Started by user Joao Pina [EnvInject] - Loading node environment variables. Building remotely on sl6-19 (sl6) in workspace /tmp/workspace/QualityCriteriaValidation/package-install Cloning the remote Git repository Cloning repository https://github.com/egi-qc/umd-verification > git init /tmp/workspace/QualityCriteriaValidation/package-install # timeout=10 Fetching upstream changes from https://github.com/egi-qc/umd-verification > git --version # timeout=10 > git fetch --tags --progress https://github.com/egi-qc/umd-verification +refs/heads/*:refs/remotes/origin/* > git config remote.origin.url https://github.com/egi-qc/umd-verification # timeout=10 > git config --add remote.origin.fetch +refs/heads/*:refs/remotes/origin/* # timeout=10 > git config remote.origin.url https://github.com/egi-qc/umd-verification # timeout=10 Fetching upstream changes from https://github.com/egi-qc/umd-verification > git fetch --tags --progress https://github.com/egi-qc/umd-verification +refs/heads/*:refs/remotes/origin/* > git rev-parse refs/remotes/origin/master^{commit} # timeout=10 > git rev-parse refs/remotes/origin/origin/master^{commit} # timeout=10 Checking out Revision 5961776283bb6129baef9b3b2e5976d965b22707 (refs/remotes/origin/master) > git config core.sparsecheckout # timeout=10 > git checkout -f 5961776283bb6129baef9b3b2e5976d965b22707 Commit message: "Use bdii class directly" > git rev-list --no-walk 3ebf63507fcce8be3d00b45f66b0198f08408faf # timeout=10 [package-install] $ /bin/bash -xe /tmp/jenkins7218890055231876669.sh + TOOL=ansible + MODULE_NAME=https://github.com/egi-qc/ansible-package-install + FAB_CMD=individual-packages + . bin/jenkins/common_functions.sh +++ pwd ++ WORKSPACE_CONFIG_DIR=/tmp/workspace/QualityCriteriaValidation/package-install/_files ++ get_umd_release UMD4 ++ case $1 in ++ release_str=umd_release=4 ++ echo umd_release=4 + release=umd_release=4 ++ get_sudo_type sl6 ++ [[ sl6 == *sl6* ]] ++ sudocmd=rvmsudo ++ echo rvmsudo + sudocmd=rvmsudo + deploy_config_management ansible rvmsudo https://github.com/egi-qc/ansible-package-install + sudocmd=rvmsudo + case $1 in + module_url=https://github.com/egi-qc/ansible-package-install ++ basename https://github.com/egi-qc/ansible-package-install + module_name=ansible-package-install + module_path=/tmp/ansible-package-install + rvmsudo pip install ansible==2.2 Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. You are using pip version 7.1.0, however version 18.1 is available. You should consider upgrading via the 'pip install --upgrade pip' command. Collecting ansible==2.2 Downloading https://files.pythonhosted.org/packages/48/da/5e51cf931e4c7849ba698654877e2951ade8f842f28f0c904453a1d317d7/ansible-2.2.0.0.tar.gz (2.4MB) Requirement already satisfied (use --upgrade to upgrade): paramiko in /usr/lib/python2.6/site-packages (from ansible==2.2) Requirement already satisfied (use --upgrade to upgrade): jinja2 in /usr/lib/python2.6/site-packages (from ansible==2.2) Requirement already satisfied (use --upgrade to upgrade): PyYAML in /usr/lib64/python2.6/site-packages (from ansible==2.2) Requirement already satisfied (use --upgrade to upgrade): setuptools in /usr/lib/python2.6/site-packages (from ansible==2.2) Requirement already satisfied (use --upgrade to upgrade): pycrypto>=2.6 in /usr/lib64/python2.6/site-packages (from ansible==2.2) Requirement already satisfied (use --upgrade to upgrade): MarkupSafe>=0.23 in /usr/lib64/python2.6/site-packages (from jinja2->ansible==2.2) Installing collected packages: ansible Running setup.py install for ansible Successfully installed ansible-2.2.0.0 + rvmsudo rm -rf /tmp/ansible-package-install Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. + git clone https://github.com/egi-qc/ansible-package-install /tmp/ansible-package-install Initialized empty Git repository in /tmp/ansible-package-install/.git/ + rvmsudo ansible-galaxy install -r /tmp/ansible-package-install/requirements.yml Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. /usr/lib64/python2.6/site-packages/cryptography/__init__.py:26: DeprecationWarning: Python 2.6 is no longer supported by the Python core team, please upgrade your Python. The next version of cryptography will drop support for Python 2.6 DeprecationWarning - extracting cmd to /etc/ansible/roles/cmd - cmd was