* [#267027] TESTED cve-manager.git=0.48.0-alt1
@ 2021-02-26 11:56 Girar awaiter (alexey)
2021-02-26 18:51 ` [#267027] DONE (try 2) cve-manager.git=0.48.0-alt1 Girar pender (alexey)
0 siblings, 1 reply; 2+ messages in thread
From: Girar awaiter (alexey) @ 2021-02-26 11:56 UTC (permalink / raw)
To: Alexey Appolonov; +Cc: sisyphus-incominger, girar-builder-sisyphus
http://git.altlinux.org/tasks/267027/logs/events.1.1.log
subtask name aarch64 armh i586 ppc64le x86_64
#100 cve-manager - - - - 1:39
2021-Feb-26 11:50:19 :: test-only task #267027 for sisyphus started by alexey:
#100 build 0.48.0-alt1 from /people/alexey/packages/cve-manager.git fetched at 2021-Feb-26 11:50:05
2021-Feb-26 11:50:19 :: [ppc64le] #100 cve-manager.git 0.48.0-alt1: build start
2021-Feb-26 11:50:19 :: [i586] #100 cve-manager.git 0.48.0-alt1: build start
2021-Feb-26 11:50:19 :: [armh] #100 cve-manager.git 0.48.0-alt1: build start
2021-Feb-26 11:50:19 :: [x86_64] #100 cve-manager.git 0.48.0-alt1: build start
2021-Feb-26 11:50:19 :: [aarch64] #100 cve-manager.git 0.48.0-alt1: build start
2021-Feb-26 11:50:28 :: [i586] #100 cve-manager.git 0.48.0-alt1: build SKIPPED
2021-Feb-26 11:50:30 :: [aarch64] #100 cve-manager.git 0.48.0-alt1: build SKIPPED
2021-Feb-26 11:50:32 :: [ppc64le] #100 cve-manager.git 0.48.0-alt1: build SKIPPED
2021-Feb-26 11:50:35 :: [armh] #100 cve-manager.git 0.48.0-alt1: build SKIPPED
2021-Feb-26 11:51:58 :: [x86_64] #100 cve-manager.git 0.48.0-alt1: build OK
2021-Feb-26 11:52:10 :: #100: cve-manager.git 0.48.0-alt1: build check OK
2021-Feb-26 11:52:10 :: build check OK
2021-Feb-26 11:52:10 :: noarch check OK
2021-Feb-26 11:52:12 :: plan: src +1 -1 =17839, x86_64 +10 -10 =31100
#100 cve-manager 0.47.1-alt1 -> 0.48.0-alt1
Fri Feb 26 2021 Alexey Appolonov <alexey@altlinux> 0.48.0-alt1
- URLs of distro lists turned into custom parameters;
- Execution of the "cve-download" module is terminated immediately if any of
the required info can't be downloaded;
- Ability to download FSTEC vulnerability list is fixed;
- Tolerance to the FSTEC source (the FSTEC source is not yet fully supported,
but cve-manager does not fail if the FSTEC source is not excluded and if any
operation regarding FSTEC fails).
2021-Feb-26 11:52:40 :: patched apt indices
2021-Feb-26 11:52:50 :: created next repo
2021-Feb-26 11:52:59 :: duplicate provides check OK
2021-Feb-26 11:53:24 :: dependencies check OK
2021-Feb-26 11:53:45 :: [x86_64] ELF symbols check OK
warning [x86_64]: cpe-map=0.48.0-alt1: circular dependencies on cve-issues=0.48.0-alt1 cve-manager-inner-knowledge=2021.02.22-alt1 cve-manager=0.48.0-alt1
2021-Feb-26 11:54:06 :: [x86_64] #100 cpe-map: install check OK
2021-Feb-26 11:54:13 :: [x86_64] #100 cve-backup: install check OK
2021-Feb-26 11:54:21 :: [x86_64] #100 cve-download: install check OK
2021-Feb-26 11:54:30 :: [x86_64] #100 cve-history: install check OK
2021-Feb-26 11:54:43 :: [x86_64] #100 cve-import: install check OK
warning [x86_64]: cve-issues=0.48.0-alt1: circular dependencies on cpe-map=0.48.0-alt1 cve-manager-inner-knowledge=2021.02.22-alt1 cve-manager=0.48.0-alt1
2021-Feb-26 11:54:55 :: [x86_64] #100 cve-issues: install check OK
