Started by user Joao Pina Logs Started by user Joao Pina [EnvInject] - Loading node environment variables. Building remotely on sl6-19076 (sl6) in workspace /tmp/workspace/QualityCriteriaValidation/arc [ssh-agent] Looking for ssh-agent implementation... [ssh-agent] Exec ssh-agent (binary ssh-agent on a remote machine) $ ssh-agent SSH_AUTH_SOCK=/tmp/ssh-PLEYXa1782/agent.1782 SSH_AGENT_PID=1784 [ssh-agent] Started. Running ssh-add (command line suppressed) Identity added: /tmp/workspace/QualityCriteriaValidation/arc@tmp/private_key_1121207732158644795.key (/tmp/workspace/QualityCriteriaValidation/arc@tmp/private_key_1121207732158644795.key) [ssh-agent] Using credentials orviz Cloning the remote Git repository Cloning repository https://github.com/egi-qc/umd-verification > git init /tmp/workspace/QualityCriteriaValidation/arc # timeout=10 Fetching upstream changes from https://github.com/egi-qc/umd-verification > git --version # timeout=10 > git fetch --tags --progress https://github.com/egi-qc/umd-verification +refs/heads/*:refs/remotes/origin/* > git config remote.origin.url https://github.com/egi-qc/umd-verification # timeout=10 > git config --add remote.origin.fetch +refs/heads/*:refs/remotes/origin/* # timeout=10 > git config remote.origin.url https://github.com/egi-qc/umd-verification # timeout=10 Fetching upstream changes from https://github.com/egi-qc/umd-verification > git fetch --tags --progress https://github.com/egi-qc/umd-verification +refs/heads/*:refs/remotes/origin/* > git rev-parse refs/remotes/origin/master^{commit} # timeout=10 > git rev-parse refs/remotes/origin/origin/master^{commit} # timeout=10 Checking out Revision 3ec8e5e39709e2566df82e532388aaa07143c07a (refs/remotes/origin/master) > git config core.sparsecheckout # timeout=10 > git checkout -f 3ec8e5e39709e2566df82e532388aaa07143c07a Commit message: "Merge branch 'master' of https://github.com/egi-qc/umd-verification" > git rev-list --no-walk 3ec8e5e39709e2566df82e532388aaa07143c07a # timeout=10 [arc] $ /bin/bash -xe /tmp/jenkins6475328034848585895.sh + TOOL=ansible + MODULE_NAME=https://github.com/egi-qc/ansible-arc + FAB_CMD=arc-ce + . bin/jenkins/common_functions.sh +++ pwd ++ WORKSPACE_CONFIG_DIR=/tmp/workspace/QualityCriteriaValidation/arc/_files ++ get_umd_release UMD4 ++ case $1 in ++ release_str=umd_release=4 ++ echo umd_release=4 + release=umd_release=4 ++ get_sudo_type sl6 ++ [[ sl6 == *sl6* ]] ++ sudocmd=rvmsudo ++ echo rvmsudo + sudocmd=rvmsudo + deploy_config_management ansible rvmsudo https://github.com/egi-qc/ansible-arc + sudocmd=rvmsudo + case $1 in + module_url=https://github.com/egi-qc/ansible-arc ++ basename https://github.com/egi-qc/ansible-arc + module_name=ansible-arc + module_path=/tmp/ansible-arc + rvmsudo pip install ansible==2.5 Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. You are using pip version 7.1.0, however version 19.1.1 is available. You should consider upgrading via the 'pip install --upgrade pip' command. Collecting ansible==2.5 Downloading https://files.pythonhosted.org/packages/4a/3b/9d98e132074bb6a3f18fd811db2819fbde6fc8a26fad9a40b49e53cb2455/ansible-2.5.0.tar.gz (10.1MB) Requirement already satisfied (use --upgrade to upgrade): jinja2 in /usr/lib/python2.6/site-packages (from ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): PyYAML in /usr/lib64/python2.6/site-packages (from ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): paramiko in /usr/lib/python2.6/site-packages (from ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): cryptography in /usr/lib64/python2.6/site-packages (from ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): setuptools in /usr/lib/python2.6/site-packages (from ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): MarkupSafe>=0.23 in /usr/lib64/python2.6/site-packages (from jinja2->ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): pycrypto!=2.4,>=2.1 in /usr/lib64/python2.6/site-packages (from paramiko->ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): idna>=2.1 in /usr/lib/python2.6/site-packages (from cryptography->ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): asn1crypto>=0.21.0 in /usr/lib/python2.6/site-packages (from cryptography->ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): six>=1.4.1 in /usr/lib/python2.6/site-packages (from cryptography->ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): enum34 in /usr/lib/python2.6/site-packages (from cryptography->ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): ipaddress in /usr/lib/python2.6/site-packages (from cryptography->ansible==2.5) Installing collected packages: ansible Running setup.py install for ansible Successfully installed ansible-2.5.0 + rvmsudo rm -rf /tmp/ansible-arc Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. + git clone https://github.com/egi-qc/ansible-arc /tmp/ansible-arc Initialized empty Git repository in /tmp/ansible-arc/.git/ + rvmsudo ansible-galaxy install -r /tmp/ansible-arc/requirements.yml Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. - extracting umd to /root/.ansible/roles/umd - umd (master) was installed successfully - adding dependency: geerlingguy.repo-epel - extracting grid-security to /root/.ansible/roles/grid-security - grid-security (master) was installed successfully - downloading role 'repo-epel', owned by geerlingguy - downloading role from https://github.com/geerlingguy/ansible-role-repo-epel/archive/1.2.4.tar.gz - extracting geerlingguy.repo-epel to /root/.ansible/roles/geerlingguy.repo-epel - geerlingguy.repo-epel (1.2.4) was installed successfully ++ get_repos ++ prefix=repository_file ++ multiple_arg repository_file ++ prefix=repository_file ++ shift ++ c=0 ++ repostr= ++ echo + repos= + add_hostname_as_localhost rvmsudo + MY_DOMAIN=egi.ifca.es ++ hostname -f hostname: Unknown host + [[ '' != *\e\g\i\.\i\f\c\a\.\e\s ]] ++ hostname + rvmsudo hostname sl6-19076.egi.ifca.es Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. ++ hostname + rvmsudo sed -i '/^127\.0\.0\.1/ s/ localhost/ sl6-19076.egi.ifca.es/' /etc/hosts Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. + args=umd_release=4,log_path=logs,enable_untested_repo=true,enable_testing_repo=true,info_port=2135 + '[' '' '!=' '' ']' + rvmsudo fab arc-ce:umd_release=4,log_path=logs,enable_untested_repo=true,enable_testing_repo=true,info_port=2135 Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. [INFO] Using UMD 4 release repository UMD verification tool ===================== Quality criteria: http://egi-qc.github.io Codebase: https://github.com/egi-qc/umd-verification Path locations | | log_path /tmp/workspace/QualityCriteriaValidation/arc/logs | yaim_path etc/yaim | puppet_path etc/puppet Production repositories | | umd_release_pkg http://repository.egi.eu/sw/production/umd/4/sl6/x86_64/updates/umd-release-4.0.0-1.el6.noarch.rpm | igtf_repo None [INFO] Log directory '/tmp/workspace/QualityCriteriaValidation/arc/logs' has been created. [localhost] local: sudo -E mkdir -p /etc/grid-security/certificates [localhost] local: sudo -E chown root:root /etc/grid-security [localhost] local: sudo -E chmod 0755 /etc/grid-security [INFO] Generating own certificates [localhost] local: sudo -E mkdir -p /root/UMDVerificationOwnCA [localhost] local: sudo -E openssl req -x509 -nodes -days 1 -newkey rsa:2048 -out ca.pem -outform PEM -keyout ca.key -subj '/DC=es/DC=UMDverification/CN=UMDVerificationOwnCA' [localhost] local: sudo -E openssl x509 -noout -hash -in ca.pem [localhost] local: sudo -E cp