From: Girar Builder awaiter robot <girar-builder@altlinux.org> To: Alexey Appolonov <alexey@altlinux.org> Cc: sisyphus-incominger@lists.altlinux.org, Ivan Zakharyaschev <imz@altlinux.org>, Denis Medvedev <nbr@altlinux.org>, girar-builder-sisyphus@altlinux.org Subject: [#245255] TESTED (try 17) cve-manager-inner-knowledge.git=2020.02.05-alt1 libtree.git=0.4.0-alt1 ... Date: Sat, 8 Feb 2020 19:13:59 +0000 Message-ID: <20200208191358.GA23919@gyle.altlinux.org> (raw) http://git.altlinux.org/tasks/245255/logs/events.17.1.log 2020-Feb-08 19:02:52 :: test-only task #245255 for sisyphus resumed by alexey: #100 removed #200 removed #300 removed #400 removed #500 removed #600 removed #620 removed #640 removed #660 removed #700 removed #1000 removed #1040 build 2020.02.05-alt1 from /people/alexey/packages/cve-manager-inner-knowledge.git fetched at 2020-Feb-06 12:05:12 #1100 removed #1200 removed #1300 removed #1400 removed #1500 removed #1600 removed #1640 build 0.4.0-alt1 from /people/alexey/packages/libtree.git fetched at 2020-Feb-07 20:43:35 #1700 removed #2000 build 0.30.0-alt1 from /people/alexey/packages/cve-manager.git fetched at 2020-Feb-08 19:02:43 2020-Feb-08 19:03:11 :: created build repo 2020-Feb-08 19:03:12 :: [i586] #1040 cve-manager-inner-knowledge.git 2020.02.05-alt1: build start 2020-Feb-08 19:03:12 :: [ppc64le] #1040 cve-manager-inner-knowledge.git 2020.02.05-alt1: build start 2020-Feb-08 19:03:12 :: [x86_64] #1040 cve-manager-inner-knowledge.git 2020.02.05-alt1: build start 2020-Feb-08 19:03:13 :: [aarch64] #1040 cve-manager-inner-knowledge.git 2020.02.05-alt1: build start 2020-Feb-08 19:03:32 :: [i586] #1040 cve-manager-inner-knowledge.git 2020.02.05-alt1: build SKIPPED 2020-Feb-08 19:03:32 :: [i586] #1640 libtree.git 0.4.0-alt1: build start 2020-Feb-08 19:03:34 :: [x86_64] cve-manager-inner-knowledge.git 2020.02.05-alt1: remote: no need to rebuild 2020-Feb-08 19:03:34 :: [x86_64] #1040 cve-manager-inner-knowledge.git 2020.02.05-alt1: build OK 2020-Feb-08 19:03:34 :: [x86_64] #1640 libtree.git 0.4.0-alt1: build start 2020-Feb-08 19:03:35 :: [aarch64] #1040 cve-manager-inner-knowledge.git 2020.02.05-alt1: build SKIPPED 2020-Feb-08 19:03:35 :: [aarch64] #1640 libtree.git 0.4.0-alt1: build start 2020-Feb-08 19:03:41 :: [ppc64le] #1040 cve-manager-inner-knowledge.git 2020.02.05-alt1: build SKIPPED 2020-Feb-08 19:03:41 :: [ppc64le] #1640 libtree.git 0.4.0-alt1: build start 2020-Feb-08 19:04:13 :: [i586] #1640 libtree.git 0.4.0-alt1: build OK 2020-Feb-08 19:04:13 :: [i586] #2000 cve-manager.git 0.30.0-alt1: build start 2020-Feb-08 19:04:13 :: [x86_64] #1640 libtree.git 0.4.0-alt1: build OK 2020-Feb-08 19:04:13 :: [x86_64] #2000 cve-manager.git 0.30.0-alt1: build start 2020-Feb-08 19:04:21 :: [aarch64] #1640 libtree.git 0.4.0-alt1: build OK 2020-Feb-08 19:04:21 :: [aarch64] #2000 cve-manager.git 0.30.0-alt1: build start 2020-Feb-08 19:04:25 :: [i586] #2000 cve-manager.git 0.30.0-alt1: build SKIPPED 2020-Feb-08 19:04:29 :: [ppc64le] #1640 libtree.git 0.4.0-alt1: build OK 2020-Feb-08 19:04:29 :: [ppc64le] #2000 cve-manager.git 0.30.0-alt1: build start 2020-Feb-08 19:04:35 :: [aarch64] #2000 cve-manager.git 0.30.0-alt1: build SKIPPED 2020-Feb-08 19:04:43 :: [ppc64le] #2000 cve-manager.git 0.30.0-alt1: build SKIPPED 2020-Feb-08 19:05:36 :: [x86_64] #2000 cve-manager.git 