ALT Linux Girar Builder robot reports
 help / color / mirror / Atom feed
From: "Girar pender (alexey)" <girar-builder@altlinux.org>
To: Alexey Appolonov <alexey@altlinux.org>
Cc: sisyphus-incominger@lists.altlinux.org,
	Ivan Zakharyaschev <imz@altlinux.org>,
	Denis Medvedev <nbr@altlinux.org>,
	girar-builder-sisyphus@altlinux.org
Subject: [#313317] DONE (try 4) cve-manager.git=0.71.4-alt1 ...
Date: Mon, 16 Jan 2023 16:32:03 +0000
Message-ID: <girar.task.313317.4.1@gyle.mskdc.altlinux.org> (raw)
In-Reply-To: <girar.task.313317.1.1@gyle.mskdc.altlinux.org>

https://git.altlinux.org/tasks/archive/done/_305/313317/logs/events.4.1.log

subtask  name                         aarch64  armh  i586  ppc64le  x86_64
   #440  cve-manager                     2:08     -     -     2:20    1:27
   #500  cve-manager-inner-knowledge       48     -     -     1:06      29

2023-Jan-16 16:21:16 :: task #313317 for sisyphus resumed by alexey:
#100 removed
#200 removed
#300 removed
#400 removed
#440 build 0.71.4-alt1 from /people/alexey/packages/cve-manager.git fetched at 2023-Jan-16 16:18:53
#500 build 2023.01.16-alt2 from /people/alexey/packages/cve-manager-inner-knowledge.git fetched at 2023-Jan-16 14:41:34
2023-Jan-16 16:21:16 :: created build repo
2023-Jan-16 16:21:17 :: [i586] #440 cve-manager.git 0.71.4-alt1: build start
2023-Jan-16 16:21:17 :: [ppc64le] #440 cve-manager.git 0.71.4-alt1: build start
2023-Jan-16 16:21:17 :: [armh] #440 cve-manager.git 0.71.4-alt1: build start
2023-Jan-16 16:21:17 :: [x86_64] #440 cve-manager.git 0.71.4-alt1: build start
2023-Jan-16 16:21:17 :: [aarch64] #440 cve-manager.git 0.71.4-alt1: build start
2023-Jan-16 16:21:30 :: [i586] #440 cve-manager.git 0.71.4-alt1: build SKIPPED
2023-Jan-16 16:21:30 :: [i586] #500 cve-manager-inner-knowledge.git 2023.01.16-alt2: build start
2023-Jan-16 16:21:38 :: [i586] #500 cve-manager-inner-knowledge.git 2023.01.16-alt2: build SKIPPED
2023-Jan-16 16:21:54 :: [armh] #440 cve-manager.git 0.71.4-alt1: build SKIPPED
2023-Jan-16 16:21:55 :: [armh] #500 cve-manager-inner-knowledge.git 2023.01.16-alt2: build start
2023-Jan-16 16:22:22 :: [armh] #500 cve-manager-inner-knowledge.git 2023.01.16-alt2: build SKIPPED
2023-Jan-16 16:22:44 :: [x86_64] #440 cve-manager.git 0.71.4-alt1: build OK
2023-Jan-16 16:22:44 :: [x86_64] #500 cve-manager-inner-knowledge.git 2023.01.16-alt2: build start
2023-Jan-16 16:23:13 :: [x86_64] #500 cve-manager-inner-knowledge.git 2023.01.16-alt2: build OK
2023-Jan-16 16:23:25 :: [aarch64] #440 cve-manager.git 0.71.4-alt1: build OK
2023-Jan-16 16:23:25 :: [aarch64] #500 cve-manager-inner-knowledge.git 2023.01.16-alt2: build start
2023-Jan-16 16:23:37 :: [ppc64le] #440 cve-manager.git 0.71.4-alt1: build OK
2023-Jan-16 16:23:38 :: [ppc64le] #500 cve-manager-inner-knowledge.git 2023.01.16-alt2: build start
2023-Jan-16 16:24:13 :: [aarch64] #500 cve-manager-inner-knowledge.git 2023.01.16-alt2: build OK
2023-Jan-16 16:24:44 :: [ppc64le] #500 cve-manager-inner-knowledge.git 2023.01.16-alt2: build OK
2023-Jan-16 16:25:19 :: #440: cve-manager.git 0.71.4-alt1: build check OK
2023-Jan-16 16:25:29 :: #500: cve-manager-inner-knowledge.git 2023.01.16-alt2: build check OK
2023-Jan-16 16:25:31 :: build check OK
2023-Jan-16 16:25:36 :: noarch check OK
2023-Jan-16 16:25:38 :: plan: src +2 -2 =18128, aarch64 +14 -14 =30825, ppc64le +14 -14 =30284, x86_64 +14 -14 =31776
#440 cve-manager 0.71.3-alt1 -> 0.71.4-alt1
 Thu Jan 12 2023 Alexey Appolonov <alexey@altlinux> 0.71.4-alt1
 - Enhanced mapping algorithm;
 - Corrected use of the list of ignored mapping pairs;
 - Column header "CVE ID" of the detailed reports is changed to "VUL ID".
#500 cve-manager-inner-knowledge 2023.01.16-alt1 -> 2023.01.16-alt2
