ALT Linux Girar Builder robot reports
 help / color / mirror / Atom feed
From: Girar Builder awaiter robot <girar-builder@altlinux.org>
To: Alexey Appolonov <alexey@altlinux.org>
Cc: sisyphus-incominger@lists.altlinux.org,
	Ivan Zakharyaschev <imz@altlinux.org>,
	Denis Medvedev <nbr@altlinux.org>,
	girar-builder-sisyphus@altlinux.org
Subject: [#245255] TESTED (try 20) cve-manager-inner-knowledge.git=2020.02.05-alt1 libtree.git=0.4.0-alt1 ...
Date: Sun, 9 Feb 2020 17:00:14 +0000
Message-ID: <20200209170014.GA15656@gyle.altlinux.org> (raw)

http://git.altlinux.org/tasks/245255/logs/events.20.1.log

2020-Feb-09 16:51:19 :: test-only task #245255 for sisyphus resumed by alexey:
#100 removed
#200 removed
#300 removed
#400 removed
#500 removed
#600 removed
#620 removed
#640 removed
#660 removed
#700 removed
#1000 removed
#1040 build 2020.02.05-alt1 from /people/alexey/packages/cve-manager-inner-knowledge.git fetched at 2020-Feb-06 12:05:12
#1100 removed
#1200 removed
#1300 removed
#1400 removed
#1500 removed
#1600 removed
#1640 removed
#1700 removed
#1740 build 0.4.0-alt1 from /people/alexey/packages/libtree.git fetched at 2020-Feb-09 13:26:00
#2000 removed
#2100 removed
#2200 removed
#2300 build 0.30.0-alt1 from /people/alexey/packages/cve-manager.git fetched at 2020-Feb-09 16:51:15
2020-Feb-09 16:51:37 :: created build repo
2020-Feb-09 16:51:39 :: [aarch64] #1040 cve-manager-inner-knowledge.git 2020.02.05-alt1: build start
2020-Feb-09 16:51:39 :: [ppc64le] #1040 cve-manager-inner-knowledge.git 2020.02.05-alt1: build start
2020-Feb-09 16:51:39 :: [i586] #1040 cve-manager-inner-knowledge.git 2020.02.05-alt1: build start
2020-Feb-09 16:51:39 :: [x86_64] #1040 cve-manager-inner-knowledge.git 2020.02.05-alt1: build start
2020-Feb-09 16:51:59 :: [i586] #1040 cve-manager-inner-knowledge.git 2020.02.05-alt1: build SKIPPED
2020-Feb-09 16:51:59 :: [i586] #1740 libtree.git 0.4.0-alt1: build start
2020-Feb-09 16:52:00 :: [x86_64] cve-manager-inner-knowledge.git 2020.02.05-alt1: remote: no need to rebuild
2020-Feb-09 16:52:00 :: [x86_64] #1040 cve-manager-inner-knowledge.git 2020.02.05-alt1: build OK
2020-Feb-09 16:52:00 :: [x86_64] #1740 libtree.git 0.4.0-alt1: build start
2020-Feb-09 16:52:01 :: [aarch64] #1040 cve-manager-inner-knowledge.git 2020.02.05-alt1: build SKIPPED
2020-Feb-09 16:52:01 :: [aarch64] #1740 libtree.git 0.4.0-alt1: build start
2020-Feb-09 16:52:08 :: [ppc64le] #1040 cve-manager-inner-knowledge.git 2020.02.05-alt1: build SKIPPED
2020-Feb-09 16:52:08 :: [ppc64le] #1740 libtree.git 0.4.0-alt1: build start
2020-Feb-09 16:52:11 :: [i586] libtree.git 0.4.0-alt1: remote: no need to rebuild
2020-Feb-09 16:52:11 :: [i586] #1740 libtree.git 0.4.0-alt1: build OK
2020-Feb-09 16:52:11 :: [i586] #2300 cve-manager.git 0.30.0-alt1: build start
2020-Feb-09 16:52:12 :: [x86_64] libtree.git 0.4.0-alt1: remote: no need to rebuild
2020-Feb-09 16:52:12 :: [x86_64] #1740 libtree.git 0.4.0-alt1: build OK
2020-Feb-09 16:52:12 :: [x86_64] #2300 cve-manager.git 0.30.0-alt1: build start
2020-Feb-09 16:52:16 :: [aarch64] libtree.git 0.4.0-alt1: remote: no need to rebuild
2020-Feb-09 16:52:16 :: [aarch64] #1740 libtree.git 0.4.0-alt1: build OK
2020-Feb-09 16:52:16 :: [aarch64] #2300 cve-manager.git 0.30.0-alt1: build start
2020-Feb-09 16:52:22 :: [i586] #2300 cve-manager.git 0.30.0-alt1: build SKIPPED
2020-Feb-09 16:52:22 :: [ppc64le] libtree.git 0.4.0-alt1: remote: no need to rebuild
2020-Feb-09 16:52:22 :: [ppc64le] #1740 libtree.git 0.4.0-alt1: build OK
2020-Feb-09 16:52:22 :: [ppc64le] #2300 cve-manager.git 0.30.0-alt1: build start
2020-Feb-09 16:52:30 :: [aarch64] #2300 cve-manager.git 0.30.0-alt1: build SKIPPED
