASan) is a programming tool that detects memory corruption bugs such as buffer overflows or use after free. AddressSanitizer is based on compiler instrumentation. MemorySanitizer (MSan) is a detector of uninitialized memory reads in C/C++ programs. Uninitialized values occur when stack- or heap-allocated memory is read before it is written. ThreadSanitizer is a tool that detects data races. UndefinedBehaviorSanitizer (UBSan) is a fast undefined behavior detector. UBSan catches various kinds of undefined behavior, for example: - Using misaligned or null pointer - Signed integer overflow - Conversion to, from, or between floating-point types which would overflow the destination The llvm.org states that Sanitizers have found thousands of bugs everywhere. Sanitizers running during CI can prevent bugs from taking up residence. They are helper tools to maintain bugs out.
* CI: Improve continuous integration speedClaudio André2019-02-041-32/+51
| | | | The expected gain is 5 minutes.
* ci: Make deploy script output more debugBastien Nocera2019-02-041-1/+1
| | | | | As it's really only useful to read the logs when things fail, best to have a bit more information there.
* ci: Fix xsettings GTK module testBastien Nocera2019-02-041-2/+2
| | | | | The libcanberra gtk module wasn't installed, which made the test suite fail. Add libcanberra-gtk3 to the CI packages to fix this.
* build: Remove libXtst as a dependencyBastien Nocera2019-02-041-1/+1
|
* power: Test backlight directly using umockdevBenjamin Berg2018-09-271-1/+1
| | | | | This replaces the special cases and temporary files hack used beforehand and enables testing of the async logic in the backlight code.
* tests: Port to python 3Benjamin Berg2018-07-191-1/+1
| | | | | | Port the test suite to python 3. Fixes #65
* ci: Introduce CIwip/benzea/ciGeorges Basile Stavracas Neto2018-04-101-0/+63