Re: CI, macports, darwin version problems
От | Joe Conway |
---|---|
Тема | Re: CI, macports, darwin version problems |
Дата | |
Msg-id | a4e6fa43-31df-48f5-a4a8-e512e178e06c@joeconway.com обсуждение исходный текст |
Ответ на | Re: CI, macports, darwin version problems (Thomas Munro <thomas.munro@gmail.com>) |
Ответы |
Re: CI, macports, darwin version problems
|
Список | pgsql-hackers |
On 8/1/24 21:42, Thomas Munro wrote: > On Thu, Aug 1, 2024 at 6:08 AM Christophe Pettus > <christophe.pettus@pgexperts.com> wrote: >> A quick search shows that the issue is most likely an old version of `tart`. I've upgraded both to the current cirrus/cliversion. Can you let me know if things look resolved? > > I re-enabled it in the pool that cfbot uses for a couple of hours, and > it said[1]: > > Persistent worker failed to start the task: tart command returned > non-zero exit code: "root privileges are required to run and > passwordless sudo was not available" > > I recall Joe and Andres dealing with something like that at some point > on their Macs, but I don't have the details... > > [1] https://cirrus-ci.com/task/5597845632319488 I think the solution was that the ci runner had to be executed directly as the ci user. 8<----------------- macmini:~ ci-run$ cat /Users/ci-run/bin/ci1.sh #!/bin/bash WORKER_NAME=jc-m2-1 TOKEN=/Users/ci-run/cirrus-token.txt WORKER_YML=/Users/ci-run/cirrus-worker-macos.yml BREW_BIN=/opt/homebrew/bin CIRRUS=${BREW_BIN}/cirrus CAT=/bin/cat export PATH=${BREW_BIN}:${PATH} ${CIRRUS} worker run \ -f "${WORKER_YML}" \ --name "${WORKER_NAME}" \ --token "$(${CAT} ${TOKEN})" macmini:~ ci-run$ /Users/ci-run/bin/ci1.sh & 8<----------------- I tried making this run like a service using launchctl, but that was giving the permissions errors. I finally gave up trying to figure it out and just accepted that I need to manually start the script whenever I reboot the mac. BTW, if there are any MacOS launchctl wizards around, I am all ears :-) -- Joe Conway PostgreSQL Contributors Team RDS Open Source Databases Amazon Web Services: https://aws.amazon.com
В списке pgsql-hackers по дате отправления: