qwat / qwat-data-model

TEKSI Water module (project QWAT) - PostgreSQL / postgis Datamodel
https://www.teksi.ch
23 stars 25 forks source link

[travis] Update to postgres 9.6 #181

Closed m-kuhn closed 7 years ago

haubourg commented 7 years ago

Hi, it seems we are not alone to face issues since 12 days: https://github.com/travis-ci/travis-ci/issues/6972

adding this to config seems to solve the issue but costs 22 seconds of build time:

  apt:
    packages:
    - postgresql-9.6-postgis-2.3
m-kuhn commented 7 years ago

Thanks @haubourg , trying this now

haubourg commented 7 years ago

Thanks @m-kuhn Merged, we now are back to the authentication issue @sylvainbeo

m-kuhn commented 7 years ago

In case you have special characters ("special" in bash context) in the password, have a look at this instruction:

https://github.com/opengisch/qfieldsync/blob/master/.travis.yml#L34

haubourg commented 7 years ago

You mean adding double quotes around secure encrypted key would do?

m-kuhn commented 7 years ago

escaped single quotes + single quotes is what I needed to do.

But without having your password at hand it's very hard to give any guarantees :stuck_out_tongue_winking_eye:

haubourg commented 7 years ago

Oh, before encrypting password then.. I also saw double quote around the key in your travis example. @sylvainbeo we need you then !

sylvainbeo commented 7 years ago

I'm trying that.

sylvainbeo commented 7 years ago

Mmm, in our case we don't encrypt a password but a token, with no special char...

sylvainbeo commented 7 years ago

travis-encrypt -r qwat/qwat-data-sample GH_TOKEN=[xxxxxxxxxxx]

m-kuhn commented 7 years ago

then it shouldn't be an issue...

the same commands executed locally succeed?

m-kuhn commented 7 years ago
export GH_TOKEN=[xxxxxx]
./scripts/deploy.sh # or whatever it is for you
sylvainbeo commented 7 years ago

We don't need to do the export. COnfig is directly in .travis.yml

sylvainbeo commented 7 years ago

@m-kuhn Do you well understand the travis-encrypt command ? I mean, each time we execute it, it override the last generated public token ?

m-kuhn commented 7 years ago

The "clear-text" token was generated once.

Everytime you encrypt it, it generates an encrypted version for this token. I think these encrypted versions can be used interchangeably.

sylvainbeo commented 7 years ago

Ok, that's what i thought