warning [x86_64]: cve-manager=0.48.0-alt1: circular dependencies on cpe-map=0.48.0-alt1 cve-issues=0.48.0-alt1 cve-manager-inner-knowledge=2021.02.22-alt1
2021-Feb-26 11:55:05 :: [x86_64] #100 cve-manager: install check OK
2021-Feb-26 11:55:12 :: [x86_64] #100 cve-manager-common: install check OK
2021-Feb-26 11:55:20 :: [x86_64] #100 cve-monitor: install check OK
2021-Feb-26 11:55:29 :: [x86_64] #100 libcve-manager: install check OK
2021-Feb-26 11:55:42 :: [x86_64-i586] generated apt indices
2021-Feb-26 11:55:42 :: [x86_64-i586] created next repo
2021-Feb-26 11:55:49 :: [x86_64-i586] dependencies check OK
2021-Feb-26 11:55:49 :: gears inheritance check OK
2021-Feb-26 11:55:49 :: srpm inheritance check OK
girar-check-perms: access to cve-manager ALLOWED for alexey: project leader
check-subtask-perms: #100: cve-manager: allowed for alexey
2021-Feb-26 11:55:49 :: acl check OK
2021-Feb-26 11:55:57 :: created contents_index files
2021-Feb-26 11:56:06 :: created hash files: src x86_64
2021-Feb-26 11:56:08 :: task #267027 for sisyphus TESTED
^ permalink raw reply [flat|nested] 2+ messages in thread
* [#267027] DONE (try 2) cve-manager.git=0.48.0-alt1
2021-02-26 11:56 [#267027] TESTED cve-manager.git=0.48.0-alt1 Girar awaiter (alexey)
@ 2021-02-26 18:51 ` Girar pender (alexey)
0 siblings, 0 replies; 2+ messages in thread
From: Girar pender (alexey) @ 2021-02-26 18:51 UTC (permalink / raw)
To: Alexey Appolonov; +Cc: sisyphus-incominger, girar-builder-sisyphus
http://git.altlinux.org/tasks/archive/done/_260/267027/logs/events.2.1.log
2021-Feb-26 18:47:44 :: task #267027 for sisyphus resumed by alexey:
#100 build 0.48.0-alt1 from /people/alexey/packages/cve-manager.git fetched at 2021-Feb-26 11:50:05
2021-Feb-26 18:47:44 :: [i586] #100 cve-manager.git 0.48.0-alt1: build start
2021-Feb-26 18:47:44 :: [aarch64] #100 cve-manager.git 0.48.0-alt1: build start
2021-Feb-26 18:47:44 :: [armh] #100 cve-manager.git 0.48.0-alt1: build start
2021-Feb-26 18:47:44 :: [ppc64le] #100 cve-manager.git 0.48.0-alt1: build start
2021-Feb-26 18:47:44 :: [x86_64] #100 cve-manager.git 0.48.0-alt1: build start
2021-Feb-26 18:47:53 :: [i586] #100 cve-manager.git 0.48.0-alt1: build SKIPPED
2021-Feb-26 18:47:54 :: [aarch64] #100 cve-manager.git 0.48.0-alt1: build SKIPPED
2021-Feb-26 18:47:54 :: [x86_64] #100 cve-manager.git 0.48.0-alt1: build OK (cached)
2021-Feb-26 18:47:57 :: [ppc64le] #100 cve-manager.git 0.48.0-alt1: build SKIPPED
2021-Feb-26 18:48:00 :: [armh] #100 cve-manager.git 0.48.0-alt1: build SKIPPED
2021-Feb-26 18:48:11 :: #100: cve-manager.git 0.48.0-alt1: build check OK
2021-Feb-26 18:48:11 :: build check OK
2021-Feb-26 18:48:11 :: noarch check OK
2021-Feb-26 18:48:13 :: plan: src +1 -1 =17841, x86_64 +10 -10 =31104
#100 cve-manager 0.47.1-alt1 -> 0.48.0-alt1
Fri Feb 26 2021 Alexey Appolonov <alexey@altlinux> 0.48.0-alt1
- URLs of distro lists turned into custom parameters;
- Execution of the "cve-download" module is terminated immediately if any of
the required info can't be downloaded;
- Ability to download FSTEC vulnerability list is fixed;
- Tolerance to the FSTEC source (the FSTEC source is not yet fully supported,
but cve-manager does not fail if the FSTEC source is not excluded and if any
operation regarding FSTEC fails).
