See 
<http://vm-058-081.abc.idm.lab.eng.brq.redhat.com:8080/job/389-DS-NIGHTLY/160/>

------------------------------------------
[...truncated 5535 lines...]
        # DEL '\''description'\'' by '\''5'\''
        mods = [(ldap.MOD_ADD, '\''description'\'', '\''5'\'')]
        topology_m2.ms["master2"].modify_s(dn, mods)
    
        # sleep of purge delay so that the next update will purge the CSN_7
        time.sleep(6)
    
        # ADD '\''description'\'' by '\''6'\'' that purge the state info
        mods = [(ldap.MOD_ADD, '\''description'\'', '\''6'\'')]
        topology_m2.ms["master2"].modify_s(dn, mods)
    
        # Restart master1
        # topology_m2.ms["master1"].start(30)
    
        if not topology_m2.ms["master2"].has_asan():
            results_file = valgrind_get_results_file(topology_m2.ms["master2"])
    
        # Stop master2
        topology_m2.ms["master2"].stop(30)
    
        # Check for leak
        if not topology_m2.ms["master2"].has_asan():
>           if valgrind_check_file(results_file, VALGRIND_LEAK_STR, 
> '\''csnset_dup'\''):

<http://vm-058-081.abc.idm.lab.eng.brq.redhat.com:8080/job/389-DS-NIGHTLY/ws/source/ds/dirsrvtests/tests/tickets/ticket48226_test.py>:107:
 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

results_file = '\''valgrind'\''
patterns = ('\'' blocks are definitely lost in loss record '\'', 
'\''csnset_dup'\'')
found = False, pattern_count = 2, matched_count = 0

    def valgrind_check_file(results_file, *patterns):
        '\'''\'''\''
        Check the valgrind results file for the all the patterns
        @param result_file - valgrind results file (must be read after server is
                             stopped)
        @param patterns - A plain text or regex pattern string args that should
                          be searched for
        @return True/False - Return true if one if the patterns match a stack
                             trace
        @raise IOError
        '\'''\'''\''
    
        # Verify results file
        if not results_file:
            assert False
    
        # Check the result file fo the leak text
        results_file = results_file.replace('\''\n'\'', '\'''\'')
        found = False
        pattern_count = len(patterns)
        matched_count = 0
    
>       vlog = open(results_file)
E       IOError: [Errno 2] No such file or directory: '\''valgrind'\''

<http://vm-058-081.abc.idm.lab.eng.brq.redhat.com:8080/job/389-DS-NIGHTLY/ws/source/lib389/lib389/utils.py>:354:
 IOError
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:Valgrind is already enabled.
_______________________________ test_ticket48272 _______________________________

topology_st = <lib389.topologies.TopologyMain object at 0x7f8115a16d50>

    def test_ticket48272(topology_st):
        """
        Test the functionality of the addn bind plugin. This should allow users
        of the type "name" or "n...@domain.com" to bind.
        """
    
        # There will be a better way to do this in the future.
        topology_st.standalone.add_s(Entry((
            "cn=addn,cn=plugins,cn=config", {
                "objectClass": "top nsSlapdPlugin extensibleObject".split(),
                "cn": "addn",
                "nsslapd-pluginPath": "libaddn-plugin",
                "nsslapd-pluginInitfunc": "addn_init",
                "nsslapd-pluginType": "preoperation",
                "nsslapd-pluginEnabled": "on",
                "nsslapd-pluginId": "addn",
                "nsslapd-pluginVendor": "389 Project",
                "nsslapd-pluginVersion": "1.3.6.0",
                "nsslapd-pluginDescription": "Allow AD DN style bind names to 
LDAP",
                "addn_default_domain": "example.com",
            }
        )))
    
        topology_st.standalone.add_s(Entry((
            "cn=example.com,cn=addn,cn=plugins,cn=config", {
                "objectClass": "top extensibleObject".split(),
                "cn": "example.com",
                "addn_base": "ou=People,%s" % DEFAULT_SUFFIX,
                "addn_filter": "(&(objectClass=account)(uid=%s))",
            }
        )))
    
        topology_st.standalone.restart(60)
    
        # Add a user
        _create_user(topology_st.standalone, USER1, USER1_DN)
    
        if DEBUGGING is not False:
            print("Attach now")
            time.sleep(20)
    
        # Make sure our binds still work.
        assert (_bind(USER1_DN, PW))
        # Test an anonymous bind
        for i in range(0, 10):
            # Test bind as name
>           assert (_bind(USER1, PW))
E           assert _bind('\''user1'\'', '\''password'\'')

<http://vm-058-081.abc.idm.lab.eng.brq.redhat.com:8080/job/389-DS-NIGHTLY/ws/source/ds/dirsrvtests/tests/tickets/ticket48272_test.py>:94:
 AssertionError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists
OK user dirsrv exists
_______________________ test_ticket48906_dblock_default ________________________

topology_st = <lib389.topologies.TopologyMain object at 0x7f8116b36310>

    def test_ticket48906_dblock_default(topology_st):
        
topology_st.standalone.log.info('\''###################################'\'')
        topology_st.standalone.log.info('\''###'\'')
        topology_st.standalone.log.info('\''### Check that before any change 
config/monitor'\'')
        topology_st.standalone.log.info('\''### contains the default value'\'')
        topology_st.standalone.log.info('\''###'\'')
        
topology_st.standalone.log.info('\''###################################'\'')
        _check_monitored_value(topology_st, DBLOCK_DEFAULT)
        _check_configured_value(topology_st, attr=DBLOCK_ATTR_CONFIG, 
expected_value=DBLOCK_DEFAULT, required=False)
>       _check_configured_value(topology_st, attr=DBCACHE_ATTR_CONFIG, 
> expected_value=DBCACHE_DEFAULT, required=False)

