From patchwork Fri Jun 12 02:24:39 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Oliver O'Halloran X-Patchwork-Id: 1307951 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from lists.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 49jl2v5QBYz9sSP for ; Fri, 12 Jun 2020 12:26:15 +1000 (AEST) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20161025 header.b=loIqs8fd; dkim-atps=neutral Received: from bilbo.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3]) by lists.ozlabs.org (Postfix) with ESMTP id 49jl2v3bD6zDqrn for ; Fri, 12 Jun 2020 12:26:15 +1000 (AEST) X-Original-To: skiboot@lists.ozlabs.org Delivered-To: skiboot@lists.ozlabs.org Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=gmail.com (client-ip=2a00:1450:4864:20::341; helo=mail-wm1-x341.google.com; envelope-from=oohall@gmail.com; receiver=) Authentication-Results: lists.ozlabs.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: lists.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20161025 header.b=loIqs8fd; dkim-atps=neutral Received: from mail-wm1-x341.google.com (mail-wm1-x341.google.com [IPv6:2a00:1450:4864:20::341]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 49jl1j39SyzDqrm for ; Fri, 12 Jun 2020 12:25:13 +1000 (AEST) Received: by mail-wm1-x341.google.com with SMTP id u13so6702190wml.1 for ; Thu, 11 Jun 2020 19:25:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=MIpsg3TzG7riSmTWYvhsO4L2RJrMEkYAa5dPhpeEqFc=; b=loIqs8fdxxfqOVfej4FdnB8vfgzyW6LbEZDTu31BB4bJ14wgQNolOc+ilMB61kUx4m PQNUsYNI86PHfDDhGtgEbc10asBotJLEdTFj2auMmCNc9eQ0OQfPenwFOPa2RDTyLDdq wj4gP0CJNg8tb5ZpsgdVgpqtzzP2jNmJDMpdma1Fmi/4seKSVVhyny4a2RwJ1zpjKZIX yQpxrL6TB/xkCkhKGYLiJ4Jb45zJAMHmBoExDHdbKVKNAM5+qqKiK2YA0HY0OYZRyRc6 P8cvpDiqVNDaQUcVoXaYWU994qYNhx5cOkD6tMAlpeNRdxNQjJPsImcSPjzCoyGtLUEG OmXg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=MIpsg3TzG7riSmTWYvhsO4L2RJrMEkYAa5dPhpeEqFc=; b=W2/1xjaLRxPyRYVpQQUMXO9MEsyTUzOh2ljstKgsBEJ3WAYOcsqeYHKvrqVOdT4HCW 0yHg/gDaY7PxktMZz/EeX8j7sv1J7o0vLGuI1iCxTwreHwMMlrBLEotKo+FqfSoT2xrx VbsdyUSkcBgJ3oOpPtsEr05n4wn9tNGNLbGaNdPBSUWKjVu+tMmXWJLjSp/gY3vqe+zH 6AcuBsbDH+udePjWe4O3Op3Ze4gDjXtQAcw2sqZqej8jPucYnwrM2ppJSuyBVeXOlyLK EbGrma8lrbqVbw3vEFS9BnBoTBQPlCGmvarNVgzd8GvE4VcB+wuQRNJEjU9Z/hry8oUJ 0EbA== X-Gm-Message-State: AOAM532UQWWeCsm0qoHPK4liHOW5qXrXB9qwrT3Q+yldb9tBYUmDzKtM jCRE+eZvz3+le8qMYOUmLVYReRup X-Google-Smtp-Source: ABdhPJxU52BPEl7/xvzVAKcFsOeo5Xe2tup+Meui7vTL2vbH8jl1iLKi0QW9sJRXabt3mGnJVHg3uQ== X-Received: by 2002:a1c:6006:: with SMTP id u6mr10824580wmb.39.1591928709547; Thu, 11 Jun 2020 19:25:09 -0700 (PDT) Received: from localhost.ibm.com (123-243-125-185.tpgi.com.au. [123.243.125.185]) by smtp.gmail.com with ESMTPSA id h7sm6756948wml.24.2020.06.11.19.25.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Jun 2020 19:25:09 -0700 (PDT) From: Oliver O'Halloran To: skiboot@lists.ozlabs.org Date: Fri, 12 Jun 2020 12:24:39 +1000 Message-Id: <20200612022452.371685-3-oohall@gmail.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200612022452.371685-1-oohall@gmail.com> References: <20200612022452.371685-1-oohall@gmail.com> MIME-Version: 1.0 Subject: [Skiboot] [PATCH 02/15] travis: Remove the unused coverity token X-BeenThere: skiboot@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Mailing list for skiboot development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org Sender: "Skiboot" In 7cd8402c3bec the coverity job config was moved to a seperate branch. The encrypted token was left in the main .travis.yaml file though so travis includes the token in the web interfaces which crowds out the information we actually care about (which docker container we used). Signed-off-by: Oliver O'Halloran Reviewed-by: Vasant Hegde --- .travis.yml | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/.travis.yml b/.travis.yml index f3a22c44f26e..44079e669fde 100644 --- a/.travis.yml +++ b/.travis.yml @@ -17,10 +17,6 @@ env: - RUN_ON_CONTAINER=debian-stretch - RUN_ON_CONTAINER=debian-unstable - RUN_ON_CONTAINER=docs - global: - # The next declaration is the encrypted COVERITY_SCAN_TOKEN, created - # via the "travis encrypt" command using the project repo's public key - secure: "MpNEGFa1VrF/vsQq24n5UgfRbz1wVC6B8mubFnyK4gX0IuQ9xhWuTzMLUQF9UJxe5jnC2DTmVUvYTYN/hggw+PpYwbOOAE0QGR5pmPHA4PSRmc5pxt1q18/sv7EPFw66GFyWJq94nWjpigyKQ8KGtA67j1xFqrDoS43OA76WZgo=" matrix: allow_failures: @@ -42,6 +38,9 @@ script: - docker build --pull -t ${RUN_ON_CONTAINER} -f opal-ci/Dockerfile-${RUN_ON_CONTAINER} . && docker run --volume $HOME/.ccache:/root/.ccache --volume `pwd`:/build --rm -t $RUN_ON_CONTAINER bash -c "./opal-ci/build-${RUN_ON_CONTAINER}.sh"; + +# apparently this needs to be in the master branch in order for it to work on +# other branches too. addons: coverity_scan: project: