ALT Linux Girar Builder robot reports
 help / color / mirror / Atom feed
From: "Girar pender (alexey)" <girar-builder@altlinux.org>
To: Alexey Appolonov <alexey@altlinux.org>
Cc: sisyphus-incominger@lists.altlinux.org,
	girar-builder-sisyphus@altlinux.org
Subject: [#322038] DONE (try 3) cve-manager.git=0.78.0-alt1
Date: Thu, 1 Jun 2023 13:43:52 +0000
Message-ID: <girar.task.322038.3.1@gyle.mskdc.altlinux.org> (raw)
In-Reply-To: <girar.task.322038.1.1@gyle.mskdc.altlinux.org>

https://git.altlinux.org/tasks/archive/done/_314/322038/logs/events.3.1.log

subtask  name         aarch64  armh  i586  ppc64le  x86_64
   #400  cve-manager     2:04     -     -     2:09    1:25

2023-Jun-01 13:34:44 :: task #322038 for sisyphus resumed by alexey:
#100 removed
#200 removed
#300 removed
#400 build 0.78.0-alt1 from /people/alexey/packages/cve-manager.git fetched at 2023-Jun-01 13:34:28
2023-Jun-01 13:34:46 :: [armh] #400 cve-manager.git 0.78.0-alt1: build start
2023-Jun-01 13:34:46 :: [ppc64le] #400 cve-manager.git 0.78.0-alt1: build start
2023-Jun-01 13:34:46 :: [aarch64] #400 cve-manager.git 0.78.0-alt1: build start
2023-Jun-01 13:34:46 :: [x86_64] #400 cve-manager.git 0.78.0-alt1: build start
2023-Jun-01 13:34:46 :: [i586] #400 cve-manager.git 0.78.0-alt1: build start
2023-Jun-01 13:34:53 :: [i586] #400 cve-manager.git 0.78.0-alt1: build SKIPPED
2023-Jun-01 13:35:08 :: [armh] #400 cve-manager.git 0.78.0-alt1: build SKIPPED
2023-Jun-01 13:36:11 :: [x86_64] #400 cve-manager.git 0.78.0-alt1: build OK
2023-Jun-01 13:36:50 :: [aarch64] #400 cve-manager.git 0.78.0-alt1: build OK
2023-Jun-01 13:36:55 :: [ppc64le] #400 cve-manager.git 0.78.0-alt1: build OK
2023-Jun-01 13:37:28 :: #400: cve-manager.git 0.78.0-alt1: build check OK
2023-Jun-01 13:37:30 :: build check OK
2023-Jun-01 13:37:34 :: noarch check OK
2023-Jun-01 13:37:36 :: plan: src +1 -1 =18450, aarch64 +13 -13 =31580, ppc64le +13 -13 =30962, x86_64 +13 -13 =32468
#400 cve-manager 0.77.1-alt1 -> 0.78.0-alt1
 Thu Jun 01 2023 Alexey Appolonov <alexey@altlinux> 0.78.0-alt1
 - New ability to monitor CVE IDs mapped to BDU IDs;
 - Fixed monitoring of map of package names to product names.
2023-Jun-01 13:38:15 :: patched apt indices
2023-Jun-01 13:38:27 :: created next repo
2023-Jun-01 13:38:36 :: duplicate provides check OK
2023-Jun-01 13:39:12 :: dependencies check OK
2023-Jun-01 13:39:34 :: [x86_64 aarch64 ppc64le] ELF symbols check OK
warning [x86_64]: cpe-map=0.78.0-alt1: circular dependencies on cve-issues=0.78.0-alt1 cve-manager-inner-knowledge=2023.05.29-alt1 cve-manager=0.78.0-alt1
2023-Jun-01 13:39:48 :: [x86_64] #400 cpe-map: install check OK
2023-Jun-01 13:39:52 :: [x86_64] #400 cve-backup: install check OK
2023-Jun-01 13:39:58 :: [x86_64] #400 cve-download: install check OK
warning [ppc64le]: cpe-map=0.78.0-alt1: circular dependencies on cve-issues=0.78.0-alt1 cve-manager-inner-knowledge=2023.05.29-alt1 cve-manager=0.78.0-alt1
2023-Jun-01 13:40:03 :: [x86_64] #400 cve-history: install check OK
2023-Jun-01 13:40:04 :: [ppc64le] #400 cpe-map: install check OK
warning [aarch64]: cpe-map=0.78.0-alt1: circular dependencies on cve-issues=0.78.0-alt1 cve-manager-inner-knowledge=2023.05.29-alt1 cve-manager=0.78.0-alt1
2023-Jun-01 13:40:06 :: [aarch64] #400 cpe-map: install check OK
2023-Jun-01 13:40:08 :: [x86_64] #400 cve-import: install check OK
2023-Jun-01 13:40:13 :: [ppc64le] #400 cve-backup: install check OK
2023-Jun-01 13:40:17 :: [aarch64] #400 cve-backup: install check OK
2023-Jun-01 13:40:19 :: [x86_64] #400 cve-import-debuginfo: install check OK
2023-Jun-01 13:40:25 :: [ppc64le] #400 cve-download: install check OK
warning [x86_64]: cve-issues=0.78.0-alt1: circular dependencies on cpe-map=0.78.0-alt1 cve-manager-inner-knowledge=2023.05.29-alt1 cve-manager=0.78.0-alt1
2023-Jun-01 13:40:26 :: [x86_64] #400 cve-issues: install check OK
