From: "Girar awaiter (alexey)" <girar-builder@altlinux.org> To: Alexey Appolonov <alexey@altlinux.org> Cc: sisyphus-incominger@lists.altlinux.org, Ivan Zakharyaschev <imz@altlinux.org>, Denis Medvedev <nbr@altlinux.org>, girar-builder-sisyphus@altlinux.org Subject: [#261090] TESTED (try 10) cve-manager-inner-knowledge.git=2020.11.10-alt1 cve-manager.git=alpha Date: Wed, 11 Nov 2020 16:08:27 +0000 Message-ID: <20201111160827.GA2912311@gyle.mskdc.altlinux.org> (raw) http://git.altlinux.org/tasks/261090/logs/events.10.1.log subtask name aarch64 armh i586 ppc64le x86_64 #1100 cve-manager-inner-knowledge - - - - 45 #1400 cve-manager - - - - 1:30 2020-Nov-11 16:01:57 :: test-only task #261090 for sisyphus resumed by alexey: #100 removed #200 removed #300 removed #400 removed #500 removed #600 removed #700 removed #1000 removed #1100 build 2020.11.10-alt1 from /people/alexey/packages/cve-manager-inner-knowledge.git fetched at 2020-Nov-10 15:25:33 #1200 removed #1300 removed #1400 build alpha from /people/alexey/packages/cve-manager.git fetched at 2020-Nov-11 16:01:51 2020-Nov-11 16:01:57 :: created build repo 2020-Nov-11 16:01:58 :: [ppc64le] #1100 cve-manager-inner-knowledge.git 2020.11.10-alt1: build start 2020-Nov-11 16:01:58 :: [aarch64] #1100 cve-manager-inner-knowledge.git 2020.11.10-alt1: build start 2020-Nov-11 16:01:58 :: [i586] #1100 cve-manager-inner-knowledge.git 2020.11.10-alt1: build start 2020-Nov-11 16:01:58 :: [armh] #1100 cve-manager-inner-knowledge.git 2020.11.10-alt1: build start 2020-Nov-11 16:01:58 :: [x86_64] #1100 cve-manager-inner-knowledge.git 2020.11.10-alt1: build start 2020-Nov-11 16:02:28 :: [i586] #1100 cve-manager-inner-knowledge.git 2020.11.10-alt1: build SKIPPED 2020-Nov-11 16:02:28 :: [i586] #1400 cve-manager.git alpha: build start 2020-Nov-11 16:02:32 :: [aarch64] #1100 cve-manager-inner-knowledge.git 2020.11.10-alt1: build SKIPPED 2020-Nov-11 16:02:32 :: [aarch64] #1400 cve-manager.git alpha: build start 2020-Nov-11 16:02:39 :: [i586] #1400 cve-manager.git alpha: build SKIPPED 2020-Nov-11 16:02:43 :: [x86_64] #1100 cve-manager-inner-knowledge.git 2020.11.10-alt1: build OK 2020-Nov-11 16:02:44 :: [x86_64] #1400 cve-manager.git alpha: build start 2020-Nov-11 16:02:47 :: [armh] #1100 cve-manager-inner-knowledge.git 2020.11.10-alt1: build SKIPPED 2020-Nov-11 16:02:47 :: [armh] #1400 cve-manager.git alpha: build start 2020-Nov-11 16:02:47 :: [ppc64le] #1100 cve-manager-inner-knowledge.git 2020.11.10-alt1: build SKIPPED 2020-Nov-11 16:02:47 :: [ppc64le] #1400 cve-manager.git alpha: build start 2020-Nov-11 16:02:48 :: [aarch64] #1400 cve-manager.git alpha: build SKIPPED 2020-Nov-11 16:03:04 :: [ppc64le] #1400 cve-manager.git alpha: build SKIPPED 2020-Nov-11 16:03:08 :: [armh] #1400 cve-manager.git alpha: build SKIPPED 2020-Nov-11 16:04:14 :: [x86_64] #1400 cve-manager.git alpha: build OK 2020-Nov-11 16:04:20 :: #1100: cve-manager-inner-knowledge.git 2020.11.10-alt1: build check OK 2020-Nov-11 16:04:32 :: #1400: cve-manager.git alpha: build check OK 2020-Nov-11 16:04:32 :: build check OK 2020-Nov-11 16:04:32 :: noarch check OK 2020-Nov-11 16:04:34 :: plan: src +2 -2 =17746, x86_64 +13 -13 =30788 #1400 cve-manager 0.41.0-alt1 -> 0.42.0-alt1 Thu Nov 05 2020 Alexey Appolonov <alexey@altlinux> 0.42.0-alt1 - Consideration of names of vendors during a mapping of package names to product names; - Proper way of imposing a penalty for not being in the CPE dict; - Correct descriptions of modules. #1100 cve-manager-inner-knowledge 2020.10.16-alt1 -> 2020.11.10-alt1 Tue Nov 10 2020 Alexey Appolonov <alexey@altlinux> 2020.11.10-alt1 - Updated lists. 