See 
<http://vm-166.abc.idm.lab.eng.brq.redhat.com:8080/job/NIGHTLY/72/display/redirect>

------------------------------------------
[...truncated 4530 lines...]
suites/plugins/accpol_test.py::test_locact_inact PASSED
suites/plugins/accpol_test.py::test_locinact_modrdn PASSED
suites/plugins/accpol_test.py::test_locact_modrdn PASSED
suites/plugins/attr_uniqueness_test.py::test_attr_uniqueness_init PASSED
suites/plugins/attr_uniqueness_test.py::test_attr_uniqueness PASSED
suites/plugins/dna_test.py::test_basic PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_001 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_003 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_004 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_005 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_006 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_007 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_008 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_009 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_010 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_011 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_012 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_013 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_014 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_015 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_016 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_017 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_018 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_019 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_020 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_021 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_022 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_023 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_024 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_025 PASSED
suites/plugins/memberof_test.py::test_memberof_auto_add_oc PASSED
suites/plugins/rootdn_plugin_test.py::test_rootdn_init PASSED
suites/plugins/rootdn_plugin_test.py::test_rootdn_access_specific_time PASSED
suites/plugins/rootdn_plugin_test.py::test_rootdn_access_day_of_week PASSED
suites/plugins/rootdn_plugin_test.py::test_rootdn_access_denied_ip PASSED
suites/plugins/rootdn_plugin_test.py::test_rootdn_access_denied_host PASSED
suites/plugins/rootdn_plugin_test.py::test_rootdn_access_allowed_ip PASSED
suites/plugins/rootdn_plugin_test.py::test_rootdn_access_allowed_host PASSED
suites/plugins/rootdn_plugin_test.py::test_rootdn_config_validate PASSED
suites/psearch/psearch_test.py::test_psearch PASSED
suites/replication/acceptance_test.py::test_add_entry PASSED
suites/replication/acceptance_test.py::test_modify_entry PASSED
suites/replication/acceptance_test.py::test_delete_entry PASSED
suites/replication/acceptance_test.py::test_modrdn_entry[0] PASSED
suites/replication/acceptance_test.py::test_modrdn_entry[1] PASSED
suites/replication/acceptance_test.py::test_modrdn_after_pause PASSED
suites/replication/acceptance_test.py::test_modify_stripattrs PASSED
suites/replication/acceptance_test.py::test_new_suffix PASSED
suites/replication/acceptance_test.py::test_many_attrs PASSED
suites/replication/acceptance_test.py::test_double_delete PASSED
suites/replication/acceptance_test.py::test_password_repl_error PASSED
suites/replication/cleanallruv_test.py::test_clean PASSED
suites/replication/cleanallruv_test.py::test_clean_restart PASSED
suites/replication/cleanallruv_test.py::test_clean_force PASSED
suites/replication/cleanallruv_test.py::test_abort PASSED
suites/replication/cleanallruv_test.py::test_abort_restart PASSED
suites/replication/cleanallruv_test.py::test_abort_certify PASSED
suites/replication/cleanallruv_test.py::test_stress_clean PASSED
suites/replication/cleanallruv_test.py::test_multiple_tasks_with_force PASSED
suites/replication/single_master_test.py::test_mail_attr_repl PASSED
suites/replication/single_master_test.py::test_lastupdate_attr_before_init 
PASSED
suites/replication/tombstone_test.py::test_purge_success PASSED
suites/replication/wait_for_async_feature_test.py::test_not_int_value PASSED
suites/replication/wait_for_async_feature_test.py::test_multi_value PASSED
suites/replication/wait_for_async_feature_test.py::test_value_check[waitfor_async_attr0]
 PASSED
suites/replication/wait_for_async_feature_test.py::test_value_check[waitfor_async_attr1]
 PASSED
suites/replication/wait_for_async_feature_test.py::test_value_check[waitfor_async_attr2]
 PASSED
suites/replication/wait_for_async_feature_test.py::test_value_check[waitfor_async_attr3]
 PASSED
suites/replication/wait_for_async_feature_test.py::test_behavior_with_value[waitfor_async_attr0]
 PASSED
suites/replication/wait_for_async_feature_test.py::test_behavior_with_value[waitfor_async_attr1]
 PASSED
suites/replication/wait_for_async_feature_test.py::test_behavior_with_value[waitfor_async_attr2]
 PASSED
suites/replication/wait_for_async_feature_test.py::test_behavior_with_value[waitfor_async_attr3]
 PASSED
suites/schema/test_eduperson.py::test_account_locking PASSED
suites/schema/test_schema.py::test_schema_comparewithfiles PASSED
suites/setup_ds/setup_ds_test.py::test_slapd_InstScriptsEnabled[true] PASSED
suites/setup_ds/setup_ds_test.py::test_slapd_InstScriptsEnabled[false] PASSED