0.30.0-alt1: build OK 2020-Feb-08 19:05:41 :: #1040: cve-manager-inner-knowledge.git 2020.02.05-alt1: build check OK 2020-Feb-08 19:05:52 :: #1640: libtree.git 0.4.0-alt1: build check OK 2020-Feb-08 19:06:02 :: #2000: cve-manager.git 0.30.0-alt1: build check OK 2020-Feb-08 19:06:03 :: build check OK 2020-Feb-08 19:06:04 :: noarch check OK 2020-Feb-08 19:06:06 :: plan: src +3 -3 =17478, aarch64 +2 -2 =28707, i586 +2 -2 =30587, noarch +1 -1 =17780, ppc64le +2 -2 =29207, x86_64 +14 -13 =30927 2020-Feb-08 19:06:06 :: version check OK #2000 cve-manager 0.29.5-alt1 -> 0.30.0-alt1 Sat Feb 08 2020 Alexey Appolonov <alexey@altlinux> 0.30.0-alt1 - Import of CPE other than 'application' part not performed; - Import of CPE with unknown version not performed if there is CPE with specified version and with the same product name for that CVE record; - Enhanced mapping algorithm. #1040 cve-manager-inner-knowledge 2020.02.02-alt1 -> 2020.02.05-alt1 Wed Feb 05 2020 Alexey Appolonov <alexey@altlinux> 2020.02.05-alt1 - Updated list of ignored mapping pairs; - Added list of excluded CPEs (will have an effect with future versions of cve-manager). #1640 libtree 0.3.1-alt1 -> 0.4.0-alt1 Fri Feb 07 2020 Alexey Appolonov <alexey@altlinux> 0.4.0-alt1 - Handling attributes of '<...>:<attribute_name>' format; - Ability to avoid empty lines in string representation of selected data. 2020-Feb-08 19:06:59 :: generated apt indices 2020-Feb-08 19:07:00 :: created next repo 2020-Feb-08 19:07:28 :: dependencies check OK 2020-Feb-08 19:10:06 :: [x86_64 i586 aarch64 ppc64le] ELF symbols check OK 2020-Feb-08 19:10:20 :: [i586] #1640 libtree: install check OK warning [x86_64]: cpe-map=0.30.0-alt1: circular dependencies on cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1 2020-Feb-08 19:10:24 :: [ppc64le] #1640 libtree: install check OK 2020-Feb-08 19:10:24 :: [x86_64] #2000 cpe-map: install check OK i586: libtree-checkinstall=0.4.0-alt1 post-install unowned files: /var/lib/libtree /var/lib/libtree/tests 2020-Feb-08 19:10:25 :: [i586] #1640 libtree-checkinstall: install check OK ppc64le: libtree-checkinstall=0.4.0-alt1 post-install unowned files: /var/lib/libtree /var/lib/libtree/tests 2020-Feb-08 19:10:32 :: [ppc64le] #1640 libtree-checkinstall: install check OK warning [x86_64]: cve-backup=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1 2020-Feb-08 19:10:33 :: [i586] #1640 libtree-devel: install check OK 2020-Feb-08 19:10:33 :: [x86_64] #2000 cve-backup: install check OK warning [x86_64]: cve-download=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1 2020-Feb-08 19:10:42 :: [ppc64le] #1640 libtree-devel: install check OK 2020-Feb-08 19:10:42 :: [x86_64] #2000 cve-download: install check OK warning [x86_64]: cve-fixes=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1 2020-Feb-08 19:10:51 :: [x86_64] #2000 cve-fixes: install check OK warning [x86_64]: cve-history=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1 2020-Feb-08 19:11:00 :: [x86_64] #2000 cve-history: install check OK warning [x86_64]: cve-import=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1 2020-Feb-08 19:11:10 :: [x86_64] #2000 cve-import: install check OK warning [x86_64]: cve-issues=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1 2020-Feb-08 19:11:19 :: [x86_64] #2000 cve-issues: install