From: "Girar pender (alexey)" <girar-builder@altlinux.org> To: Alexey Appolonov <alexey@altlinux.org> Cc: sisyphus-incominger@lists.altlinux.org, Ivan Zakharyaschev <imz@altlinux.org>, Denis Medvedev <nbr@altlinux.org>, girar-builder-sisyphus@altlinux.org Subject: [#303623] DONE cve-manager-inner-knowledge.git=2022.07.13-alt1 ... Date: Wed, 13 Jul 2022 16:31:29 +0000 Message-ID: <girar.task.303623.1.3@gyle.mskdc.altlinux.org> (raw) https://git.altlinux.org/tasks/archive/done/_296/303623/logs/events.1.3.log subtask name aarch64 armh i586 ppc64le x86_64 #300 cve-manager-inner-knowledge - - - - 24 #400 cve-manager - - - - 1:19 2022-Jul-13 16:26:38 :: task #303623 for sisyphus started by alexey: #100 removed #200 removed #300 build 2022.07.13-alt1 from /people/alexey/packages/cve-manager-inner-knowledge.git fetched at 2022-Jul-13 11:01:29 #400 build 0.68.0-alt1 from /people/alexey/packages/cve-manager.git fetched at 2022-Jul-13 11:08:09 2022-Jul-13 16:26:38 :: waiting for a shared lock on sisyphus 2022-Jul-13 16:26:45 :: acquired a shared lock on sisyphus 2022-Jul-13 16:26:46 :: created build repo 2022-Jul-13 16:26:46 :: [ppc64le] #300 cve-manager-inner-knowledge.git 2022.07.13-alt1: build start 2022-Jul-13 16:26:46 :: [armh] #300 cve-manager-inner-knowledge.git 2022.07.13-alt1: build start 2022-Jul-13 16:26:46 :: [aarch64] #300 cve-manager-inner-knowledge.git 2022.07.13-alt1: build start 2022-Jul-13 16:26:46 :: [i586] #300 cve-manager-inner-knowledge.git 2022.07.13-alt1: build start 2022-Jul-13 16:26:46 :: [x86_64] #300 cve-manager-inner-knowledge.git 2022.07.13-alt1: build start 2022-Jul-13 16:26:56 :: [i586] #300 cve-manager-inner-knowledge.git 2022.07.13-alt1: build SKIPPED 2022-Jul-13 16:26:56 :: [i586] #400 cve-manager.git 0.68.0-alt1: build start 2022-Jul-13 16:26:57 :: [x86_64] #300 cve-manager-inner-knowledge.git 2022.07.13-alt1: build OK (cached) 2022-Jul-13 16:26:57 :: [x86_64] #400 cve-manager.git 0.68.0-alt1: build start 2022-Jul-13 16:27:04 :: [i586] #400 cve-manager.git 0.68.0-alt1: build SKIPPED 2022-Jul-13 16:27:05 :: [x86_64] #400 cve-manager.git 0.68.0-alt1: build OK (cached) 2022-Jul-13 16:27:07 :: [aarch64] #300 cve-manager-inner-knowledge.git 2022.07.13-alt1: build SKIPPED 2022-Jul-13 16:27:07 :: [aarch64] #400 cve-manager.git 0.68.0-alt1: build start 2022-Jul-13 16:27:10 :: [ppc64le] #300 cve-manager-inner-knowledge.git 2022.07.13-alt1: build SKIPPED 2022-Jul-13 16:27:10 :: [ppc64le] #400 cve-manager.git 0.68.0-alt1: build start 2022-Jul-13 16:27:16 :: [armh] #300 cve-manager-inner-knowledge.git 2022.07.13-alt1: build SKIPPED 2022-Jul-13 16:27:16 :: [armh] #400 cve-manager.git 0.68.0-alt1: build start 2022-Jul-13 16:27:23 :: [aarch64] #400 cve-manager.git 0.68.0-alt1: build SKIPPED 2022-Jul-13 16:27:28 :: [ppc64le] #400 cve-manager.git 0.68.0-alt1: build SKIPPED 2022-Jul-13 16:27:43 :: [armh] #400 cve-manager.git 0.68.0-alt1: build SKIPPED 2022-Jul-13 16:27:49 :: #300: cve-manager-inner-knowledge.git 2022.07.13-alt1: build check OK 2022-Jul-13 16:28:03 :: #400: cve-manager.git 0.68.0-alt1: build check OK 2022-Jul-13 16:28:03 :: build check OK 2022-Jul-13 16:28:03 :: noarch check OK 2022-Jul-13 16:28:05 :: plan: src +2 -2 =17528, x86_64 +14 -14 =30855 #400 cve-manager 0.67.6-alt1 -> 0.68.0-alt1 Wed Jul 13 2022 Alexey Appolonov <alexey@altlinux> 0.68.0-alt1 - Full support of the FSTEC data source; - New module "cve-monitor-check-update" for searching vulnerabilities of a package, that have been fixed in a given range of versions. #300 cve-manager-inner-knowledge 2022.07.11-alt1 -> 2022.07.13-alt1 Wed Jul 13 2022 Alexey Appolonov <alexey@altlinux> 2022.07.13-alt1 - Added new lists: a list of excluded FSTEC products and a list of ignorred FSTEC mapping pairs. 