Quality Criteria Verification Report ==================================== Product: fts3 Release: fts3.fts3.centos7.x86_64-3.5.8 Software Provider: fts3 RT Ticket: 12494 Provider contact: fts3-steering@cern.ch Verifier: Pablo Orviz Hours worked: 10min Date: 13/03/2017 Status: Accepted Summary ======= - Puppet module: https://github.com/egi-qc/puppet-fts (branch 'umd') - Build info: https://jenkins.egi.ifca.es/job/fts/34 Related tickets =============== None. Documentation Criteria ====================== * Release notes: http://fts3-service.web.cern.ch/documentation/releases#qt-release-ui-tabs3 * User Documentation: http://fts3-service.web.cern.ch/ * API Documentation: http://fts3-service.web.cern.ch/ * Admin Documentation: http://fts3-service.web.cern.ch/ * Software License: - Generic Criteria ================ (Possible Statuses: OK, WARN, FAIL, NA (Not Applicable) or NT (Not Tested)) * Binary Distribution: OK * Upgrade: NT * X.509 Certificate support: OK * SHA-2 Certificates Support: OK * RFC Proxy support: OK * ARGUS Integration: NT * World Writable Files: OK * Passwords in world readable files: OK * GlueSchema 1.3 Support: OK * GlueSchema 2.0 Support: OK * Middleware Version Information: OK * Service Probes: OK * Accounting Records: NA * Bug Tracking System: OK Verification logs ================= + rvmsudo fab fts:umd_release=4,repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.fts3.fts3.sl6.x86_64/3/5/8/,repository_file_2=https://admin-repo.egi.eu/sw/umdstore/umd-4.gfal2.gfal2.sl6.x86_64/2/12/2,repository_file_3=https://admin-repo.egi.eu/sw/umdstore/umd-4.cern.gfal2-utils.sl6.x86_64/1/4/0,log_path=logs Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. [INFO] Using UMD 4 release repository [INFO] Using UMD verification repository file: ['http://admin-repo.egi.eu/sw/unverified/umd-4.fts3.fts3.sl6.x86_64/3/5/8/', 'https://admin-repo.egi.eu/sw/umdstore/umd-4.cern.gfal2-utils.sl6.x86_64/1/4/0', 'https://admin-repo.egi.eu/sw/umdstore/umd-4.gfal2.gfal2.sl6.x86_64/2/12/2'] UMD verification tool ===================== Quality criteria: http://egi-qc.github.io Codebase: https://github.com/egi-qc/umd-verification Path locations | | log_path logs | yaim_path etc/yaim | puppet_path etc/puppet Production repositories | | umd_release_pkg http://repository.egi.eu/sw/production/umd/4/sl6/x86_64/updates/umd-release-4.0.0-1.el6.noarch.rpm | igtf_repo None [INFO] Using the following repository files + http://admin-repo.egi.eu/sw/unverified/umd-4.fts3.fts3.sl6.x86_64/3/5/8/ + https://admin-repo.egi.eu/sw/umdstore/umd-4.cern.gfal2-utils.sl6.x86_64/1/4/0 + https://admin-repo.egi.eu/sw/umdstore/umd-4.gfal2.gfal2.sl6.x86_64/2/12/2 [localhost] local: sudo -E mkdir -p /etc/grid-security/certificates [localhost] local: sudo -E chown root:root /etc/grid-security [localhost] local: sudo -E chmod 0755 /etc/grid-security [INFO] Generating own certificates [localhost] local: sudo -E mkdir -p /root/UMDVerificationOwnCA [localhost] local: sudo -E openssl req -x509 -nodes -days 1 -newkey rsa:2048 -out ca.pem -outform PEM -keyout ca.key -subj '/DC=es/DC=UMDverification/CN=UMDVerificationOwnCA' [localhost] local: sudo -E openssl x509 -noout -hash -in ca.pem [localhost] local: sudo -E cp ca.pem /etc/grid-security/certificates/0d2a3bdd.0 [localhost] local: sudo -E echo "01" > crlnumber [localhost] local: sudo -E touch index.txt [localhost] local: sudo -E openssl ca -config openssl.cnf -gencrl -keyfile ca.key -cert ca.pem -out crl.pem [localhost] local: sudo -E cp crl.pem /etc/grid-security/certificates/0d2a3bdd.r0 [localhost] local: sudo -E openssl req -newkey rsa:2048 -nodes -sha1 -keyout cert.key -keyform PEM -out cert.req -outform PEM -subj '/DC=es/DC=UMDverification/CN=sl6-nova-663.privatevlan.cloud.ifca.es' -config openssl.cnf [localhost] local: sudo -E openssl x509 -req -in cert.req -CA ca.pem -CAkey ca.key -CAcreateserial -extensions v3_req -extfile openssl.cnf -out cert.crt -days 1 [localhost] local: sudo -E chmod 600 cert.key [localhost] local: sudo -E cp cert.key /etc/grid-security/hostkey.pem [INFO] Private key stored in '/etc/grid-security/hostkey.pem' (with 600 perms). [localhost] local: sudo -E cp cert.crt /etc/grid-security/hostcert.pem [INFO] Public key stored in '/etc/grid-security/hostcert.pem'. [INFO] Running configuration [localhost] local: sudo -E rpm --quiet -q puppetlabs-release [FAIL] Command execution has failed (reason: "") (action: no exit) [localhost] local: sudo -E rpm -ivh https://yum.puppetlabs.com/puppetlabs-release-el-6.noarch.rpm [localhost] local: sudo -E yum -y install puppet [localhost] local: sudo -E mkdir /etc/puppet/hieradata [localhost] local: librarian-puppet [localhost] local: librarian-puppet install --clean --path=/etc/puppet/modules --verbose [INFO] Log directory 'logs' has been created. [localhost] local: sudo -E cp etc/puppet/fts.yaml /etc/puppet/hieradata/fts.yaml [localhost] local: sudo -E cp etc/puppet/fetchcrl.yaml /etc/puppet/hieradata/fetchcrl.yaml [INFO] Extra vars file added: /etc/puppet/hieradata/extra_vars.yaml [INFO] Adding hiera parameter files: ['umd', 'fts', 'fetchcrl', 'extra_vars'] [localhost] local: puppet config print modulepath [localhost] local: puppet apply --verbose --debug --modulepath /etc/puppet/modules:/usr/share/puppet/modules etc/puppet/fts.pp --detail-exitcodes [FAIL] Command execution has failed (reason: "") (action: no exit) (log: ['qc_conf.stdout']) [INFO] Puppet execution ended successfully (some warnings though, check logs) [[QC_SEC_2: SHA-2 Certificates Support]] [[QC_SEC_5: World Writable Files]] [localhost] local: sudo -E find / -not \( -path "/proc" -prune \) -not \( -path "/sys" -prune \) -type f -perm -002 -exec ls -l {} \; [OK] Found no world-writable file. [[QC_INFO_1: GlueSchema 1.3 Support]] [NA] Product does not publish information through BDII. [[QC_INFO_2: GlueSchema 2.0 Support]] [NA] Product does not publish information through BDII. [[QC_INFO_3: Middleware Version Information]] [NA] Product does not publish information through BDII. [[QC_MON_1: Service Probes]] [NA] Product cannot be tested by Nagios. [INFO] No QC-specific ID provided: no specific QC probes will be ran.