@@ -104,11 +104,6 @@ jobs:
104
104
with :
105
105
fetch-depth : 2
106
106
107
- - run : Set-MpPreference -DisableRealtimeMonitoring $true
108
- shell : powershell
109
- - run : Get-MpComputerStatus
110
- shell : powershell
111
-
112
107
# Rust Log Analyzer can't currently detect the PR number of a GitHub
113
108
# Actions build on its own, so a hint in the log message is needed to
114
109
# point it in the right direction.
@@ -127,8 +122,8 @@ jobs:
127
122
# which then uses log commands to actually set them.
128
123
EXTRA_VARIABLES : ${{ toJson(matrix.env) }}
129
124
130
- - name : ensure the channel matches the target branch
131
- run : src/ci/scripts/verify-channel.sh
125
+ # - name: ensure the channel matches the target branch
126
+ # run: src/ci/scripts/verify-channel.sh
132
127
133
128
# - name: collect CPU statistics
134
129
# run: src/ci/scripts/collect-cpu-stats.sh
@@ -192,12 +187,15 @@ jobs:
192
187
unzip -d handle Handle.zip
193
188
echo "$PWD/handle" >> $GITHUB_PATH
194
189
195
- - name : run the build
196
- # Redirect stderr to stdout to avoid reordering the two streams in the GHA logs.
197
- run : src/ci/scripts/run-build-from-ci.sh 2>&1
198
- env :
199
- AWS_ACCESS_KEY_ID : ${{ env.CACHES_AWS_ACCESS_KEY_ID }}
200
- AWS_SECRET_ACCESS_KEY : ${{ secrets[format('AWS_SECRET_ACCESS_KEY_{0}', env.CACHES_AWS_ACCESS_KEY_ID)] }}
190
+ - name : Debug
191
+ run : src/ci/eric.sh
192
+
193
+ # - name: run the build
194
+ # # Redirect stderr to stdout to avoid reordering the two streams in the GHA logs.
195
+ # run: src/ci/scripts/run-build-from-ci.sh 2>&1
196
+ # env:
197
+ # AWS_ACCESS_KEY_ID: ${{ env.CACHES_AWS_ACCESS_KEY_ID }}
198
+ # AWS_SECRET_ACCESS_KEY: ${{ secrets[format('AWS_SECRET_ACCESS_KEY_{0}', env.CACHES_AWS_ACCESS_KEY_ID)] }}
201
199
202
200
- name : Windows debug
203
201
if : failure()
0 commit comments