Started by user Joao Pina Rebuilds build #47 Running as SYSTEM [EnvInject] - Loading node environment variables. Building remotely on sl6-57 (sl6) in workspace /tmp/workspace/QualityCriteriaValidation/frontier-squid [ssh-agent] Looking for ssh-agent implementation... [ssh-agent] Exec ssh-agent (binary ssh-agent on a remote machine) $ ssh-agent SSH_AUTH_SOCK=/tmp/ssh-HifRMJ1805/agent.1805 SSH_AGENT_PID=1807 [ssh-agent] Started. Running ssh-add (command line suppressed) Identity added: /tmp/workspace/QualityCriteriaValidation/frontier-squid@tmp/private_key_5053416121673278133.key (/tmp/workspace/QualityCriteriaValidation/frontier-squid@tmp/private_key_5053416121673278133.key) [ssh-agent] Using credentials orviz No credentials specified Cloning the remote Git repository Cloning repository https://github.com/egi-qc/umd-verification > git init /tmp/workspace/QualityCriteriaValidation/frontier-squid # timeout=10 Fetching upstream changes from https://github.com/egi-qc/umd-verification > git --version # timeout=10 > git fetch --tags --progress https://github.com/egi-qc/umd-verification +refs/heads/*:refs/remotes/origin/* > git config remote.origin.url https://github.com/egi-qc/umd-verification # timeout=10 > git config --add remote.origin.fetch +refs/heads/*:refs/remotes/origin/* # timeout=10 > git config remote.origin.url https://github.com/egi-qc/umd-verification # timeout=10 Fetching upstream changes from https://github.com/egi-qc/umd-verification > git fetch --tags --progress https://github.com/egi-qc/umd-verification +refs/heads/*:refs/remotes/origin/* > git rev-parse refs/remotes/origin/master^{commit} # timeout=10 > git rev-parse refs/remotes/origin/origin/master^{commit} # timeout=10 Checking out Revision caad53301bdebffe166a56b9e73e9f16e7b285a9 (refs/remotes/origin/master) > git config core.sparsecheckout # timeout=10 > git checkout -f caad53301bdebffe166a56b9e73e9f16e7b285a9 Commit message: "Print ldapsearch output for cloud and site bdii" > git rev-list --no-walk 181b2a967ee955bf9d4062a60f3138da4c850f71 # timeout=10 [frontier-squid] $ /bin/bash -xe /tmp/jenkins4931012968252414282.sh + TOOL=puppet + MODULE_NAME=https://github.com/desalvo/puppet-frontier + FAB_CMD=frontier-squid + . bin/jenkins/common_functions.sh +++ pwd ++ WORKSPACE_CONFIG_DIR=/tmp/workspace/QualityCriteriaValidation/frontier-squid/_files ++ get_umd_release UMD4 ++ case $1 in ++ release_str=umd_release=4 ++ echo umd_release=4 + release=umd_release=4 ++ get_sudo_type sl6 ++ [[ sl6 == *sl6* ]] ++ sudocmd=rvmsudo ++ echo rvmsudo + sudocmd=rvmsudo + deploy_config_management puppet rvmsudo https://github.com/desalvo/puppet-frontier + sudocmd=rvmsudo + case $1 in ++ get_repos http://admin-repo.egi.eu/sw/unverified/umd-4.cernfrontier.squid.sl6.x86_64/4/8/2/ ++ prefix=repository_file ++ multiple_arg repository_file http://admin-repo.egi.eu/sw/unverified/umd-4.cernfrontier.squid.sl6.x86_64/4/8/2/ ++ prefix=repository_file ++ shift ++ c=0 ++ repostr= ++ for i in '"$@"' ++ c=1 ++ '[' -n '' ']' ++ repostr=repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.cernfrontier.squid.sl6.x86_64/4/8/2/ ++ echo repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.cernfrontier.squid.sl6.x86_64/4/8/2/ + repos=repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.cernfrontier.squid.sl6.x86_64/4/8/2/ + add_hostname_as_localhost rvmsudo + MY_DOMAIN=egi.ifca.es ++ hostname -f hostname: Unknown host + [[ '' != *\e\g\i\.\i\f\c\a\.