2022-Jul-13 16:28:43 :: patched apt indices 2022-Jul-13 16:28:55 :: created next repo 2022-Jul-13 16:29:04 :: duplicate provides check OK 2022-Jul-13 16:29:38 :: dependencies check OK 2022-Jul-13 16:29:58 :: [x86_64] ELF symbols check OK warning [x86_64]: cpe-map=0.68.0-alt1: circular dependencies on cve-issues=0.68.0-alt1 cve-manager-inner-knowledge=2022.07.13-alt1 cve-manager=0.68.0-alt1 cve-monitor=0.68.0-alt1 2022-Jul-13 16:30:06 :: [x86_64] #400 cpe-map: install check OK (cached) 2022-Jul-13 16:30:08 :: [x86_64] #400 cve-backup: install check OK (cached) 2022-Jul-13 16:30:09 :: [x86_64] #400 cve-download: install check OK (cached) 2022-Jul-13 16:30:11 :: [x86_64] #400 cve-history: install check OK (cached) 2022-Jul-13 16:30:12 :: [x86_64] #400 cve-import: install check OK (cached) 2022-Jul-13 16:30:14 :: [x86_64] #400 cve-import-debuginfo: install check OK (cached) warning [x86_64]: cve-issues=0.68.0-alt1: circular dependencies on cpe-map=0.68.0-alt1 cve-manager-inner-knowledge=2022.07.13-alt1 cve-manager=0.68.0-alt1 cve-monitor=0.68.0-alt1 2022-Jul-13 16:30:15 :: [x86_64] #400 cve-issues: install check OK (cached) warning [x86_64]: cve-manager=0.68.0-alt1: circular dependencies on cpe-map=0.68.0-alt1 cve-issues=0.68.0-alt1 cve-manager-inner-knowledge=2022.07.13-alt1 cve-monitor=0.68.0-alt1 2022-Jul-13 16:30:17 :: [x86_64] #400 cve-manager: install check OK (cached) 2022-Jul-13 16:30:18 :: [x86_64] #400 cve-manager-common: install check OK (cached) warning [x86_64]: cve-manager-inner-knowledge=2022.07.13-alt1: circular dependencies on cpe-map=0.68.0-alt1 cve-issues=0.68.0-alt1 cve-manager=0.68.0-alt1 cve-monitor=0.68.0-alt1 2022-Jul-13 16:30:19 :: [x86_64] #300 cve-manager-inner-knowledge: install check OK (cached) 2022-Jul-13 16:30:21 :: [x86_64] #300 cve-manager-knowledge-miner: install check OK (cached) warning [x86_64]: cve-monitor=0.68.0-alt1: circular dependencies on cpe-map=0.68.0-alt1 cve-issues=0.68.0-alt1 cve-manager-inner-knowledge=2022.07.13-alt1 cve-manager=0.68.0-alt1 2022-Jul-13 16:30:22 :: [x86_64] #400 cve-monitor: install check OK (cached) 2022-Jul-13 16:30:24 :: [x86_64] #400 libcve-manager: install check OK (cached) 2022-Jul-13 16:30:25 :: [x86_64] #400 libcve-manager-debuginfo: install check OK (cached) 2022-Jul-13 16:30:39 :: [x86_64-i586] generated apt indices 2022-Jul-13 16:30:39 :: [x86_64-i586] created next repo 2022-Jul-13 16:30:47 :: [x86_64-i586] dependencies check OK 2022-Jul-13 16:30:48 :: gears inheritance check OK 2022-Jul-13 16:30:48 :: srpm inheritance check OK girar-check-perms: access to cve-manager-inner-knowledge ALLOWED for alexey: project leader check-subtask-perms: #300: cve-manager-inner-knowledge: allowed for alexey girar-check-perms: access to cve-manager ALLOWED for alexey: project leader check-subtask-perms: #400: cve-manager: allowed for alexey 2022-Jul-13 16:30:48 :: acl check OK 2022-Jul-13 16:30:56 :: created contents_index files 2022-Jul-13 16:31:05 :: created hash files: src x86_64 2022-Jul-13 16:31:07 :: task #303623 for sisyphus TESTED 2022-Jul-13 16:31:08 :: task is ready for commit 2022-Jul-13 16:31:13 :: repo clone OK 2022-Jul-13 16:31:13 :: packages update OK 2022-Jul-13 16:31:15 :: [x86_64] update OK 2022-Jul-13 16:31:15 :: repo update OK 2022-Jul-13 16:31:24 :: repo save OK 2022-Jul-13 16:31:24 :: src index update OK 2022-Jul-13 16:31:25 :: updated /gears/c/cve-manager.git branch `sisyphus' 2022-Jul-13 16:31:25 :: updated /gears/c/cve-manager-inner-knowledge.git branch `sisyphus' 2022-Jul-13 16:31:29 :: gears update OK 2022-Jul-13 16:31:29 :: task #303623 for sisyphus DONE
reply other threads:[~2022-07-13 16:31 UTC|newest] Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=girar.task.303623.1.3@gyle.mskdc.altlinux.org \ --to=girar-builder@altlinux.org \ --cc=alexey@altlinux.org \ --cc=devel@lists.altlinux.org \ --cc=girar-builder-sisyphus@altlinux.org \ --cc=imz@altlinux.org \ --cc=nbr@altlinux.org \ --cc=sisyphus-incominger@lists.altlinux.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
ALT Linux Girar Builder robot reports This inbox may be cloned and mirrored by anyone: git clone --mirror http://lore.altlinux.org/sisyphus-incominger/0 sisyphus-incominger/git/0.git # If you have public-inbox 1.1+ installed, you may # initialize and index your mirror using the following commands: public-inbox-init -V2 sisyphus-incominger sisyphus-incominger/ http://lore.altlinux.org/sisyphus-incominger \ sisyphus-incominger@lists.altlinux.org sisyphus-incominger@lists.altlinux.ru sisyphus-incominger@lists.altlinux.com public-inbox-index sisyphus-incominger Example config snippet for mirrors. Newsgroup available over NNTP: nntp://lore.altlinux.org/org.altlinux.lists.sisyphus-incominger AGPL code for this site: git clone https://public-inbox.org/public-inbox.git