 Mon Jan 16 2023 Alexey Appolonov <alexey@altlinux> 2023.01.16-alt2
 - Updated lists (for the release of cve-manager version 0.71.4).
2023-Jan-16 16:26:19 :: patched apt indices
2023-Jan-16 16:26:32 :: created next repo
2023-Jan-16 16:26:41 :: duplicate provides check OK
2023-Jan-16 16:27:19 :: dependencies check OK
2023-Jan-16 16:27:44 :: [x86_64 aarch64 ppc64le] ELF symbols check OK
warning [x86_64]: cpe-map=0.71.4-alt1: circular dependencies on cve-issues=0.71.4-alt1 cve-manager-inner-knowledge=2023.01.16-alt2 cve-manager=0.71.4-alt1 cve-monitor=0.71.4-alt1
2023-Jan-16 16:27:57 :: [x86_64] #440 cpe-map: install check OK
2023-Jan-16 16:28:01 :: [x86_64] #440 cve-backup: install check OK
2023-Jan-16 16:28:06 :: [x86_64] #440 cve-download: install check OK
warning [aarch64]: cpe-map=0.71.4-alt1: circular dependencies on cve-issues=0.71.4-alt1 cve-manager-inner-knowledge=2023.01.16-alt2 cve-manager=0.71.4-alt1 cve-monitor=0.71.4-alt1
2023-Jan-16 16:28:07 :: [aarch64] #440 cpe-map: install check OK
warning [ppc64le]: cpe-map=0.71.4-alt1: circular dependencies on cve-issues=0.71.4-alt1 cve-manager-inner-knowledge=2023.01.16-alt2 cve-manager=0.71.4-alt1 cve-monitor=0.71.4-alt1
2023-Jan-16 16:28:10 :: [x86_64] #440 cve-history: install check OK
2023-Jan-16 16:28:11 :: [ppc64le] #440 cpe-map: install check OK
2023-Jan-16 16:28:15 :: [aarch64] #440 cve-backup: install check OK
2023-Jan-16 16:28:15 :: [x86_64] #440 cve-import: install check OK
2023-Jan-16 16:28:20 :: [ppc64le] #440 cve-backup: install check OK
2023-Jan-16 16:28:24 :: [aarch64] #440 cve-download: install check OK
2023-Jan-16 16:28:25 :: [x86_64] #440 cve-import-debuginfo: install check OK
warning [x86_64]: cve-issues=0.71.4-alt1: circular dependencies on cpe-map=0.71.4-alt1 cve-manager-inner-knowledge=2023.01.16-alt2 cve-manager=0.71.4-alt1 cve-monitor=0.71.4-alt1
2023-Jan-16 16:28:30 :: [ppc64le] #440 cve-download: install check OK
2023-Jan-16 16:28:31 :: [x86_64] #440 cve-issues: install check OK
2023-Jan-16 16:28:32 :: [aarch64] #440 cve-history: install check OK
warning [x86_64]: cve-manager=0.71.4-alt1: circular dependencies on cpe-map=0.71.4-alt1 cve-issues=0.71.4-alt1 cve-manager-inner-knowledge=2023.01.16-alt2 cve-monitor=0.71.4-alt1
2023-Jan-16 16:28:37 :: [x86_64] #440 cve-manager: install check OK
2023-Jan-16 16:28:40 :: [ppc64le] #440 cve-history: install check OK
2023-Jan-16 16:28:41 :: [x86_64] #440 cve-manager-common: install check OK
2023-Jan-16 16:28:41 :: [aarch64] #440 cve-import: install check OK
warning [x86_64]: cve-manager-inner-knowledge=2023.01.16-alt2: circular dependencies on cpe-map=0.71.4-alt1 cve-issues=0.71.4-alt1 cve-manager=0.71.4-alt1 cve-monitor=0.71.4-alt1
2023-Jan-16 16:28:47 :: [x86_64] #500 cve-manager-inner-knowledge: install check OK
2023-Jan-16 16:28:51 :: [x86_64] #500 cve-manager-knowledge-miner: install check OK
2023-Jan-16 16:28:51 :: [ppc64le] #440 cve-import: install check OK
warning [x86_64]: cve-monitor=0.71.4-alt1: circular dependencies on cpe-map=0.71.4-alt1 cve-issues=0.71.4-alt1 cve-manager-inner-knowledge=2023.01.16-alt2 cve-manager=0.71.4-alt1
2023-Jan-16 16:28:57 :: [x86_64] #440 cve-monitor: install check OK
2023-Jan-16 16:28:57 :: [aarch64] #440 cve-import-debuginfo: install check OK
2023-Jan-16 16:29:01 :: [x86_64] #440 libcve-manager: install check OK
2023-Jan-16 16:29:07 :: [x86_64] #440 libcve-manager-debuginfo: install check OK
warning [aarch64]: cve-issues=0.71.4-alt1: circular dependencies on cpe-map=0.71.4-alt1 cve-manager-inner-knowledge=2023.01.16-alt2 cve-manager=0.71.4-alt1 cve-monitor=0.71.4-alt1
2023-Jan-16 16:29:08 :: [aarch64] #440 cve-issues: install check OK
2023-Jan-16 16:29:10 :: [ppc64le] #440 cve-import-debuginfo: install check OK