\e\s ]] ++ hostname + rvmsudo hostname sl6-57.egi.ifca.es Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. ++ hostname + rvmsudo sed -i '/^127\.0\.0\.1/ s/ localhost/ sl6-57.egi.ifca.es localhost/' /etc/hosts Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. + args=umd_release=4,log_path=logs,enable_untested_repo=true,enable_testing_repo=true + '[' repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.cernfrontier.squid.sl6.x86_64/4/8/2/ '!=' '' ']' + args=umd_release=4,log_path=logs,enable_untested_repo=true,enable_testing_repo=true,repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.cernfrontier.squid.sl6.x86_64/4/8/2/ + '[' -f x509_dteam_proxy ']' + [[ sl6 == *sl6* ]] + source /home/centos/.rvm/environments/default ++ export PATH=/home/centos/.rvm/gems/ruby-2.4.1/bin:/home/centos/.rvm/gems/ruby-2.4.1@global/bin:/home/centos/.rvm/rubies/ruby-2.4.1/bin:/usr/lib64/qt-3.3/bin:/usr/local/bin:/bin:/usr/bin:/home/centos/.rvm/bin ++ PATH=/home/centos/.rvm/gems/ruby-2.4.1/bin:/home/centos/.rvm/gems/ruby-2.4.1@global/bin:/home/centos/.rvm/rubies/ruby-2.4.1/bin:/usr/lib64/qt-3.3/bin:/usr/local/bin:/bin:/usr/bin:/home/centos/.rvm/bin ++ export GEM_HOME=/home/centos/.rvm/gems/ruby-2.4.1 ++ GEM_HOME=/home/centos/.rvm/gems/ruby-2.4.1 ++ export GEM_PATH=/home/centos/.rvm/gems/ruby-2.4.1:/home/centos/.rvm/gems/ruby-2.4.1@global ++ GEM_PATH=/home/centos/.rvm/gems/ruby-2.4.1:/home/centos/.rvm/gems/ruby-2.4.1@global ++ export MY_RUBY_HOME=/home/centos/.rvm/rubies/ruby-2.4.1 ++ MY_RUBY_HOME=/home/centos/.rvm/rubies/ruby-2.4.1 ++ export IRBRC=/home/centos/.rvm/rubies/ruby-2.4.1/.irbrc ++ IRBRC=/home/centos/.rvm/rubies/ruby-2.4.1/.irbrc ++ unset MAGLEV_HOME ++ unset RBXOPT ++ export RUBY_VERSION=ruby-2.4.1 ++ RUBY_VERSION=ruby-2.4.1 + rvmsudo -E fab frontier-squid:umd_release=4,log_path=logs,enable_untested_repo=true,enable_testing_repo=true,repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.cernfrontier.squid.sl6.x86_64/4/8/2/ Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. [INFO] Using UMD 4 release repository [INFO] Using UMD verification repository file: ['http://admin-repo.egi.eu/sw/unverified/umd-4.cernfrontier.squid.sl6.x86_64/4/8/2/'] UMD verification tool ===================== Quality criteria: http://egi-qc.github.io Codebase: https://github.com/egi-qc/umd-verification Path locations | | log_path /tmp/workspace/QualityCriteriaValidation/frontier-squid/logs | yaim_path etc/yaim | puppet_path etc/puppet Production repositories | | umd_release_pkg http://repository.egi.eu/sw/production/umd/4/sl6/x86_64/updates/umd-release-4.0.0-1.el6.noarch.rpm | igtf_repo None [INFO] Using the following repository files + http://admin-repo.egi.eu/sw/unverified/umd-4.cernfrontier.squid.sl6.x86_64/4/8/2/ [INFO] Log directory '/tmp/workspace/QualityCriteriaValidation/frontier-squid/logs' has been created. [localhost] local: sudo -E mkdir -p /etc/grid-security/certificates [localhost] local: sudo -E chown root:root /etc/grid-security [localhost] local: sudo -E chmod 0755 /etc/grid-security [INFO] Generating own certificates [localhost] local: sudo -E mkdir -p /root/UMDVerificationOwnCA [localhost] local: sudo -E openssl req -x509 -nodes -days 1 -newkey rsa:2048 -out ca.pem -outform PEM -keyout ca.key -subj '/DC=es/DC=UMDverification/CN=UMDVerificationOwnCA' [localhost] local: sudo -E openssl x509 -noout -hash -in ca.pem [localhost] local: sudo -E cp ca.pem /etc/grid-security/certificates/0d2a3bdd.0 [localhost] local: sudo -E echo "01" > crlnumber [localhost] local: sudo -E touch index.txt [localhost] local: sudo -E openssl ca -config openssl.cnf -gencrl -keyfile ca.key -cert ca.pem -out crl.pem [localhost] local: sudo -E cp crl.pem /etc/grid-security/certificates/0d2a3bdd.r0 [localhost] local: sudo -E openssl req -newkey rsa:2048 -nodes -sha1 -keyout cert.key -keyform PEM -out cert.req -outform PEM -subj '/DC=es/DC=UMDverification/CN=sl6-57.egi.ifca.es' -config openssl.cnf [localhost] local: sudo -E openssl x509 -req -in cert.req -CA ca.pem -CAkey ca.key -CAcreateserial -extensions v3_req -extfile openssl.cnf -out cert.crt -days 1 [localhost] local: sudo -E chmod 400 cert.key [localhost] local: sudo -E cp cert.key /etc/grid-security/hostkey.pem [INFO] Private key stored in '/etc/grid-security/hostkey.pem' (with 400 perms). [localhost] local: sudo -E cp cert.crt /etc/grid-security/hostcert.pem [INFO] Public key stored in '/etc/grid-security/hostcert.pem'. [INFO] Running configuration [localhost] local: sudo -E rpm --quiet -q puppetlabs-release [localhost] local: sudo -E yum -y install puppet [localhost] local: librarian-puppet [localhost] local: librarian-puppet install --clean --path=/etc/puppet/modules --verbose [INFO] Adding hiera parameter files: ['umd'] [localhost] local: puppet config print modulepath [localhost] local: puppet apply --verbose --debug --modulepath /etc/puppet/modules etc/puppet/frontier_squid.pp --detail-exitcodes [FAIL] Command execution has failed (reason: "Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://docs.puppet.com/puppet/5.3/reference/deprecated_language.html\n (file & line not available) Warning: /etc/puppetlabs/code/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 (file: /etc/puppetlabs/code/hiera.yaml)") (action: no exit) (log: ['qc_conf.stdout', 'qc_conf.stderr']) [INFO] Puppet execution ended successfully (changes were applied) [localhost] local: sudo -E rpm -qa [[QC_SEC_2: SHA-2 Certificates Support]] [[QC_SEC_5: World Writable Files]] [localhost] local: sudo -E find / -not \( -path "/proc" -prune \) -not \( -path "/sys" -prune \) -type f -perm -002 -exec ls -l {} \; [OK] Found no world-writable file. [[QC_INFO_1: GlueSchema 1.3 Support]] [NA] Product does not publish information through BDII. [[QC_INFO_2: GlueSchema 2.0 Support]] [NA] Product does not publish information through BDII. [[QC_INFO_3: Middleware Version Information]] [NA] Product does not publish information through BDII. [[QC_MON_1: Service Probes]] [NA] Product cannot be tested by Nagios. [[QC_FUNC_1: Basic Funcionality Test.]] [INFO] Probe 'Frontier squid cache test.' [localhost] local: su centos -c "./bin/frontier-squid/fnget.sh " 2>&1 [INFO] Command 'su centos -c "./bin/frontier-squid/fnget.sh "' ran successfully [OK] Basic functionality probes ran successfully. [[QC_FUNC_2: New features/bug fixes testing.]] [NA] No definition found for QC_FUNC_2. + _BUILD_URL=https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/frontier-squid/48 + archive_artifacts_in_workspace frontier-squid puppet sl6 https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/frontier-squid/48 http://admin-repo.egi.eu/sw/unverified/umd-4.cernfrontier.squid.sl6.x86_64/4/8/2/ + FAB_CMD=frontier-squid + TOOL=puppet + '[' -d /tmp/workspace/QualityCriteriaValidation/frontier-squid/_files ']' + mkdir /tmp/workspace/QualityCriteriaValidation/frontier-squid/_files + '[' puppet == puppet ']' ++ get_cmt_module frontier-squid puppet ++ FAB_CMD=frontier-squid ++ TOOL=puppet ++ PARENT_MODULE= ++ case $FAB_CMD in ++ PARENT_MODULE=frontier_squid ++ INSTANCE=frontier_squid ++ ATTR= ++ '[' puppet == puppet ']' ++ ATTR=manifest +++ python -c 'from umd.products import frontier_squid ; print frontier_squid.frontier_squid.cfgtool.manifest' ++ echo frontier_squid.pp + MODULE=frontier_squid.pp + cp /tmp/Puppetfile /tmp/workspace/QualityCriteriaValidation/frontier-squid/_files/ + mkdir /tmp/workspace/QualityCriteriaValidation/frontier-squid/_files/puppet + cp -r /etc/puppet/hiera.yaml /etc/puppet/hieradata /tmp/workspace/QualityCriteriaValidation/frontier-squid/_files/puppet + mkdir /tmp/workspace/QualityCriteriaValidation/frontier-squid/_files/puppet/manifest + cp etc/puppet/frontier_squid.pp /tmp/workspace/QualityCriteriaValidation/frontier-squid/_files/puppet/manifest + publish_howtos frontier-squid sl6 https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/frontier-squid/48 + FAB_CMD=frontier-squid + OS=sl6 + BUILD_URL=https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/frontier-squid/48 + git config --global user.name 'Pablo Orviz' + git config --global user.email orviz@ifca.unican.es + wget --no-check-certificate https://gist.githubusercontent.com/dadrian/bad309f16e407526741e/raw/462e7ef24387948e17e68a3975b057200fc05533/known_hosts -O /home/centos/.ssh/known_hosts --2019-09-05 17:49:40-- https://gist.githubusercontent.com/dadrian/bad309f16e407526741e/raw/462e7ef24387948e17e68a3975b057200fc05533/known_hosts Resolving gist.githubusercontent.com... 151.101.240.133 Connecting to gist.githubusercontent.com|151.101.240.133|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 416327 (407K) [text/plain] Saving to: “/home/centos/.ssh/known_hosts” 0K .......... .......... .......... .......... .......... 12% 657K 1s 50K .......... .......... .......... .......... .......... 24% 1.19M 0s 100K .......... .......... .......... .......... .......... 36% 1.36M 0s 150K .......... .......... .......... .......... .......... 49% 1.32M 0s 200K .......... .......... .......... .......... .......... 61% 31.7M 0s 250K .......... .......... .......... .......... .......... 73% 1.35M 0s 300K .......... .......... .......... .......... .......... 86% 43.2M 0s 350K .......... .......... .......... .......... .......... 98% 156M 0s 400K ...... 100% 12530G=0.2s 2019-09-05 17:49:41 (1.73 MB/s) - “/home/centos/.ssh/known_hosts” saved [416327/416327] + ssh -T git@github.com Warning: Permanently added the RSA host key for IP address '140.82.118.4' to the list of known hosts. Hi egi-qc/deployment-howtos! You've successfully authenticated, but GitHub does not provide shell access. + echo ++ pwd + workspace=/tmp/workspace/QualityCriteriaValidation/frontier-squid + git clone https://github.com/egi-qc/deployment-howtos /tmp/deployment-howtos Initialized empty Git repository in /tmp/deployment-howtos/.git/ + cd /tmp/deployment-howtos + git remote set-url origin git@github.com:egi-qc/deployment-howtos.git + '[' -d frontier-squid/sl6 ']' + cp -r /tmp/workspace/QualityCriteriaValidation/frontier-squid/_files/puppet /tmp/workspace/QualityCriteriaValidation/frontier-squid/_files/Puppetfile frontier-squid/sl6/ ++ grep -v '??' ++ git status --porcelain + '[' -n ' M frontier-squid/sl6/puppet/hieradata/umd.yaml' ']' + git add frontier-squid/sl6/ + git commit -a -m 'frontier-squid/sl6/ deployment how-to (build https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/frontier-squid/48)' [master b5d6a0a] frontier-squid/sl6/ deployment how-to (build https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/frontier-squid/48) 1 files changed, 3 insertions(+), 3 deletions(-) + git push origin master Warning: Permanently added the RSA host key for IP address '140.82.118.4' to the list of known hosts. remote: Resolving deltas: 0% (0/3) remote: Resolving deltas: 33% (1/3) remote: Resolving deltas: 66% (2/3) remote: Resolving deltas: 100% (3/3) remote: Resolving deltas: 100% (3/3), completed with 3 local objects. To git@github.com:egi-qc/deployment-howtos.git 3bd44a2..b5d6a0a master -> master + cd /tmp/workspace/QualityCriteriaValidation/frontier-squid $ ssh-agent -k unset SSH_AUTH_SOCK; unset SSH_AGENT_PID; echo Agent pid 1807 killed; [ssh-agent] Stopped. Archiving artifacts Finished: SUCCESS