check OK warning [x86_64]: cve-manager=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-monitor=0.30.0-alt1 2020-Feb-08 19:11:28 :: [x86_64] #2000 cve-manager: install check OK warning [x86_64]: cve-manager-common=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1 2020-Feb-08 19:11:37 :: [x86_64] #2000 cve-manager-common: install check OK warning [x86_64]: cve-manager-inner-knowledge=2020.02.05-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1 2020-Feb-08 19:11:47 :: [x86_64] #1040 cve-manager-inner-knowledge: install check OK warning [x86_64]: cve-monitor=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1 2020-Feb-08 19:11:56 :: [x86_64] #2000 cve-monitor: install check OK 2020-Feb-08 19:12:03 :: [x86_64] #2000 libcve-manager: install check OK 2020-Feb-08 19:12:08 :: [x86_64] #1640 libtree: install check OK x86_64: libtree-checkinstall=0.4.0-alt1 post-install unowned files: /var/lib/libtree /var/lib/libtree/tests 2020-Feb-08 19:12:14 :: [x86_64] #1640 libtree-checkinstall: install check OK 2020-Feb-08 19:12:21 :: [x86_64] #1640 libtree-devel: install check OK 2020-Feb-08 19:12:22 :: [x86_64-i586] plan: #1 +1 -1 =10674 2020-Feb-08 19:12:36 :: [x86_64-i586] arepo build OK 2020-Feb-08 19:12:59 :: [x86_64-i586] generated apt indices 2020-Feb-08 19:12:59 :: [x86_64-i586] created next repo 2020-Feb-08 19:13:08 :: [x86_64-i586] dependencies check OK 2020-Feb-08 19:13:10 :: gears inheritance check OK 2020-Feb-08 19:13:10 :: srpm inheritance check OK girar-check-perms: access to cve-manager-inner-knowledge ALLOWED for alexey: project leader check-subtask-perms: #1040: cve-manager-inner-knowledge: allowed for alexey girar-check-perms: access to libtree ALLOWED for alexey: project leader check-subtask-perms: #1640: libtree: allowed for alexey girar-check-perms: access to cve-manager ALLOWED for alexey: project leader check-subtask-perms: #2000: cve-manager: allowed for alexey 2020-Feb-08 19:13:11 :: acl check OK 2020-Feb-08 19:13:46 :: created contents_index files 2020-Feb-08 19:13:56 :: created hash files: aarch64 i586 noarch ppc64le src x86_64-i586 x86_64 2020-Feb-08 19:13:58 :: task #245255 for sisyphus TESTED
reply other threads:[~2020-02-08 19:13 UTC|newest] Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20200208191358.GA23919@gyle.altlinux.org \ --to=girar-builder@altlinux.org \ --cc=alexey@altlinux.org \ --cc=girar-builder-sisyphus@altlinux.org \ --cc=imz@altlinux.org \ --cc=nbr@altlinux.org \ --cc=sisyphus-incominger@lists.altlinux.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
ALT Linux Girar Builder robot reports This inbox may be cloned and mirrored by anyone: git clone --mirror http://lore.altlinux.org/sisyphus-incominger/0 sisyphus-incominger/git/0.git # If you have public-inbox 1.1+ installed, you may # initialize and index your mirror using the following commands: public-inbox-init -V2 sisyphus-incominger sisyphus-incominger/ http://lore.altlinux.org/sisyphus-incominger \ sisyphus-incominger@lists.altlinux.org sisyphus-incominger@lists.altlinux.ru sisyphus-incominger@lists.altlinux.com public-inbox-index sisyphus-incominger Example config snippet for mirrors. Newsgroup available over NNTP: nntp://lore.altlinux.org/org.altlinux.lists.sisyphus-incominger AGPL code for this site: git clone https://public-inbox.org/public-inbox.git