warning [aarch64]: cve-manager=0.71.4-alt1: circular dependencies on cpe-map=0.71.4-alt1 cve-issues=0.71.4-alt1 cve-manager-inner-knowledge=2023.01.16-alt2 cve-monitor=0.71.4-alt1
2023-Jan-16 16:29:18 :: [aarch64] #440 cve-manager: install check OK
warning [ppc64le]: cve-issues=0.71.4-alt1: circular dependencies on cpe-map=0.71.4-alt1 cve-manager-inner-knowledge=2023.01.16-alt2 cve-manager=0.71.4-alt1 cve-monitor=0.71.4-alt1
2023-Jan-16 16:29:23 :: [ppc64le] #440 cve-issues: install check OK
2023-Jan-16 16:29:26 :: [aarch64] #440 cve-manager-common: install check OK
warning [ppc64le]: cve-manager=0.71.4-alt1: circular dependencies on cpe-map=0.71.4-alt1 cve-issues=0.71.4-alt1 cve-manager-inner-knowledge=2023.01.16-alt2 cve-monitor=0.71.4-alt1
warning [aarch64]: cve-manager-inner-knowledge=2023.01.16-alt2: circular dependencies on cpe-map=0.71.4-alt1 cve-issues=0.71.4-alt1 cve-manager=0.71.4-alt1 cve-monitor=0.71.4-alt1
2023-Jan-16 16:29:36 :: [aarch64] #500 cve-manager-inner-knowledge: install check OK
2023-Jan-16 16:29:36 :: [ppc64le] #440 cve-manager: install check OK
2023-Jan-16 16:29:44 :: [aarch64] #500 cve-manager-knowledge-miner: install check OK
2023-Jan-16 16:29:46 :: [ppc64le] #440 cve-manager-common: install check OK
warning [aarch64]: cve-monitor=0.71.4-alt1: circular dependencies on cpe-map=0.71.4-alt1 cve-issues=0.71.4-alt1 cve-manager-inner-knowledge=2023.01.16-alt2 cve-manager=0.71.4-alt1
2023-Jan-16 16:29:54 :: [aarch64] #440 cve-monitor: install check OK
warning [ppc64le]: cve-manager-inner-knowledge=2023.01.16-alt2: circular dependencies on cpe-map=0.71.4-alt1 cve-issues=0.71.4-alt1 cve-manager=0.71.4-alt1 cve-monitor=0.71.4-alt1
2023-Jan-16 16:29:58 :: [ppc64le] #500 cve-manager-inner-knowledge: install check OK
2023-Jan-16 16:30:02 :: [aarch64] #440 libcve-manager: install check OK
2023-Jan-16 16:30:07 :: [ppc64le] #500 cve-manager-knowledge-miner: install check OK
2023-Jan-16 16:30:12 :: [aarch64] #440 libcve-manager-debuginfo: install check OK
warning [ppc64le]: cve-monitor=0.71.4-alt1: circular dependencies on cpe-map=0.71.4-alt1 cve-issues=0.71.4-alt1 cve-manager-inner-knowledge=2023.01.16-alt2 cve-manager=0.71.4-alt1
2023-Jan-16 16:30:20 :: [ppc64le] #440 cve-monitor: install check OK
2023-Jan-16 16:30:29 :: [ppc64le] #440 libcve-manager: install check OK
2023-Jan-16 16:30:42 :: [ppc64le] #440 libcve-manager-debuginfo: install check OK
2023-Jan-16 16:31:01 :: [x86_64-i586] generated apt indices
2023-Jan-16 16:31:01 :: [x86_64-i586] created next repo
2023-Jan-16 16:31:11 :: [x86_64-i586] dependencies check OK
2023-Jan-16 16:31:12 :: gears inheritance check OK
2023-Jan-16 16:31:13 :: srpm inheritance check OK
girar-check-perms: access to cve-manager ALLOWED for alexey: project leader
check-subtask-perms: #440: cve-manager: allowed for alexey
girar-check-perms: access to cve-manager-inner-knowledge ALLOWED for alexey: project leader
check-subtask-perms: #500: cve-manager-inner-knowledge: allowed for alexey
2023-Jan-16 16:31:13 :: acl check OK
2023-Jan-16 16:31:22 :: created contents_index files
2023-Jan-16 16:31:32 :: created hash files: aarch64 ppc64le src x86_64
2023-Jan-16 16:31:34 :: task #313317 for sisyphus TESTED
2023-Jan-16 16:31:35 :: task is ready for commit
2023-Jan-16 16:31:40 :: repo clone OK
2023-Jan-16 16:31:41 :: packages update OK
2023-Jan-16 16:31:46 :: [x86_64 aarch64 ppc64le] update OK
2023-Jan-16 16:31:46 :: repo update OK
2023-Jan-16 16:31:58 :: repo save OK
2023-Jan-16 16:31:58 :: src index update OK
2023-Jan-16 16:31:58 :: updated /gears/c/cve-manager.git branch `sisyphus'
2023-Jan-16 16:31:58 :: updated /gears/c/cve-manager-inner-knowledge.git branch `sisyphus'
2023-Jan-16 16:32:02 :: gears update OK
2023-Jan-16 16:32:02 :: task #313317 for sisyphus DONE


