mirror of
https://github.com/ClickHouse/ClickHouse.git
synced 2024-11-23 08:02:02 +00:00
Better
This commit is contained in:
parent
2d4c91db2f
commit
5df03dd12f
@ -132,6 +132,22 @@ def main():
|
|||||||
|
|
||||||
subprocess.check_call(f"sudo chown -R ubuntu:ubuntu {temp_path}", shell=True)
|
subprocess.check_call(f"sudo chown -R ubuntu:ubuntu {temp_path}", shell=True)
|
||||||
|
|
||||||
|
# Cleanup run log from the credentials of CI logs database.
|
||||||
|
# Note: a malicious user can still print them by splitting the value into parts.
|
||||||
|
# But we will be warned when a malicious user modifies CI script.
|
||||||
|
# Although they can also print them from inside tests.
|
||||||
|
# Nevertheless, the credentials of the CI logs have limited scope
|
||||||
|
# and does not provide access to sensitive info.
|
||||||
|
|
||||||
|
ci_logs_host = os.getenv("CLICKHOUSE_CI_LOGS_HOST", "CLICKHOUSE_CI_LOGS_HOST")
|
||||||
|
ci_logs_password = os.getenv(
|
||||||
|
"CLICKHOUSE_CI_LOGS_PASSWORD", "CLICKHOUSE_CI_LOGS_PASSWORD"
|
||||||
|
)
|
||||||
|
subprocess.check_call(
|
||||||
|
f"sed -i -r -e 's!{ci_logs_host}!CLICKHOUSE_CI_LOGS_HOST!g; s!{ci_logs_password}!CLICKHOUSE_CI_LOGS_PASSWORD!g;' '{run_log_path}'",
|
||||||
|
shell=True,
|
||||||
|
)
|
||||||
|
|
||||||
check_name_lower = (
|
check_name_lower = (
|
||||||
check_name.lower().replace("(", "").replace(")", "").replace(" ", "")
|
check_name.lower().replace("(", "").replace(")", "").replace(" ", "")
|
||||||
)
|
)
|
||||||
@ -181,22 +197,6 @@ def main():
|
|||||||
|
|
||||||
ch_helper = ClickHouseHelper()
|
ch_helper = ClickHouseHelper()
|
||||||
|
|
||||||
# Cleanup run log from the credentials of CI logs database.
|
|
||||||
# Note: a malicious user can still print them by splitting the value into parts.
|
|
||||||
# But we will be warned when a malicious user modifies CI script.
|
|
||||||
# Although they can also print them from inside tests.
|
|
||||||
# Nevertheless, the credentials of the CI logs have limited scope
|
|
||||||
# and does not provide access to sensitive info.
|
|
||||||
|
|
||||||
ci_logs_host = os.getenv("CLICKHOUSE_CI_LOGS_HOST", "CLICKHOUSE_CI_LOGS_HOST")
|
|
||||||
ci_logs_password = os.getenv(
|
|
||||||
"CLICKHOUSE_CI_LOGS_PASSWORD", "CLICKHOUSE_CI_LOGS_PASSWORD"
|
|
||||||
)
|
|
||||||
subprocess.check_call(
|
|
||||||
f"sed -i -r -e 's!{ci_logs_host}!CLICKHOUSE_CI_LOGS_HOST!g; s!{ci_logs_password}!CLICKHOUSE_CI_LOGS_PASSWORD!g;' '{run_log_path}'",
|
|
||||||
shell=True,
|
|
||||||
)
|
|
||||||
|
|
||||||
prepared_events = prepare_tests_results_for_clickhouse(
|
prepared_events = prepare_tests_results_for_clickhouse(
|
||||||
pr_info,
|
pr_info,
|
||||||
[test_result],
|
[test_result],
|
||||||
|
Loading…
Reference in New Issue
Block a user