ca.pem /etc/grid-security/certificates/0d2a3bdd.0 [localhost] local: sudo -E echo "01" > crlnumber [localhost] local: sudo -E touch index.txt [localhost] local: sudo -E openssl ca -config openssl.cnf -gencrl -keyfile ca.key -cert ca.pem -out crl.pem [localhost] local: sudo -E cp crl.pem /etc/grid-security/certificates/0d2a3bdd.r0 [localhost] local: sudo -E openssl req -newkey rsa:2048 -nodes -sha1 -keyout cert.key -keyform PEM -out cert.req -outform PEM -subj '/DC=es/DC=UMDverification/CN=sl6-19076.egi.ifca.es' -config openssl.cnf [localhost] local: sudo -E openssl x509 -req -in cert.req -CA ca.pem -CAkey ca.key -CAcreateserial -extensions v3_req -extfile openssl.cnf -out cert.crt -days 1 [localhost] local: sudo -E chmod 400 cert.key [localhost] local: sudo -E cp cert.key /etc/grid-security/hostkey.pem [INFO] Private key stored in '/etc/grid-security/hostkey.pem' (with 400 perms). [localhost] local: sudo -E cp cert.crt /etc/grid-security/hostcert.pem [INFO] Public key stored in '/etc/grid-security/hostcert.pem'. [INFO] Running configuration [localhost] local: sudo -E ansible --help [INFO] Extra vars file added: /tmp/extra_vars.yaml [localhost] local: ansible-pull -vvv -C master -d /etc/ansible/roles/ansible-arc -i /etc/ansible/roles/ansible-arc/hosts -U https://github.com/egi-qc/ansible-arc --extra-vars '@/tmp/umd.yaml' --extra-vars '@/tmp/extra_vars.yaml' --tags 'all' [[QC_SEC_2: SHA-2 Certificates Support]] [[QC_SEC_5: World Writable Files]] [localhost] local: sudo -E find / -not \( -path "/proc" -prune \) -not \( -path "/sys" -prune \) -type f -perm -002 -exec ls -l {} \; [OK] Found no world-writable file. [[QC_INFO_1: GlueSchema 1.3 Support]] [localhost] local: sudo -E yum -y install glue-validator [localhost] local: sudo -E glue-validator -h localhost -p 2135 -b mds-vo-name=resource,o=grid -t glue1 [[QC_INFO_2: GlueSchema 2.0 Support]] [localhost] local: sudo -E yum -y install glue-validator [localhost] local: sudo -E glue-validator -h localhost -p 2135 -b GLUE2GroupID=resource,o=glue -t glue2 [[QC_INFO_3: Middleware Version Information]] [WARN] No middleware version found for DN: GLUE2EndpointID=urn:ogf:Endpoint:sl6-19076.egi.ifca.es:ldapng:2135,GLUE2ServiceID=urn:ogf:ComputingService:sl6-19076.egi.ifca.es:arex,GLUE2GroupID=services,o=glue [[QC_MON_1: Service Probes]] [NA] Product cannot be tested by Nagios. [localhost] local: sudo -E yum -y install voms-clients myproxy voms-clients-cpp [localhost] local: sudo -E openssl req -newkey rsa:2048 -nodes -sha1 -keyout cert.key -keyform PEM -out cert.req -outform PEM -subj '/DC=es/DC=UMDverification/CN=perico-palotes' -config openssl.cnf [localhost] local: sudo -E openssl x509 -req -in cert.req -CA ca.pem -CAkey ca.key -CAcreateserial -extensions v3_req -extfile openssl.cnf -out cert.crt -days 1 [localhost] local: sudo -E chmod 400 cert.key [localhost] local: sudo -E cp cert.key /tmp/userkey.crt [INFO] Private key stored in '/tmp/userkey.crt' (with 400 perms). [localhost] local: sudo -E cp cert.crt /tmp/usercert.crt [INFO] Public key stored in '/tmp/usercert.crt'. [localhost] local: sudo -E voms-proxy-fake -rfc -cert /tmp/usercert.crt -key /tmp/userkey.crt -hours 44000 -voms dteam -hostcert /etc/grid-security/hostcert.pem -hostkey /etc/grid-security/hostkey.pem -fqan /dteam/Role=NULL/Capability=NULL -uri sl6-19076.egi.ifca.es:15000 -out /tmp/umd_proxy [INFO] Fake proxy created under '/tmp/umd_proxy' [[QC_FUNC_1: Basic Funcionality Test.]] [INFO] Probe 'Test job submission through Ansible.' [localhost] local: su centos -c "./bin/arc/ansible-test.sh /tmp/umd_proxy" 2>&1 [INFO] Command 'su centos -c "./bin/arc/ansible-test.sh /tmp/umd_proxy"' ran successfully [OK] Basic functionality probes ran successfully. [[QC_FUNC_2: New features/bug