From: Girar Builder awaiter robot <girar-builder@altlinux.org> To: Alexey Appolonov <alexey@altlinux.org> Cc: sisyphus-incominger@lists.altlinux.org, girar-builder-sisyphus@altlinux.org Subject: [#245017] TESTED (try 2) cve-manager.git=0.29.4-alt1 Date: Sat, 25 Jan 2020 15:21:46 +0000 Message-ID: <20200125152146.GA6179@gyle.altlinux.org> (raw) http://git.altlinux.org/tasks/245017/logs/events.2.1.log 2020-Jan-25 15:15:37 :: test-only task #245017 for sisyphus resumed by alexey: #100 removed #200 build 0.29.4-alt1 from /people/alexey/packages/cve-manager.git fetched at 2020-Jan-25 15:13:21 2020-Jan-25 15:15:38 :: [i586] #200 cve-manager.git 0.29.4-alt1: build start 2020-Jan-25 15:15:38 :: [x86_64] #200 cve-manager.git 0.29.4-alt1: build start 2020-Jan-25 15:15:38 :: [ppc64le] #200 cve-manager.git 0.29.4-alt1: build start 2020-Jan-25 15:15:38 :: [aarch64] #200 cve-manager.git 0.29.4-alt1: build start 2020-Jan-25 15:15:47 :: [i586] #200 cve-manager.git 0.29.4-alt1: build SKIPPED 2020-Jan-25 15:15:48 :: [aarch64] #200 cve-manager.git 0.29.4-alt1: build SKIPPED 2020-Jan-25 15:15:51 :: [ppc64le] #200 cve-manager.git 0.29.4-alt1: build SKIPPED 2020-Jan-25 15:16:54 :: [x86_64] #200 cve-manager.git 0.29.4-alt1: build OK 2020-Jan-25 15:17:03 :: #200: cve-manager.git 0.29.4-alt1: build check OK 2020-Jan-25 15:17:03 :: build check OK 2020-Jan-25 15:17:04 :: noarch check OK 2020-Jan-25 15:17:05 :: plan: src +1 -1 =17488, x86_64 +10 -10 =30962 2020-Jan-25 15:17:05 :: version check OK #200 cve-manager 0.29.3-alt1 -> 0.29.4-alt1 Sat Jan 25 2020 Alexey Appolonov <alexey@altlinux> 0.29.4-alt1 - cve-monitor reports take less memory space (by means of not including useless space symbols). 2020-Jan-25 15:17:44 :: generated apt indices 2020-Jan-25 15:17:44 :: created next repo 2020-Jan-25 15:18:15 :: dependencies check OK 2020-Jan-25 15:18:47 :: [x86_64] ELF symbols check OK warning [x86_64]: cpe-map=0.29.4-alt1: circular dependencies on cve-backup=0.29.4-alt1 cve-download=0.29.4-alt1 cve-fixes=0.29.4-alt1 cve-history=0.29.4-alt1 cve-import=0.29.4-alt1 cve-issues=0.29.4-alt1 cve-manager-common=0.29.4-alt1 cve-manager-inner-knowledge=2019.12.04-alt2 cve-manager=0.29.4-alt1 cve-monitor=0.29.4-alt1 2020-Jan-25 15:19:04 :: [x86_64] #200 cpe-map: install check OK warning [x86_64]: cve-backup=0.29.4-alt1: circular dependencies on cpe-map=0.29.4-alt1 cve-download=0.29.4-alt1 cve-fixes=0.29.4-alt1 cve-history=0.29.4-alt1 cve-import=0.29.4-alt1 cve-issues=0.29.4-alt1 cve-manager-common=0.29.4-alt1 cve-manager-inner-knowledge=2019.12.04-alt2 cve-manager=0.29.4-alt1 cve-monitor=0.29.4-alt1 2020-Jan-25 15:19:13 :: [x86_64] #200 cve-backup: install check OK warning [x86_64]: cve-download=0.29.4-alt1: circular dependencies on cpe-map=0.29.4-alt1 cve-backup=0.29.4-alt1 cve-fixes=0.29.4-alt1 cve-history=0.29.4-alt1 cve-import=0.29.4-alt1 cve-issues=0.29.4-alt1 cve-manager-common=0.29.4-alt1 cve-manager-inner-knowledge=2019.12.04-alt2 cve-manager=0.29.4-alt1 cve-monitor=0.29.4-alt1 2020-Jan-25 15:19:21 :: [x86_64] #200 cve-download: install check OK warning [x86_64]: cve-fixes=0.29.4-alt1: circular dependencies on cpe-map=0.29.4-alt1 cve-backup=0.29.4-alt1 cve-download=0.29.4-alt1 cve-history=0.29.4-alt1 cve-import=0.29.4-alt1 cve-issues=0.29.4-alt1 cve-manager-common=0.29.4-alt1 cve-manager-inner-knowledge=2019.12.04-alt2 cve-manager=0.29.4-alt1 cve-monitor=0.29.4-alt1 2020-Jan-25 15:19:30 :: [x86_64] #200 cve-fixes: install check OK warning [x86_64]: cve-history=0.29.4-alt1: circular dependencies on cpe-map=0.29.4-alt1 cve-backup=0.29.4-alt1 cve-download=0.29.4-alt1 cve-fixes=0.29.4-alt1 cve-import=0.29.4-alt1 cve-issues=0.29.4-alt1 cve-manager-common=0.29.4-alt1 cve-manager-inner-knowledge=2019.12.04-alt2 cve-manager=0.29.4-alt1 cve-monitor=0.29.4-alt1 