installed successfully - extracting umd to /etc/ansible/roles/umd - umd was installed successfully [DEPRECATION WARNING]: The comma separated role spec format, use the yaml/explicit format instead.. This feature will be removed in a future release. Deprecation warnings can be disabled by setting deprecation_warnings=False in ansible.cfg. - adding dependency: geerlingguy.repo-epel - downloading role 'repo-epel', owned by geerlingguy - downloading role from https://github.com/geerlingguy/ansible-role-repo-epel/archive/1.2.3.tar.gz - extracting geerlingguy.repo-epel to /etc/ansible/roles/geerlingguy.repo-epel - geerlingguy.repo-epel was installed successfully ++ get_repos http://admin-repo.egi.eu/sw/unverified/umd-4.cern.dynafed.sl6.x86_64/1/3/2/repofiles/CERN.dynafed.sl6.x86_64.repo ++ prefix=repository_file ++ multiple_arg repository_file http://admin-repo.egi.eu/sw/unverified/umd-4.cern.dynafed.sl6.x86_64/1/3/2/repofiles/CERN.dynafed.sl6.x86_64.repo ++ prefix=repository_file ++ shift ++ c=0 ++ repostr= ++ for i in '"$@"' ++ c=1 ++ '[' -n '' ']' ++ repostr=repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.dynafed.sl6.x86_64/1/3/2/repofiles/CERN.dynafed.sl6.x86_64.repo ++ echo repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.dynafed.sl6.x86_64/1/3/2/repofiles/CERN.dynafed.sl6.x86_64.repo + repos=repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.dynafed.sl6.x86_64/1/3/2/repofiles/CERN.dynafed.sl6.x86_64.repo + '[' 'dynafed dynafed-dmlite-frontend dynafed-dmlite-plugin dynafed-lfc-plugin dynafed-private-devel' == '' ']' ++ get_packages dynafed dynafed-dmlite-frontend dynafed-dmlite-plugin dynafed-lfc-plugin dynafed-private-devel ++ prefix=package ++ multiple_arg package dynafed dynafed-dmlite-frontend dynafed-dmlite-plugin dynafed-lfc-plugin dynafed-private-devel ++ prefix=package ++ shift ++ c=0 ++ repostr= ++ for i in '"$@"' ++ c=1 ++ '[' -n '' ']' ++ repostr=package_1=dynafed ++ for i in '"$@"' ++ c=2 ++ '[' -n package_1=dynafed ']' ++ repostr=package_1=dynafed, ++ repostr=package_1=dynafed,package_2=dynafed-dmlite-frontend ++ for i in '"$@"' ++ c=3 ++ '[' -n package_1=dynafed,package_2=dynafed-dmlite-frontend ']' ++ repostr=package_1=dynafed,package_2=dynafed-dmlite-frontend, ++ repostr=package_1=dynafed,package_2=dynafed-dmlite-frontend,package_3=dynafed-dmlite-plugin ++ for i in '"$@"' ++ c=4 ++ '[' -n package_1=dynafed,package_2=dynafed-dmlite-frontend,package_3=dynafed-dmlite-plugin ']' ++ repostr=package_1=dynafed,package_2=dynafed-dmlite-frontend,package_3=dynafed-dmlite-plugin, ++ repostr=package_1=dynafed,package_2=dynafed-dmlite-frontend,package_3=dynafed-dmlite-plugin,package_4=dynafed-lfc-plugin ++ for i in '"$@"' ++ c=5 ++ '[' -n package_1=dynafed,package_2=dynafed-dmlite-frontend,package_3=dynafed-dmlite-plugin,package_4=dynafed-lfc-plugin ']' ++ repostr=package_1=dynafed,package_2=dynafed-dmlite-frontend,package_3=dynafed-dmlite-plugin,package_4=dynafed-lfc-plugin, ++ repostr=package_1=dynafed,package_2=dynafed-dmlite-frontend,package_3=dynafed-dmlite-plugin,package_4=dynafed-lfc-plugin,package_5=dynafed-private-devel ++ echo package_1=dynafed,package_2=dynafed-dmlite-frontend,package_3=dynafed-dmlite-plugin,package_4=dynafed-lfc-plugin,package_5=dynafed-private-devel + packages=package_1=dynafed,package_2=dynafed-dmlite-frontend,package_3=dynafed-dmlite-plugin,package_4=dynafed-lfc-plugin,package_5=dynafed-private-devel + args=umd_release=4,log_path=logs,enable_untested_repo=true,enable_testing_repo=true + '[' repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.dynafed.sl6.x86_64/1/3/2/repofiles/CERN.dynafed.sl6.x86_64.repo '!=' '' ']' + args=umd_release=4,log_path=logs,enable_untested_repo=true,enable_testing_repo=true,repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.dynafed.sl6.x86_64/1/3/2/repofiles/CERN.dynafed.sl6.x86_64.repo + rvmsudo fab individual-packages:umd_release=4,log_path=logs,enable_untested_repo=true,enable_testing_repo=true,repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.dynafed.sl6.x86_64/1/3/2/repofiles/CERN.dynafed.sl6.x86_64.repo,package_1=dynafed,package_2=dynafed-dmlite-frontend,package_3=dynafed-dmlite-plugin,package_4=dynafed-lfc-plugin,package_5=dynafed-private-devel Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. [INFO] Using UMD 4 release