2023-Jun-01 13:40:27 :: [aarch64] #400 cve-download: install check OK
warning [x86_64]: cve-manager=0.78.0-alt1: circular dependencies on cpe-map=0.78.0-alt1 cve-issues=0.78.0-alt1 cve-manager-inner-knowledge=2023.05.29-alt1
2023-Jun-01 13:40:32 :: [x86_64] #400 cve-manager: install check OK
2023-Jun-01 13:40:34 :: [ppc64le] #400 cve-history: install check OK
2023-Jun-01 13:40:36 :: [aarch64] #400 cve-history: install check OK
2023-Jun-01 13:40:37 :: [x86_64] #400 cve-manager-common: install check OK
2023-Jun-01 13:40:43 :: [x86_64] #400 cve-manager-vuln-list: install check OK
2023-Jun-01 13:40:46 :: [ppc64le] #400 cve-import: install check OK
2023-Jun-01 13:40:47 :: [aarch64] #400 cve-import: install check OK
2023-Jun-01 13:40:48 :: [x86_64] #400 cve-monitor: install check OK
2023-Jun-01 13:40:52 :: [x86_64] #400 libcve-manager: install check OK
2023-Jun-01 13:40:59 :: [x86_64] #400 libcve-manager-debuginfo: install check OK
2023-Jun-01 13:41:05 :: [aarch64] #400 cve-import-debuginfo: install check OK
2023-Jun-01 13:41:08 :: [ppc64le] #400 cve-import-debuginfo: install check OK
warning [aarch64]: cve-issues=0.78.0-alt1: circular dependencies on cpe-map=0.78.0-alt1 cve-manager-inner-knowledge=2023.05.29-alt1 cve-manager=0.78.0-alt1
2023-Jun-01 13:41:17 :: [aarch64] #400 cve-issues: install check OK
warning [ppc64le]: cve-issues=0.78.0-alt1: circular dependencies on cpe-map=0.78.0-alt1 cve-manager-inner-knowledge=2023.05.29-alt1 cve-manager=0.78.0-alt1
2023-Jun-01 13:41:22 :: [ppc64le] #400 cve-issues: install check OK
warning [aarch64]: cve-manager=0.78.0-alt1: circular dependencies on cpe-map=0.78.0-alt1 cve-issues=0.78.0-alt1 cve-manager-inner-knowledge=2023.05.29-alt1
2023-Jun-01 13:41:28 :: [aarch64] #400 cve-manager: install check OK
warning [ppc64le]: cve-manager=0.78.0-alt1: circular dependencies on cpe-map=0.78.0-alt1 cve-issues=0.78.0-alt1 cve-manager-inner-knowledge=2023.05.29-alt1
2023-Jun-01 13:41:35 :: [ppc64le] #400 cve-manager: install check OK
2023-Jun-01 13:41:38 :: [aarch64] #400 cve-manager-common: install check OK
2023-Jun-01 13:41:45 :: [ppc64le] #400 cve-manager-common: install check OK
2023-Jun-01 13:41:49 :: [aarch64] #400 cve-manager-vuln-list: install check OK
2023-Jun-01 13:41:58 :: [aarch64] #400 cve-monitor: install check OK
2023-Jun-01 13:41:58 :: [ppc64le] #400 cve-manager-vuln-list: install check OK
2023-Jun-01 13:42:07 :: [aarch64] #400 libcve-manager: install check OK
2023-Jun-01 13:42:08 :: [ppc64le] #400 cve-monitor: install check OK
2023-Jun-01 13:42:18 :: [ppc64le] #400 libcve-manager: install check OK
2023-Jun-01 13:42:19 :: [aarch64] #400 libcve-manager-debuginfo: install check OK
2023-Jun-01 13:42:31 :: [ppc64le] #400 libcve-manager-debuginfo: install check OK
2023-Jun-01 13:42:47 :: [x86_64-i586] generated apt indices
2023-Jun-01 13:42:47 :: [x86_64-i586] created next repo
2023-Jun-01 13:42:56 :: [x86_64-i586] dependencies check OK
2023-Jun-01 13:42:58 :: gears inheritance check OK
2023-Jun-01 13:42:58 :: srpm inheritance check OK
girar-check-perms: access to cve-manager ALLOWED for alexey: project leader
check-subtask-perms: #400: cve-manager: allowed for alexey
2023-Jun-01 13:42:58 :: acl check OK
2023-Jun-01 13:43:10 :: created contents_index files
2023-Jun-01 13:43:19 :: created hash files: aarch64 ppc64le src x86_64
2023-Jun-01 13:43:22 :: task #322038 for sisyphus TESTED
2023-Jun-01 13:43:22 :: task is ready for commit
2023-Jun-01 13:43:28 :: repo clone OK
2023-Jun-01 13:43:28 :: packages update OK
2023-Jun-01 13:43:35 :: [x86_64 aarch64 ppc64le] update OK
2023-Jun-01 13:43:35 :: repo update OK
2023-Jun-01 13:43:48 :: repo save OK
2023-Jun-01 13:43:49 :: src index update OK
2023-Jun-01 13:43:49 :: updated /gears/c/cve-manager.git branch `sisyphus'
2023-Jun-01 13:43:52 :: gears update OK
2023-Jun-01 13:43:52 :: task #322038 for sisyphus DONE