2020-Feb-09 16:52:37 :: [ppc64le] #2300 cve-manager.git 0.30.0-alt1: build SKIPPED
2020-Feb-09 16:53:35 :: [x86_64] #2300 cve-manager.git 0.30.0-alt1: build OK
2020-Feb-09 16:53:40 :: #1040: cve-manager-inner-knowledge.git 2020.02.05-alt1: build check OK
2020-Feb-09 16:53:52 :: #1740: libtree.git 0.4.0-alt1: build check OK
2020-Feb-09 16:54:02 :: #2300: cve-manager.git 0.30.0-alt1: build check OK
2020-Feb-09 16:54:02 :: build check OK
2020-Feb-09 16:54:04 :: noarch check OK
2020-Feb-09 16:54:06 :: plan: src +3 -3 =17472, aarch64 +2 -2 =28695, i586 +2 -2 =30567, noarch +1 -1 =17776, ppc64le +2 -2 =29195, x86_64 +14 -13 =30907
2020-Feb-09 16:54:06 :: version check OK
#2300 cve-manager 0.29.5-alt1 -> 0.30.0-alt1
 Sun Feb 09 2020 Alexey Appolonov <alexey@altlinux> 0.30.0-alt1
 - Import of CPE of other than 'application' part not performed except for
   CPE of 'linux' vendor of 'operating system' part;
 - Import of CPE with unknown version not performed if there is CPE with
   specified version and with the same product name for that CVE record;
 - Enhanced mapping algorithm.
#1040 cve-manager-inner-knowledge 2020.02.02-alt1 -> 2020.02.05-alt1
 Wed Feb 05 2020 Alexey Appolonov <alexey@altlinux> 2020.02.05-alt1
 - Updated list of ignored mapping pairs;
 - Added list of excluded CPEs (will have an effect with future versions
   of cve-manager).
#1740 libtree 0.3.1-alt1 -> 0.4.0-alt1
 Fri Feb 07 2020 Alexey Appolonov <alexey@altlinux> 0.4.0-alt1
 - Handling attributes of '<...>:<attribute_name>' format;
 - Ability to avoid empty lines in string representation of selected data.
2020-Feb-09 16:55:00 :: generated apt indices
2020-Feb-09 16:55:00 :: created next repo
2020-Feb-09 16:55:30 :: dependencies check OK
2020-Feb-09 16:55:30 :: [i586 aarch64 ppc64le] no need to repeat ELF symbols check
2020-Feb-09 16:57:05 :: [x86_64 i586 aarch64 ppc64le] ELF symbols check OK
2020-Feb-09 16:57:15 :: [i586] #1740 libtree: no need to repeat, install check SKIPPED
	i586: libtree-checkinstall=0.4.0-alt1 post-install unowned files:
/var/lib/libtree
/var/lib/libtree/tests
2020-Feb-09 16:57:17 :: [i586] #1740 libtree-checkinstall: no need to repeat, install check SKIPPED
2020-Feb-09 16:57:18 :: [ppc64le] #1740 libtree: no need to repeat, install check SKIPPED
2020-Feb-09 16:57:20 :: [i586] #1740 libtree-devel: no need to repeat, install check SKIPPED
	ppc64le: libtree-checkinstall=0.4.0-alt1 post-install unowned files:
/var/lib/libtree
/var/lib/libtree/tests
2020-Feb-09 16:57:21 :: [ppc64le] #1740 libtree-checkinstall: no need to repeat, install check SKIPPED
warning [x86_64]: cpe-map=0.30.0-alt1: circular dependencies on cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1
2020-Feb-09 16:57:22 :: [x86_64] #2300 cpe-map: install check OK
2020-Feb-09 16:57:24 :: [ppc64le] #1740 libtree-devel: no need to repeat, install check SKIPPED
warning [x86_64]: cve-backup=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1
2020-Feb-09 16:57:31 :: [x86_64] #2300 cve-backup: install check OK
warning [x86_64]: cve-download=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1
2020-Feb-09 16:57:39 :: [x86_64] #2300 cve-download: install check OK
warning [x86_64]: cve-fixes=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1
2020-Feb-09 16:57:48 :: [x86_64] #2300 cve-fixes: install check OK
warning [x86_64]: cve-history=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1
2020-Feb-09 16:57:57 :: [x86_64] #2300 cve-history: install check OK
warning [x86_64]: cve-import=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1
2020-Feb-09 16:58:05 :: [x86_64] #2300 cve-import: install check OK