repository [INFO] Using UMD verification repository file: ['http://admin-repo.egi.eu/sw/unverified/umd-4.cern.dynafed.sl6.x86_64/1/3/2/repofiles/CERN.dynafed.sl6.x86_64.repo'] UMD verification tool ===================== Quality criteria: http://egi-qc.github.io Codebase: https://github.com/egi-qc/umd-verification Path locations | | log_path /tmp/workspace/QualityCriteriaValidation/package-install/logs | yaim_path etc/yaim | puppet_path etc/puppet Production repositories | | umd_release_pkg http://repository.egi.eu/sw/production/umd/4/sl6/x86_64/updates/umd-release-4.0.0-1.el6.noarch.rpm | igtf_repo None [INFO] Using the following repository files + http://admin-repo.egi.eu/sw/unverified/umd-4.cern.dynafed.sl6.x86_64/1/3/2/repofiles/CERN.dynafed.sl6.x86_64.repo [INFO] Log directory '/tmp/workspace/QualityCriteriaValidation/package-install/logs' has been created. [INFO] Running configuration [localhost] local: sudo -E ansible --help [INFO] Extra vars file added: /tmp/extra_vars.yaml [localhost] local: ansible-pull -vvv -C master -d /etc/ansible/roles/ansible-package-install -i /etc/ansible/roles/ansible-package-install/hosts -U https://github.com/egi-qc/ansible-package-install --extra-vars '@/tmp/umd.yaml' --extra-vars '@/tmp/extra_vars.yaml' --tags 'all' [[QC_SEC_2: SHA-2 Certificates Support]] [NA] Product does not need certificates. [[QC_SEC_5: World Writable Files]] [localhost] local: sudo -E find / -not \( -path "/proc" -prune \) -not \( -path "/sys" -prune \) -type f -perm -002 -exec ls -l {} \; [FAIL] Found 6 world-writable file/s. See more information in logs (qc_sec_5.stdout). [[QC_INFO_1: GlueSchema 1.3 Support]] [NA] Product does not publish information through BDII. [[QC_INFO_2: GlueSchema 2.0 Support]] [NA] Product does not publish information through BDII. [[QC_INFO_3: Middleware Version Information]] [NA] Product does not publish information through BDII. [[QC_MON_1: Service Probes]] [NA] Product cannot be tested by Nagios. [INFO] No QC-specific ID provided: no specific QC probes will be ran. + _BUILD_URL=https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/package-install/73 + archive_artifacts_in_workspace individual-packages ansible sl6 https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/package-install/73 http://admin-repo.egi.eu/sw/unverified/umd-4.cern.dynafed.sl6.x86_64/1/3/2/repofiles/CERN.dynafed.sl6.x86_64.repo + FAB_CMD=individual-packages + TOOL=ansible + '[' -d /tmp/workspace/QualityCriteriaValidation/package-install/_files ']' + mkdir /tmp/workspace/QualityCriteriaValidation/package-install/_files + '[' ansible == puppet ']' + '[' ansible == ansible ']' + mkdir /tmp/workspace/QualityCriteriaValidation/package-install/_files/vars + cp /tmp/extra_vars.yaml /tmp/umd.yaml /tmp/workspace/QualityCriteriaValidation/package-install/_files/vars/ + generate_readme individual-packages ansible sl6 https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/package-install/73 http://admin-repo.egi.eu/sw/unverified/umd-4.cern.dynafed.sl6.x86_64/1/3/2/repofiles/CERN.dynafed.sl6.x86_64.repo + FAB_CMD=individual-packages + TOOL=ansible + OS=sl6 + BUILD_URL=https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/package-install/73 + VERIFICATION_REPO=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.dynafed.sl6.x86_64/1/3/2/repofiles/CERN.dynafed.sl6.x86_64.repo + '[' -d /tmp/workspace/QualityCriteriaValidation/package-install/_files ']' + README=/tmp/workspace/QualityCriteriaValidation/package-install/_files/README.md ++ get_cmt_module individual-packages ansible ++ FAB_CMD=individual-packages ++ TOOL=ansible ++ PARENT_MODULE= ++ case $FAB_CMD in ++ PARENT_MODULE=individual_packages ++ INSTANCE=individual_packages ++ ATTR= ++ '[' ansible == puppet ']' ++ '[' ansible == ansible ']' ++ ATTR=role +++ python -c 'from umd.products import individual_packages ; print individual_packages.individual_packages.cfgtool.role' ++ echo https://github.com/egi-qc/ansible-package-install + MODULE=https://github.com/egi-qc/ansible-package-install ++ basename https://github.com/egi-qc/ansible-package-install + MODULE_BASENAME=ansible-package-install + '[' ansible == puppet ']' + '[' ansible == ansible ']' + [[ https://github.com/egi-qc/ansible-package-install = *\h\t\t\p\s* ]] + cat Archiving artifacts Finished: SUCCESS