Log in / Register Account

Webinar

Learning the basics of packaging with RPM

Watch recording from January 19, 2021

Systems administrators routinely use RPM Package Manager (RPM) to manage, install, update, or remove packages on their systems—it’s the native packaging format for Red Hat® Enterprise Linux® and it allows package management to be automated and controlled. But as more companies begin to develop or customize applications for their own unique needs,  RPM can become a tool not only to manage packages but to create them. This ability to create packages from source can help establish effective continuous integration/continuous delivery (CI/CD) environments as companies implement DevOps practices.

In this webinar, you'll see best practices for packaging software using RPM. We'll cover how to properly build software from source code into RPM packages, how to create RPM packages from precompiled binaries, and how to automate RPM builds from source code version control systems, such as git, for use in CI/CD pipelines. Also, you'll hear tips and tricks from lessons learned, such as how to set up and work with pristine build environments and why such things are important to software packaging.

This webinar will cover:

  • What is source code
  • How software is made, including natively compiled and interpreted programming languages
  • Building software from source
  • Patching software
  • Installing arbitrary artifacts
  • RPM package format
  • How to set up an RPM packaging workspace
  • What is an RPM specification file, including various directives and sections and RPM macros
  • BuildRoots
  • How to build RPMs

Live event date: Tuesday, January 19, 2021 | 11 a.m. ET

On-demand event: Available for one year afterward.

 

 

 


Adam Miller

Senior Principal Software Engineer, Red Hat

Adam Miller is a member of the Ansible® Engineering Team at Red Hat focusing on the Ansible Core runtime, Linux system administration automation, container orchestration integrations, and information security automation. He is a Red Hat Certified Engineer (Cert# 110-008-810) and an active member of the open source community with a running history of contributions to the Ansible and Fedora® projects.