2021-Feb-26 18:48:39 :: patched apt indices
2021-Feb-26 18:48:49 :: created next repo
2021-Feb-26 18:48:58 :: duplicate provides check OK
2021-Feb-26 18:49:23 :: dependencies check OK
2021-Feb-26 18:49:42 :: [x86_64] ELF symbols check OK
warning [x86_64]: cpe-map=0.48.0-alt1: circular dependencies on cve-issues=0.48.0-alt1 cve-manager-inner-knowledge=2021.02.22-alt1 cve-manager=0.48.0-alt1
2021-Feb-26 18:49:55 :: [x86_64] #100 cpe-map: install check OK (cached)
2021-Feb-26 18:49:58 :: [x86_64] #100 cve-backup: install check OK (cached)
2021-Feb-26 18:50:00 :: [x86_64] #100 cve-download: install check OK (cached)
2021-Feb-26 18:50:03 :: [x86_64] #100 cve-history: install check OK (cached)
2021-Feb-26 18:50:06 :: [x86_64] #100 cve-import: install check OK (cached)
warning [x86_64]: cve-issues=0.48.0-alt1: circular dependencies on cpe-map=0.48.0-alt1 cve-manager-inner-knowledge=2021.02.22-alt1 cve-manager=0.48.0-alt1
2021-Feb-26 18:50:08 :: [x86_64] #100 cve-issues: install check OK (cached)
warning [x86_64]: cve-manager=0.48.0-alt1: circular dependencies on cpe-map=0.48.0-alt1 cve-issues=0.48.0-alt1 cve-manager-inner-knowledge=2021.02.22-alt1
2021-Feb-26 18:50:11 :: [x86_64] #100 cve-manager: install check OK (cached)
2021-Feb-26 18:50:13 :: [x86_64] #100 cve-manager-common: install check OK (cached)
2021-Feb-26 18:50:16 :: [x86_64] #100 cve-monitor: install check OK (cached)
2021-Feb-26 18:50:18 :: [x86_64] #100 libcve-manager: install check OK (cached)
2021-Feb-26 18:50:30 :: [x86_64-i586] generated apt indices
2021-Feb-26 18:50:30 :: [x86_64-i586] created next repo
2021-Feb-26 18:50:36 :: [x86_64-i586] dependencies check OK
2021-Feb-26 18:50:36 :: gears inheritance check OK
2021-Feb-26 18:50:36 :: srpm inheritance check OK
girar-check-perms: access to cve-manager ALLOWED for alexey: project leader
check-subtask-perms: #100: cve-manager: allowed for alexey
2021-Feb-26 18:50:37 :: acl check OK
2021-Feb-26 18:50:43 :: created contents_index files
2021-Feb-26 18:50:51 :: created hash files: src x86_64
2021-Feb-26 18:50:53 :: task #267027 for sisyphus TESTED
2021-Feb-26 18:50:54 :: task is ready for commit
2021-Feb-26 18:50:58 :: repo clone OK
2021-Feb-26 18:50:58 :: packages update OK
2021-Feb-26 18:51:01 :: [x86_64] update OK
2021-Feb-26 18:51:01 :: repo update OK
2021-Feb-26 18:51:09 :: repo save OK
2021-Feb-26 18:51:10 :: src index update OK
2021-Feb-26 18:51:10 :: updated /gears/c/cve-manager.git branch `sisyphus'
2021-Feb-26 18:51:14 :: gears update OK
2021-Feb-26 18:51:14 :: task #267027 for sisyphus DONE
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2021-02-26 18:51 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-02-26 11:56 [#267027] TESTED cve-manager.git=0.48.0-alt1 Girar awaiter (alexey)
2021-02-26 18:51 ` [#267027] DONE (try 2) cve-manager.git=0.48.0-alt1 Girar pender (alexey)
ALT Linux Girar Builder robot reports
This inbox may be cloned and mirrored by anyone:
git clone --mirror http://lore.altlinux.org/sisyphus-incominger/0 sisyphus-incominger/git/0.git
# If you have public-inbox 1.1+ installed, you may
# initialize and index your mirror using the following commands:
public-inbox-init -V2 sisyphus-incominger sisyphus-incominger/ http://lore.altlinux.org/sisyphus-incominger \
sisyphus-incominger@lists.altlinux.org sisyphus-incominger@lists.altlinux.ru sisyphus-incominger@lists.altlinux.com
public-inbox-index sisyphus-incominger
Example config snippet for mirrors.
Newsgroup available over NNTP:
nntp://lore.altlinux.org/org.altlinux.lists.sisyphus-incominger
AGPL code for this site: git clone https://public-inbox.org/public-inbox.git