      parent reply	other threads:[~2023-06-01 13:43 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-05-27 17:56 [#322038] TESTED cve-manager.git=alpha Girar awaiter (alexey)
2023-05-31 22:21 ` [#322038] TESTED (try 2) cve-manager.git=alpha Girar awaiter (alexey)
2023-06-01 13:43 ` Girar pender (alexey) [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=girar.task.322038.3.1@gyle.mskdc.altlinux.org \
    --to=girar-builder@altlinux.org \
    --cc=alexey@altlinux.org \
    --cc=devel@lists.altlinux.org \
    --cc=girar-builder-sisyphus@altlinux.org \
    --cc=sisyphus-incominger@lists.altlinux.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link

ALT Linux Girar Builder robot reports

This inbox may be cloned and mirrored by anyone:

	git clone --mirror http://lore.altlinux.org/sisyphus-incominger/0 sisyphus-incominger/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 sisyphus-incominger sisyphus-incominger/ http://lore.altlinux.org/sisyphus-incominger \
		sisyphus-incominger@lists.altlinux.org sisyphus-incominger@lists.altlinux.ru sisyphus-incominger@lists.altlinux.com
	public-inbox-index sisyphus-incominger

Example config snippet for mirrors.
Newsgroup available over NNTP:
	nntp://lore.altlinux.org/org.altlinux.lists.sisyphus-incominger


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git