      parent reply	other threads:[~2023-01-16 16:32 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-01-12 13:19 [#313317] [test-only] FAILED cve-manager.git=alpha Girar awaiter (alexey)
2023-01-12 19:54 ` [#313317] TESTED (try 2) cve-manager.git=alpha Girar awaiter (alexey)
2023-01-13 23:05 ` [#313317] TESTED (try 3) cve-manager.git=alpha Girar awaiter (alexey)
2023-01-16 16:32 ` Girar pender (alexey) [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=girar.task.313317.4.1@gyle.mskdc.altlinux.org \
    --to=girar-builder@altlinux.org \
    --cc=alexey@altlinux.org \
    --cc=devel@lists.altlinux.org \
    --cc=girar-builder-sisyphus@altlinux.org \
    --cc=imz@altlinux.org \
    --cc=nbr@altlinux.org \
    --cc=sisyphus-incominger@lists.altlinux.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link

ALT Linux Girar Builder robot reports

This inbox may be cloned and mirrored by anyone:

	git clone --mirror http://lore.altlinux.org/sisyphus-incominger/0 sisyphus-incominger/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 sisyphus-incominger sisyphus-incominger/ http://lore.altlinux.org/sisyphus-incominger \
		sisyphus-incominger@lists.altlinux.org sisyphus-incominger@lists.altlinux.ru sisyphus-incominger@lists.altlinux.com
	public-inbox-index sisyphus-incominger

Example config snippet for mirrors.
Newsgroup available over NNTP:
	nntp://lore.altlinux.org/org.altlinux.lists.sisyphus-incominger


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git