fixes testing.]] [NA] No definition found for QC_FUNC_2. + _BUILD_URL=https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/arc/21 + archive_artifacts_in_workspace arc-ce ansible sl6 https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/arc/21 + FAB_CMD=arc-ce + TOOL=ansible + '[' -d /tmp/workspace/QualityCriteriaValidation/arc/_files ']' + mkdir /tmp/workspace/QualityCriteriaValidation/arc/_files + '[' ansible == puppet ']' + '[' ansible == ansible ']' + mkdir /tmp/workspace/QualityCriteriaValidation/arc/_files/vars + cp /tmp/extra_vars.yaml /tmp/umd.yaml /tmp/workspace/QualityCriteriaValidation/arc/_files/vars/ + publish_howtos arc-ce sl6 https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/arc/21 + FAB_CMD=arc-ce + OS=sl6 + BUILD_URL=https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/arc/21 + git config --global user.name 'Pablo Orviz' + git config --global user.email orviz@ifca.unican.es + wget --no-check-certificate https://gist.githubusercontent.com/dadrian/bad309f16e407526741e/raw/462e7ef24387948e17e68a3975b057200fc05533/known_hosts -O /home/centos/.ssh/known_hosts --2019-06-12 12:15:56-- https://gist.githubusercontent.com/dadrian/bad309f16e407526741e/raw/462e7ef24387948e17e68a3975b057200fc05533/known_hosts Resolving gist.githubusercontent.com... 151.101.132.133 Connecting to gist.githubusercontent.com|151.101.132.133|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 416327 (407K) [text/plain] Saving to: “/home/centos/.ssh/known_hosts” 0K .......... .......... .......... .......... .......... 12% 810K 0s 50K .......... .......... .......... .......... .......... 24% 1.55M 0s 100K .......... .......... .......... .......... .......... 36% 1.59M 0s 150K .......... .......... .......... .......... .......... 49% 1.59M 0s 200K .......... .......... .......... .......... .......... 61% 1.71M 0s 250K .......... .......... .......... .......... .......... 73% 20.1M 0s 300K .......... .......... .......... .......... .......... 86% 1.56M 0s 350K .......... .......... .......... .......... .......... 98% 1.80M 0s 400K ...... 100% 12530G=0.2s 2019-06-12 12:15:58 (1.63 MB/s) - “/home/centos/.ssh/known_hosts” saved [416327/416327] + ssh -T git@github.com Warning: Permanently added the RSA host key for IP address '140.82.118.3' to the list of known hosts. Hi egi-qc/deployment-howtos! You've successfully authenticated, but GitHub does not provide shell access. + echo ++ pwd + workspace=/tmp/workspace/QualityCriteriaValidation/arc + git clone https://github.com/egi-qc/deployment-howtos /tmp/deployment-howtos Initialized empty Git repository in /tmp/deployment-howtos/.git/ + cd /tmp/deployment-howtos + git remote set-url origin git@github.com:egi-qc/deployment-howtos.git + '[' -d arc-ce/sl6 ']' + cp -r /tmp/workspace/QualityCriteriaValidation/arc/_files/vars arc-ce/sl6/ + git add arc-ce/sl6/ + git commit -a -m 'arc-ce/sl6/ deployment how-to (build https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/arc/21)' [master b6888ef] arc-ce/sl6/ deployment how-to (build https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/arc/21) 1 files changed, 0 insertions(+), 5 deletions(-) + git push origin master Warning: Permanently added the RSA host key for IP address '140.82.118.3' to the list of known hosts. remote: Resolving deltas: 0% (0/1) remote: Resolving deltas: 100% (1/1) remote: Resolving deltas: 100% (1/1), completed with 1 local object. To git@github.com:egi-qc/deployment-howtos.git 1f3cce5..b6888ef master -> master + cd /tmp/workspace/QualityCriteriaValidation/arc $ ssh-agent -k unset SSH_AUTH_SOCK; unset SSH_AGENT_PID; echo Agent pid 1784 killed; [ssh-agent] Stopped. Archiving artifacts Finished: SUCCESS 1.6.2 · Core 2.164.2 · 807049f · 29th June 2018 04:50 PM