Started by user Joao Pina Rebuilds build #58 Running as SYSTEM [EnvInject] - Loading node environment variables. Building remotely on sl6-3 (sl6) in workspace /tmp/workspace/QualityCriteriaValidation/grid-clients [ssh-agent] Looking for ssh-agent implementation... [ssh-agent] Exec ssh-agent (binary ssh-agent on a remote machine) $ ssh-agent SSH_AUTH_SOCK=/tmp/ssh-TOHVGq1801/agent.1801 SSH_AGENT_PID=1803 [ssh-agent] Started. Running ssh-add (command line suppressed) Identity added: /tmp/workspace/QualityCriteriaValidation/grid-clients@tmp/private_key_4021097990237762012.key (/tmp/workspace/QualityCriteriaValidation/grid-clients@tmp/private_key_4021097990237762012.key) [ssh-agent] Using credentials orviz No credentials specified Cloning the remote Git repository Cloning repository https://github.com/egi-qc/umd-verification > git init /tmp/workspace/QualityCriteriaValidation/grid-clients # timeout=10 Fetching upstream changes from https://github.com/egi-qc/umd-verification > git --version # timeout=10 > git fetch --tags --progress https://github.com/egi-qc/umd-verification +refs/heads/*:refs/remotes/origin/* > git config remote.origin.url https://github.com/egi-qc/umd-verification # timeout=10 > git config --add remote.origin.fetch +refs/heads/*:refs/remotes/origin/* # timeout=10 > git config remote.origin.url https://github.com/egi-qc/umd-verification # timeout=10 Fetching upstream changes from https://github.com/egi-qc/umd-verification > git fetch --tags --progress https://github.com/egi-qc/umd-verification +refs/heads/*:refs/remotes/origin/* > git rev-parse refs/remotes/origin/master^{commit} # timeout=10 > git rev-parse refs/remotes/origin/origin/master^{commit} # timeout=10 Checking out Revision 3b90f7473cda77d5ff860081ae1590cd23a01506 (refs/remotes/origin/master) > git config core.sparsecheckout # timeout=10 > git checkout -f 3b90f7473cda77d5ff860081ae1590cd23a01506 Commit message: "Re-add release variable until all ansible roles are integrated with egi-foundation.cmd & umd roles" > git rev-list --no-walk 3b90f7473cda77d5ff860081ae1590cd23a01506 # timeout=10 [grid-clients] $ /bin/bash -xe /tmp/jenkins6888994551228911242.sh + TOOL=ansible + MODULE_NAME=https://github.com/egi-qc/ansible-grid-clients + FAB_CMD=clients-solo + . bin/jenkins/common_functions.sh +++ pwd ++ WORKSPACE_CONFIG_DIR=/tmp/workspace/QualityCriteriaValidation/grid-clients/_files ++ get_umd_release UMD4 ++ case $1 in ++ release_str=umd_release=4 ++ echo umd_release=4 + release=umd_release=4 ++ get_sudo_type sl6 ++ [[ sl6 == *sl6* ]] ++ sudocmd=rvmsudo ++ echo rvmsudo + sudocmd=rvmsudo + deploy_config_management ansible rvmsudo https://github.com/egi-qc/ansible-grid-clients + sudocmd=rvmsudo + case $1 in + module_url=https://github.com/egi-qc/ansible-grid-clients ++ basename https://github.com/egi-qc/ansible-grid-clients + module_name=ansible-grid-clients + module_path=/tmp/ansible-grid-clients + rvmsudo pip install ansible==2.5 Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. You are using pip version 7.1.0, however version 19.2.3 is available. You should consider upgrading via the 'pip install --upgrade pip' command. Collecting ansible==2.5 Downloading https://files.pythonhosted.org/packages/4a/3b/9d98e132074bb6a3f18fd811db2819fbde6fc8a26fad9a40b49e53cb2455/ansible-2.5.0.tar.gz (10.1MB) Requirement already satisfied (use --upgrade to upgrade): jinja2 in /usr/lib/python2.6/site-packages (from ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): PyYAML in /usr/lib64/python2.6/site-packages (from ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): paramiko in /usr/lib/python2.6/site-packages (from ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): cryptography in /usr/lib64/python2.6/site-packages (from ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): setuptools in /usr/lib/python2.6/site-packages (from ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): MarkupSafe>=0.23 in /usr/lib64/python2.6/site-packages (from jinja2->ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): pycrypto!