warning [x86_64]: cve-issues=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1
2020-Feb-09 16:58:14 :: [x86_64] #2300 cve-issues: install check OK
warning [x86_64]: cve-manager=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-monitor=0.30.0-alt1
2020-Feb-09 16:58:23 :: [x86_64] #2300 cve-manager: install check OK
warning [x86_64]: cve-manager-common=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1
2020-Feb-09 16:58:31 :: [x86_64] #2300 cve-manager-common: install check OK
warning [x86_64]: cve-manager-inner-knowledge=2020.02.05-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager=0.30.0-alt1 cve-monitor=0.30.0-alt1
2020-Feb-09 16:58:41 :: [x86_64] #1040 cve-manager-inner-knowledge: install check OK
warning [x86_64]: cve-monitor=0.30.0-alt1: circular dependencies on cpe-map=0.30.0-alt1 cve-backup=0.30.0-alt1 cve-download=0.30.0-alt1 cve-fixes=0.30.0-alt1 cve-history=0.30.0-alt1 cve-import=0.30.0-alt1 cve-issues=0.30.0-alt1 cve-manager-common=0.30.0-alt1 cve-manager-inner-knowledge=2020.02.05-alt1 cve-manager=0.30.0-alt1
2020-Feb-09 16:58:50 :: [x86_64] #2300 cve-monitor: install check OK
2020-Feb-09 16:58:56 :: [x86_64] #2300 libcve-manager: install check OK
2020-Feb-09 16:58:59 :: [x86_64] #1740 libtree: no need to repeat, install check SKIPPED
	x86_64: libtree-checkinstall=0.4.0-alt1 post-install unowned files:
/var/lib/libtree
/var/lib/libtree/tests
2020-Feb-09 16:59:01 :: [x86_64] #1740 libtree-checkinstall: no need to repeat, install check SKIPPED
2020-Feb-09 16:59:03 :: [x86_64] #1740 libtree-devel: no need to repeat, install check SKIPPED
2020-Feb-09 16:59:03 :: [x86_64-i586] plan: #0 +1 -1 =10665
2020-Feb-09 16:59:20 :: [x86_64-i586] generated apt indices
2020-Feb-09 16:59:20 :: [x86_64-i586] created next repo
2020-Feb-09 16:59:28 :: [x86_64-i586] dependencies check OK
2020-Feb-09 16:59:29 :: gears inheritance check OK
2020-Feb-09 16:59:29 :: srpm inheritance check OK
girar-check-perms: access to cve-manager-inner-knowledge ALLOWED for alexey: project leader
check-subtask-perms: #1040: cve-manager-inner-knowledge: allowed for alexey
girar-check-perms: access to libtree ALLOWED for alexey: project leader
check-subtask-perms: #1740: libtree: allowed for alexey
girar-check-perms: access to cve-manager ALLOWED for alexey: project leader
check-subtask-perms: #2300: cve-manager: allowed for alexey
2020-Feb-09 16:59:29 :: acl check OK
2020-Feb-09 17:00:02 :: created contents_index files
2020-Feb-09 17:00:12 :: created hash files: aarch64 i586 noarch ppc64le src x86_64-i586 x86_64
2020-Feb-09 17:00:14 :: task #245255 for sisyphus TESTED


                 reply	other threads:[~2020-02-09 17:00 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20200209170014.GA15656@gyle.altlinux.org \
    --to=girar-builder@altlinux.org \
    --cc=alexey@altlinux.org \
    --cc=girar-builder-sisyphus@altlinux.org \
    --cc=imz@altlinux.org \
    --cc=nbr@altlinux.org \
    --cc=sisyphus-incominger@lists.altlinux.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link

ALT Linux Girar Builder robot reports

This inbox may be cloned and mirrored by anyone:

	git clone --mirror http://lore.altlinux.org/sisyphus-incominger/0 sisyphus-incominger/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 sisyphus-incominger sisyphus-incominger/ http://lore.altlinux.org/sisyphus-incominger \
		sisyphus-incominger@lists.altlinux.org sisyphus-incominger@lists.altlinux.ru sisyphus-incominger@lists.altlinux.com
	public-inbox-index sisyphus-incominger

Example config snippet for mirrors.
Newsgroup available over NNTP:
	nntp://lore.altlinux.org/org.altlinux.lists.sisyphus-incominger


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git