2020-Nov-11 16:05:03 :: patched apt indices 2020-Nov-11 16:05:13 :: created next repo 2020-Nov-11 16:05:21 :: duplicate provides check OK 2020-Nov-11 16:05:47 :: dependencies check OK 2020-Nov-11 16:06:06 :: [x86_64] ELF symbols check OK warning [x86_64]: cpe-map=0.42.0-alt1: circular dependencies on cve-issues=0.42.0-alt1 cve-manager-inner-knowledge=2020.11.10-alt1 cve-manager=0.42.0-alt1 2020-Nov-11 16:06:26 :: [x86_64] #1400 cpe-map: install check OK 2020-Nov-11 16:06:32 :: [x86_64] #1400 cve-backup: install check OK 2020-Nov-11 16:06:38 :: [x86_64] #1400 cve-download: install check OK 2020-Nov-11 16:06:43 :: [x86_64] #1400 cve-fixes: install check OK 2020-Nov-11 16:06:49 :: [x86_64] #1400 cve-history: install check OK 2020-Nov-11 16:06:56 :: [x86_64] #1400 cve-import: install check OK warning [x86_64]: cve-issues=0.42.0-alt1: circular dependencies on cpe-map=0.42.0-alt1 cve-manager-inner-knowledge=2020.11.10-alt1 cve-manager=0.42.0-alt1 2020-Nov-11 16:07:06 :: [x86_64] #1400 cve-issues: install check OK warning [x86_64]: cve-manager=0.42.0-alt1: circular dependencies on cpe-map=0.42.0-alt1 cve-issues=0.42.0-alt1 cve-manager-inner-knowledge=2020.11.10-alt1 2020-Nov-11 16:07:17 :: [x86_64] #1400 cve-manager: install check OK 2020-Nov-11 16:07:24 :: [x86_64] #1400 cve-manager-common: install check OK warning [x86_64]: cve-manager-inner-knowledge=2020.11.10-alt1: circular dependencies on cpe-map=0.42.0-alt1 cve-issues=0.42.0-alt1 cve-manager=0.42.0-alt1 2020-Nov-11 16:07:35 :: [x86_64] #1100 cve-manager-inner-knowledge: install check OK 2020-Nov-11 16:07:40 :: [x86_64] #1100 cve-manager-knowledge-miner: install check OK 2020-Nov-11 16:07:46 :: [x86_64] #1400 cve-monitor: install check OK 2020-Nov-11 16:07:52 :: [x86_64] #1400 libcve-manager: install check OK 2020-Nov-11 16:08:03 :: [x86_64-i586] generated apt indices 2020-Nov-11 16:08:03 :: [x86_64-i586] created next repo 2020-Nov-11 16:08:09 :: [x86_64-i586] dependencies check OK 2020-Nov-11 16:08:10 :: gears inheritance check OK 2020-Nov-11 16:08:10 :: srpm inheritance check OK girar-check-perms: access to cve-manager-inner-knowledge ALLOWED for alexey: project leader check-subtask-perms: #1100: cve-manager-inner-knowledge: allowed for alexey girar-check-perms: access to cve-manager ALLOWED for alexey: project leader check-subtask-perms: #1400: cve-manager: allowed for alexey 2020-Nov-11 16:08:10 :: acl check OK 2020-Nov-11 16:08:18 :: created contents_index files 2020-Nov-11 16:08:25 :: created hash files: src x86_64 2020-Nov-11 16:08:27 :: task #261090 for sisyphus TESTED
reply other threads:[~2020-11-11 16:08 UTC|newest] Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20201111160827.GA2912311@gyle.mskdc.altlinux.org \ --to=girar-builder@altlinux.org \ --cc=alexey@altlinux.org \ --cc=girar-builder-sisyphus@altlinux.org \ --cc=imz@altlinux.org \ --cc=nbr@altlinux.org \ --cc=sisyphus-incominger@lists.altlinux.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
ALT Linux Girar Builder robot reports This inbox may be cloned and mirrored by anyone: git clone --mirror http://lore.altlinux.org/sisyphus-incominger/0 sisyphus-incominger/git/0.git # If you have public-inbox 1.1+ installed, you may # initialize and index your mirror using the following commands: public-inbox-init -V2 sisyphus-incominger sisyphus-incominger/ http://lore.altlinux.org/sisyphus-incominger \ sisyphus-incominger@lists.altlinux.org sisyphus-incominger@lists.altlinux.ru sisyphus-incominger@lists.altlinux.com public-inbox-index sisyphus-incominger Example config snippet for mirrors. Newsgroup available over NNTP: nntp://lore.altlinux.org/org.altlinux.lists.sisyphus-incominger AGPL code for this site: git clone https://public-inbox.org/public-inbox.git