=2.4,>=2.1 in /usr/lib64/python2.6/site-packages (from paramiko->ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): idna>=2.1 in /usr/lib/python2.6/site-packages (from cryptography->ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): asn1crypto>=0.21.0 in /usr/lib/python2.6/site-packages (from cryptography->ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): six>=1.4.1 in /usr/lib/python2.6/site-packages (from cryptography->ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): enum34 in /usr/lib/python2.6/site-packages (from cryptography->ansible==2.5) Requirement already satisfied (use --upgrade to upgrade): ipaddress in /usr/lib/python2.6/site-packages (from cryptography->ansible==2.5) Installing collected packages: ansible Running setup.py install for ansible Successfully installed ansible-2.5.0 + rvmsudo rm -rf /tmp/ansible-grid-clients Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. + git clone https://github.com/egi-qc/ansible-grid-clients /tmp/ansible-grid-clients Initialized empty Git repository in /tmp/ansible-grid-clients/.git/ + rvmsudo ansible-galaxy install -r /tmp/ansible-grid-clients/requirements.yml Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. - extracting umd to /root/.ansible/roles/umd - umd (master) was installed successfully - adding dependency: geerlingguy.repo-epel - downloading role 'repo-epel', owned by geerlingguy - downloading role from https://github.com/geerlingguy/ansible-role-repo-epel/archive/1.2.4.tar.gz - extracting geerlingguy.repo-epel to /root/.ansible/roles/geerlingguy.repo-epel - geerlingguy.repo-epel (1.2.4) was installed successfully ++ get_repos http://admin-repo.egi.eu/sw/unverified/umd-4.gfal2.gfal2.sl6.x86_64/2/16/3/repofiles/GFAL2.gfal2.sl6.x86_64.repo http://admin-repo.egi.eu/sw/unverified/umd-4.cern.gfal2-utils.sl6.x86_64/1/5/3/repofiles/CERN.gfal2-utils.sl6.x86_64.repo http://admin-repo.egi.eu/sw/unverified/umd-4.cern.davix.sl6.x86_64/0/7/5/repofiles/CERN.davix.sl6.x86_64.repo ++ prefix=repository_file ++ multiple_arg repository_file http://admin-repo.egi.eu/sw/unverified/umd-4.gfal2.gfal2.sl6.x86_64/2/16/3/repofiles/GFAL2.gfal2.sl6.x86_64.repo http://admin-repo.egi.eu/sw/unverified/umd-4.cern.gfal2-utils.sl6.x86_64/1/5/3/repofiles/CERN.gfal2-utils.sl6.x86_64.repo http://admin-repo.egi.eu/sw/unverified/umd-4.cern.davix.sl6.x86_64/0/7/5/repofiles/CERN.davix.sl6.x86_64.repo ++ prefix=repository_file ++ shift ++ c=0 ++ repostr= ++ for i in '"$@"' ++ c=1 ++ '[' -n '' ']' ++ repostr=repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.gfal2.gfal2.sl6.x86_64/2/16/3/repofiles/GFAL2.gfal2.sl6.x86_64.repo ++ for i in '"$@"' ++ c=2 ++ '[' -n repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.gfal2.gfal2.sl6.x86_64/2/16/3/repofiles/GFAL2.gfal2.sl6.x86_64.repo ']' ++ repostr=repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.gfal2.gfal2.sl6.x86_64/2/16/3/repofiles/GFAL2.gfal2.sl6.x86_64.repo, ++ repostr=repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.gfal2.gfal2.sl6.x86_64/2/16/3/repofiles/GFAL2.gfal2.sl6.x86_64.repo,repository_file_2=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.gfal2-utils.sl6.x86_64/1/5/3/repofiles/CERN.gfal2-utils.sl6.x86_64.repo ++ for i in '"$@"' ++ c=3 ++ '[' -n repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.gfal2.gfal2.sl6.x86_64/2/16/3/repofiles/GFAL2.gfal2.sl6.x86_64.repo,repository_file_2=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.gfal2-utils.sl6.x86_64/1/5/3/repofiles/CERN.gfal2-utils.sl6.x86_64.repo ']' ++ repostr=repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.gfal2.gfal2.sl6.x86_64/2/16/3/repofiles/GFAL2.gfal2.sl6.x86_64.repo,repository_file_2=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.gfal2-utils.sl6.x86_64/1/5/3/repofiles/CERN.gfal2-utils.sl6.x86_64.repo, ++ repostr=repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.gfal2.gfal2.sl6.x86_64/2/16/3/repofiles/GFAL2.gfal2.sl6.x86_64.repo,repository_file_2=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.gfal2-utils.sl6.x86_64/1/5/3/repofiles/CERN.gfal2-utils.sl6.x86_64.repo,repository_file_3=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.davix.sl6.x86_64/0/7/5/repofiles/CERN.davix.sl6.x86_64.repo ++ echo repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.gfal2.gfal2.sl6.x86_64/2/16/3/repofiles/GFAL2.gfal2.sl6.x86_64.repo,repository_file_2=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.gfal2-utils.sl6.x86_64/1/5/3/repofiles/CERN.gfal2-utils.sl6.x86_64.repo,repository_file_3=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.davix.sl6.x86_64/0/7/5/repofiles/CERN.davix.sl6.x86_64.repo + repos=repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.gfal2.gfal2.sl6.x86_64/2/16/3/repofiles/GFAL2.gfal2.sl6.x86_64.repo,repository_file_2=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.gfal2-utils.sl6.x86_64/1/5/3/repofiles/CERN.gfal2-utils.sl6.x86_64.repo,repository_file_3=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.davix.sl6.x86_64/0/7/5/repofiles/CERN.davix.sl6.x86_64.repo + args=umd_release=4,log_path=logs,enable_untested_repo=true,enable_testing_repo=true + '[' repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.gfal2.gfal2.sl6.x86_64/2/16/3/repofiles/GFAL2.gfal2.sl6.x86_64.repo,repository_file_2=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.gfal2-utils.sl6.x86_64/1/5/3/repofiles/CERN.gfal2-utils.sl6.x86_64.repo,repository_file_3=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.davix.sl6.x86_64/0/7/5/repofiles/CERN.davix.sl6.x86_64.repo '!=' '' ']' + args=umd_release=4,log_path=logs,enable_untested_repo=true,enable_testing_repo=true,repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.gfal2.gfal2.sl6.x86_64/2/16/3/repofiles/GFAL2.gfal2.sl6.x86_64.repo,repository_file_2=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.gfal2-utils.sl6.x86_64/1/5/3/repofiles/CERN.gfal2-utils.sl6.x86_64.repo,repository_file_3=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.davix.sl6.x86_64/0/7/5/repofiles/CERN.davix.sl6.x86_64.repo + rvmsudo fab clients-solo:umd_release=4,log_path=logs,enable_untested_repo=true,enable_testing_repo=true,repository_file_1=http://admin-repo.egi.eu/sw/unverified/umd-4.gfal2.gfal2.sl6.x86_64/2/16/3/repofiles/GFAL2.gfal2.sl6.x86_64.repo,repository_file_2=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.gfal2-utils.sl6.x86_64/1/5/3/repofiles/CERN.gfal2-utils.sl6.x86_64.repo,repository_file_3=http://admin-repo.egi.eu/sw/unverified/umd-4.cern.davix.sl6.x86_64/0/7/5/repofiles/CERN.davix.sl6.x86_64.repo Warning: can not check `/etc/sudoers` for `secure_path`, falling back to call via `/usr/bin/env`, this breaks rules from `/etc/sudoers`. Run: export rvmsudo_secure_path=1 to avoid the warning, put it in shell initialization file to make it persistent. In case there is no `secure_path` in `/etc/sudoers`. Run: export rvmsudo_secure_path=0 to avoid the warning, put it in shell initialization file to make it persistent. [INFO] Using UMD 4 release repository [INFO] Using UMD verification repository file: ['http://admin-repo.egi.eu/sw/unverified/umd-4.gfal2.gfal2.sl6.x86_64/2/16/3/repofiles/GFAL2.gfal2.sl6.x86_64.repo', 'http://admin-repo.egi.eu/sw/unverified/umd-4.cern.davix.sl6.x86_64/0/7/5/repofiles/CERN.davix.sl6.x86_64.repo', 'http://admin-repo.egi.eu/sw/unverified/umd-4.cern.gfal2-utils.sl6.x86_64/1/5/3/repofiles/CERN.gfal2-utils.sl6.x86_64.repo'] UMD verification tool ===================== Quality criteria: http://egi-qc.github.io Codebase: https://github.com/egi-qc/umd-verification Path locations | | log_path /tmp/workspace/QualityCriteriaValidation/grid-clients/logs | yaim_path etc/yaim | puppet_path etc/puppet Production repositories | | umd_release_pkg http://repository.egi.eu/sw/production/umd/4/sl6/x86_64/updates/umd-release-4.0.0-1.el6.noarch.rpm | igtf_repo None [INFO] Using the following repository files + http://admin-repo.egi.eu/sw/unverified/umd-4.gfal2.gfal2.sl6.x86_64/2/16/3/repofiles/GFAL2.gfal2.sl6.x86_64.repo + http://admin-repo.egi.eu/sw/unverified/umd-4.cern.davix.sl6.x86_64/0/7/5/repofiles/CERN.davix.sl6.x86_64.repo + http://admin-repo.egi.eu/sw/unverified/umd-4.cern.gfal2-utils.sl6.x86_64/1/5/3/repofiles/CERN.gfal2-utils.sl6.x86_64.repo [INFO] Log directory '/tmp/workspace/QualityCriteriaValidation/grid-clients/logs' has been created. [INFO] Running configuration [localhost] local: sudo -E ansible --help [localhost] local: ansible-pull -vvv -C master -d /etc/ansible/roles/ansible-grid-clients -i /etc/ansible/roles/ansible-grid-clients/hosts -U https://github.com/egi-qc/ansible-grid-clients --extra-vars '@/tmp/umd.yaml' --tags 'all' [localhost] local: sudo -E rpm -qa [[QC_SEC_2: SHA-2 Certificates Support]] [NA] Product does not need certificates. [[QC_SEC_5: World Writable Files]] [localhost] local: sudo -E find / -not \( -path "/proc" -prune \) -not \( -path "/sys" -prune \) -type f -perm -002 -exec ls -l {} \; [OK] Found no world-writable file. [[QC_INFO_1: GlueSchema 1.3 Support]] [NA] Product does not publish information through BDII. [[QC_INFO_2: GlueSchema 2.0 Support]] [NA] Product does not publish information through BDII. [[QC_INFO_3: Middleware Version Information]] [NA] Product does not publish information through BDII. [[QC_MON_1: Service Probes]] [NA] Product cannot be tested by Nagios. [INFO] No QC-specific ID provided: no specific QC probes will be ran. + _BUILD_URL=https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/grid-clients/61 + archive_artifacts_in_workspace clients-solo ansible sl6 https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/grid-clients/61 http://admin-repo.egi.eu/sw/unverified/umd-4.gfal2.gfal2.sl6.x86_64/2/16/3/repofiles/GFAL2.gfal2.sl6.x86_64.repo http://admin-repo.egi.eu/sw/unverified/umd-4.cern.gfal2-utils.sl6.x86_64/1/5/3/repofiles/CERN.gfal2-utils.sl6.x86_64.repo http://admin-repo.egi.eu/sw/unverified/umd-4.cern.davix.sl6.x86_64/0/7/5/repofiles/CERN.davix.sl6.x86_64.repo + FAB_CMD=clients-solo + TOOL=ansible + '[' -d /tmp/workspace/QualityCriteriaValidation/grid-clients/_files ']' + mkdir /tmp/workspace/QualityCriteriaValidation/grid-clients/_files + '[' ansible == puppet ']' + '[' ansible == ansible ']' + mkdir /tmp/workspace/QualityCriteriaValidation/grid-clients/_files/vars + cp /tmp/umd.yaml /tmp/workspace/QualityCriteriaValidation/grid-clients/_files/vars/ + publish_howtos clients-solo sl6 https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/grid-clients/61 + FAB_CMD=clients-solo + OS=sl6 + BUILD_URL=https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/grid-clients/61 + git config --global user.name 'Pablo Orviz' + git config --global user.email orviz@ifca.unican.es + wget --no-check-certificate https://gist.githubusercontent.com/dadrian/bad309f16e407526741e/raw/462e7ef24387948e17e68a3975b057200fc05533/known_hosts -O /home/centos/.ssh/known_hosts --2019-10-03 11:34:19-- https://gist.githubusercontent.com/dadrian/bad309f16e407526741e/raw/462e7ef24387948e17e68a3975b057200fc05533/known_hosts Resolving gist.githubusercontent.com... 151.101.132.133 Connecting to gist.githubusercontent.com|151.101.132.133|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 416327 (407K) [text/plain] Saving to: “/home/centos/.ssh/known_hosts” 0K .......... .......... .......... .......... .......... 12% 847K 0s 50K .......... .......... .......... .......... .......... 24% 1.60M 0s 100K .......... .......... .......... .......... .......... 36% 1.65M 0s 150K .......... .......... .......... .......... .......... 49% 1.57M 0s 200K .......... .......... .......... .......... .......... 61% 46.1M 0s 250K .......... .......... .......... .......... .......... 73% 1.65M 0s 300K .......... .......... .......... .......... .......... 86% 51.2M 0s 350K .......... .......... .......... .......... .......... 98% 1.67M 0s 400K ...... 100% 12530G=0.2s 2019-10-03 11:34:19 (1.88 MB/s) - “/home/centos/.ssh/known_hosts” saved [416327/416327] + ssh -T git@github.com Warning: Permanently added the RSA host key for IP address '140.82.118.3' to the list of known hosts. Hi egi-qc/deployment-howtos! You've successfully authenticated, but GitHub does not provide shell access. + echo ++ pwd + workspace=/tmp/workspace/QualityCriteriaValidation/grid-clients + git clone https://github.com/egi-qc/deployment-howtos /tmp/deployment-howtos Initialized empty Git repository in /tmp/deployment-howtos/.git/ + cd /tmp/deployment-howtos + git remote set-url origin git@github.com:egi-qc/deployment-howtos.git + '[' -d clients-solo/sl6 ']' + cp -r /tmp/workspace/QualityCriteriaValidation/grid-clients/_files/vars clients-solo/sl6/ ++ grep -v '??' ++ git status --porcelain + '[' -n ' M clients-solo/sl6/vars/umd.yaml' ']' + git add clients-solo/sl6/ + git commit -a -m 'clients-solo/sl6/ deployment how-to (build https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/grid-clients/61)' [master 8f807e8] clients-solo/sl6/ deployment how-to (build https://jenkins.egi.ifca.es/job/QualityCriteriaValidation/grid-clients/61) 1 files changed, 10 insertions(+), 0 deletions(-) + git push origin master Warning: Permanently added the RSA host key for IP address '140.82.118.3' to the list of known hosts. remote: Resolving deltas: 0% (0/1) remote: Resolving deltas: 100% (1/1) remote: Resolving deltas: 100% (1/1), completed with 1 local object. To git@github.com:egi-qc/deployment-howtos.git 4f05c02..8f807e8 master -> master + cd /tmp/workspace/QualityCriteriaValidation/grid-clients $ ssh-agent -k unset SSH_AUTH_SOCK; unset SSH_AGENT_PID; echo Agent pid 1803 killed; [ssh-agent] Stopped. Archiving artifacts Finished: SUCCESS