2020-Jan-25 15:19:39 :: [x86_64] #200 cve-history: install check OK warning [x86_64]: cve-import=0.29.4-alt1: circular dependencies on cpe-map=0.29.4-alt1 cve-backup=0.29.4-alt1 cve-download=0.29.4-alt1 cve-fixes=0.29.4-alt1 cve-history=0.29.4-alt1 cve-issues=0.29.4-alt1 cve-manager-common=0.29.4-alt1 cve-manager-inner-knowledge=2019.12.04-alt2 cve-manager=0.29.4-alt1 cve-monitor=0.29.4-alt1 2020-Jan-25 15:19:47 :: [x86_64] #200 cve-import: install check OK warning [x86_64]: cve-issues=0.29.4-alt1: circular dependencies on cpe-map=0.29.4-alt1 cve-backup=0.29.4-alt1 cve-download=0.29.4-alt1 cve-fixes=0.29.4-alt1 cve-history=0.29.4-alt1 cve-import=0.29.4-alt1 cve-manager-common=0.29.4-alt1 cve-manager-inner-knowledge=2019.12.04-alt2 cve-manager=0.29.4-alt1 cve-monitor=0.29.4-alt1 2020-Jan-25 15:19:56 :: [x86_64] #200 cve-issues: install check OK warning [x86_64]: cve-manager=0.29.4-alt1: circular dependencies on cpe-map=0.29.4-alt1 cve-backup=0.29.4-alt1 cve-download=0.29.4-alt1 cve-fixes=0.29.4-alt1 cve-history=0.29.4-alt1 cve-import=0.29.4-alt1 cve-issues=0.29.4-alt1 cve-manager-common=0.29.4-alt1 cve-manager-inner-knowledge=2019.12.04-alt2 cve-monitor=0.29.4-alt1 2020-Jan-25 15:20:05 :: [x86_64] #200 cve-manager: install check OK warning [x86_64]: cve-manager-common=0.29.4-alt1: circular dependencies on cpe-map=0.29.4-alt1 cve-backup=0.29.4-alt1 cve-download=0.29.4-alt1 cve-fixes=0.29.4-alt1 cve-history=0.29.4-alt1 cve-import=0.29.4-alt1 cve-issues=0.29.4-alt1 cve-manager-inner-knowledge=2019.12.04-alt2 cve-manager=0.29.4-alt1 cve-monitor=0.29.4-alt1 2020-Jan-25 15:20:13 :: [x86_64] #200 cve-manager-common: install check OK warning [x86_64]: cve-monitor=0.29.4-alt1: circular dependencies on cpe-map=0.29.4-alt1 cve-backup=0.29.4-alt1 cve-download=0.29.4-alt1 cve-fixes=0.29.4-alt1 cve-history=0.29.4-alt1 cve-import=0.29.4-alt1 cve-issues=0.29.4-alt1 cve-manager-common=0.29.4-alt1 cve-manager-inner-knowledge=2019.12.04-alt2 cve-manager=0.29.4-alt1 2020-Jan-25 15:20:22 :: [x86_64] #200 cve-monitor: install check OK 2020-Jan-25 15:20:41 :: [x86_64-i586] generated apt indices 2020-Jan-25 15:20:41 :: [x86_64-i586] created next repo 2020-Jan-25 15:20:54 :: [x86_64-i586] dependencies check OK 2020-Jan-25 15:20:55 :: gears inheritance check OK 2020-Jan-25 15:20:55 :: srpm inheritance check OK girar-check-perms: access to cve-manager ALLOWED for alexey: project leader check-subtask-perms: #200: cve-manager: allowed for alexey 2020-Jan-25 15:20:55 :: acl check OK 2020-Jan-25 15:21:24 :: created contents_index files 2020-Jan-25 15:21:44 :: created hash files: src x86_64 2020-Jan-25 15:21:46 :: task #245017 for sisyphus TESTED
reply other threads:[~2020-01-25 15:21 UTC|newest] Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20200125152146.GA6179@gyle.altlinux.org \ --to=girar-builder@altlinux.org \ --cc=alexey@altlinux.org \ --cc=girar-builder-sisyphus@altlinux.org \ --cc=sisyphus-incominger@lists.altlinux.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
ALT Linux Girar Builder robot reports This inbox may be cloned and mirrored by anyone: git clone --mirror http://lore.altlinux.org/sisyphus-incominger/0 sisyphus-incominger/git/0.git # If you have public-inbox 1.1+ installed, you may # initialize and index your mirror using the following commands: public-inbox-init -V2 sisyphus-incominger sisyphus-incominger/ http://lore.altlinux.org/sisyphus-incominger \ sisyphus-incominger@lists.altlinux.org sisyphus-incominger@lists.altlinux.ru sisyphus-incominger@lists.altlinux.com public-inbox-index sisyphus-incominger Example config snippet for mirrors. Newsgroup available over NNTP: nntp://lore.altlinux.org/org.altlinux.lists.sisyphus-incominger AGPL code for this site: git clone https://public-inbox.org/public-inbox.git