<http://vm-058-081.abc.idm.lab.eng.brq.redhat.com:8080/job/389-DS-NIGHTLY/ws/source/ds/dirsrvtests/tests/tickets/ticket48906_test.py>:154:
 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

topology_st = <lib389.topologies.TopologyMain object at 0x7f8116b36310>
attr = '\''nsslapd-dbcachesize'\'', expected_value = '\''33554432'\'', required 
= False

    def _check_configured_value(topology_st, attr=DBLOCK_ATTR_CONFIG, 
expected_value=None, required=False):
        entries = topology_st.standalone.search_s(ldbm_config, ldap.SCOPE_BASE, 
'\''cn=config'\'')
        if required:
            assert (entries[0].hasValue(attr))
        elif entries[0].hasValue(attr):
>           assert (entries[0].getValue(attr) == expected_value)
E           assert '\''267272192'\'' == '\''33554432'\''
E             - 267272192
E             + 33554432

<http://vm-058-081.abc.idm.lab.eng.brq.redhat.com:8080/job/389-DS-NIGHTLY/ws/source/ds/dirsrvtests/tests/tickets/ticket48906_test.py>:97:
 AssertionError
----------------------------- Captured stderr call -----------------------------
INFO:lib389:###################################
INFO:lib389:###
INFO:lib389:### Check that before any change config/monitor
INFO:lib389:### contains the default value
INFO:lib389:###
INFO:lib389:###################################
______________________________ test_range_search _______________________________

topology_st = <lib389.topologies.TopologyMain object at 0x7f8115a275d0>
setup = None

    def test_range_search(topology_st, setup):
        """Add a 100 entries, and run a range search.
        When we encounter an error we still need to
        disable valgrind before exiting
        """
    
        log.info('\''Running test_range_search...'\'')
    
        success = True
    
        # Add 100 test entries
        for idx in range(1, 100):
            idx = str(idx)
            USER_DN = '\''uid=user'\'' + idx + '\'','\'' + DEFAULT_SUFFIX
            try:
                topology_st.standalone.add_s(Entry((USER_DN, 
{'\''objectclass'\'': "top extensibleObject".split(),
                                                              '\''uid'\'': 
'\''user'\'' + idx})))
            except ldap.LDAPError as e:
                log.fatal('\''test_range_search: Failed to add test user '\'' + 
USER_DN + '\'': error '\'' + e.message['\''desc'\''])
                success = False
        time.sleep(1)
    
        # Issue range search
        if success:
            try:
                topology_st.standalone.search_s(RETROCL_SUFFIX, 
ldap.SCOPE_SUBTREE,
                                                
'\''(&(changenumber>=74)(changenumber<=84))'\'')
            except ldap.LDAPError as e:
                log.fatal('\''test_range_search: Failed to search retro 
changelog(%s), error: %s'\'' %
                          (RETROCL_SUFFIX, e.message('\''desc'\'')))
                success = False
    
        if success and not topology_st.standalone.has_asan():
            # Get the results file, stop the server, and check for the leak
            results_file = valgrind_get_results_file(topology_st.standalone)
            topology_st.standalone.stop(timeout=30)
>           if valgrind_check_file(results_file, VALGRIND_LEAK_STR, 
> '\''range_candidates'\''):

<http://vm-058-081.abc.idm.lab.eng.brq.redhat.com:8080/job/389-DS-NIGHTLY/ws/source/ds/dirsrvtests/tests/suites/memory_leaks/range_search_test.py>:88:
 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

results_file = '\''valgrind'\''
patterns = ('\'' blocks are definitely lost in loss record '\'', 
'\''range_candidates'\'')
found = False, pattern_count = 2, matched_count = 0

    def valgrind_check_file(results_file, *patterns):
        '\'''\'''\''
        Check the valgrind results file for the all the patterns
        @param result_file - valgrind results file (must be read after server is
                             stopped)
        @param patterns - A plain text or regex pattern string args that should
                          be searched for
        @return True/False - Return true if one if the patterns match a stack
                             trace
        @raise IOError
        '\'''\'''\''
    
        # Verify results file
        if not results_file:
            assert False
    
        # Check the result file fo the leak text
        results_file = results_file.replace('\''\n'\'', '\'''\'')
        found = False
        pattern_count = len(patterns)
        matched_count = 0
    
>       vlog = open(results_file)
E       IOError: [Errno 2] No such file or directory: '\''valgrind'\''

<http://vm-058-081.abc.idm.lab.eng.brq.redhat.com:8080/job/389-DS-NIGHTLY/ws/source/lib389/lib389/utils.py>:354:
 IOError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists
OK user dirsrv exists
---------------------------- Captured stderr setup -----------------------------
INFO:dirsrvtests.tests.suites.memory_leaks.range_search_test:Initializing 
test_range_search...
INFO:lib389.utils:Valgrind is already enabled.
----------------------------- Captured stderr call -----------------------------
INFO:dirsrvtests.tests.suites.memory_leaks.range_search_test:Running 
test_range_search...
=================== 5 failed, 488 passed in 7725.00 seconds 
===================='
+ '[' 1 -ne 0 ']'
+ echo CI Tests 'FAILED!'
CI Tests FAILED!
+ MSG=FAILED
+ RC=1
+ sudo /usr/sbin/sendmail mreyno...@redhat.com
+ sudo rm -rf '/var/tmp/slapd*'
+ exit 1
Build step 'Execute shell' marked build as failure
_______________________________________________
389-devel mailing list -- 389-devel@lists.fedoraproject.org
To unsubscribe send an email to 389-devel-le...@lists.fedoraproject.org

Reply via email to