=================================== FAILURES ===================================
_______________________________ test_ticket49303 _______________________________

topo = <lib389.topologies.TopologyMain object at 0x7f9785591d10>

    def test_ticket49303(topo):
        """
        Test the nsTLSAllowClientRenegotiation setting.
        """
        sslport = SECUREPORT_STANDALONE1
    
        log.info("Ticket 49303 - Allow disabling of SSL renegotiation")
    
        # No value set, defaults to reneg allowed
>       enable_ssl(topo.standalone, sslport)

<http://vm-166.abc.idm.lab.eng.brq.redhat.com:8080/job/NIGHTLY/ws/source/389-ds-base/dirsrvtests/tests/tickets/ticket49303_test.py>:85:
 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
<http://vm-166.abc.idm.lab.eng.brq.redhat.com:8080/job/NIGHTLY/ws/source/389-ds-base/dirsrvtests/tests/tickets/ticket49303_test.py>:67:
 in enable_ssl
    server.restart()
<http://vm-166.abc.idm.lab.eng.brq.redhat.com:8080/job/NIGHTLY/ws/source/lib389/lib389/__init__.py>:1302:
 in restart
    self.start(timeout, post_open)
<http://vm-166.abc.idm.lab.eng.brq.redhat.com:8080/job/NIGHTLY/ws/source/lib389/lib389/__init__.py>:1179:
 in start
    "dirsrv@%s" % self.serverid])
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

popenargs = (['\''/usr/bin/systemctl'\'', '\''start'\'', 
'\''dirsrv@standalone1'\''],)
kwargs = {}, retcode = 1
cmd = ['\''/usr/bin/systemctl'\'', '\''start'\'', '\''dirsrv@standalone1'\'']

    def check_call(*popenargs, **kwargs):
        """Run command with arguments.  Wait for command to complete.  If
        the exit code was zero then return, otherwise raise
        CalledProcessError.  The CalledProcessError object will have the
        return code in the returncode attribute.
    
        The arguments are the same as for the Popen constructor.  Example:
    
        check_call(["ls", "-l"])
        """
        retcode = call(*popenargs, **kwargs)
        if retcode:
            cmd = kwargs.get("args")
            if cmd is None:
                cmd = popenargs[0]
>           raise CalledProcessError(retcode, cmd)
E           CalledProcessError: Command '\''['\''/usr/bin/systemctl'\'', 
'\''start'\'', '\''dirsrv@standalone1'\'']'\'' returned non-zero exit status 1

/usr/lib64/python2.7/subprocess.py:186: CalledProcessError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists
OK user dirsrv exists
---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters {'\''ldap-port'\'': 38901, 
'\''suffix'\'': '\''dc=example,dc=com'\'', '\''krb5_realm'\'': None, 
'\''deployed-dir'\'': '\''/usr'\'', '\''inst-backupdir'\'': '\''/tmp'\'', 
'\''hostname'\'': '\''localhost'\'', '\''server-id'\'': '\''standalone1'\'', 
'\''root-pw'\'': '\''password'\'', '\''root-dn'\'': '\''cn=Directory 
Manager'\'', '\''group-id'\'': None, '\''InstScriptsEnabled'\'': None, 
'\''user-id'\'': None, '\''ldap-secureport'\'': None} was created.
----------------------------- Captured stderr call -----------------------------
INFO:dirsrvtests.tests.tickets.ticket49303_test:Ticket 49303 - Allow disabling 
of SSL renegotiation


Generating key.  This may take a few moments...



Generating key.  This may take a few moments...

Job for dirsrv@standalone1.service failed because the control process exited 
with error code.
See "systemctl status dirsrv@standalone1.service" and "journalctl -xe" for 
details.
______________________________ test_glnact_pwexp _______________________________

topology_st = <lib389.topologies.TopologyMain object at 0x7f9785659310>
accpol_global = None

    def test_glnact_pwexp(topology_st, accpol_global):
        """Verify if user account is activated when password is reset after 
password is expired
    
        :ID:  3bb97992-101a-4e5a-b60a-4cc21adcc76e
        :feature: Account Policy Plugin
        :setup: Standalone instance, Global account policy plugin configuration,
                set accountInactivityLimit to few secs.
        :steps: 1. Add few users to ou=groups subtree in the default suffix
                2. Set passwordmaxage to few secs
                3. Wait for passwordmaxage to reach and check if password 
expired
                4. Run ldapsearch as normal user, expected error 19.
                5. Reset the password for user account
                6. Wait till accountInactivityLimit exceeded and check users
                7. Run ldapsearch as normal user, expected error 19.
                8. Replace the lastLoginTime attribute and check if account is 
activated
                9. Run ldapsearch as normal user, expected 0.
        :assert: Should return success once the user is activated
        """
    
        suffix = DEFAULT_SUFFIX
        subtree = "ou=groups"
        userid = "pwexpusr"
        nousrs = 1
        topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
        try:
            topology_st.standalone.config.set('\''passwordmaxage'\'', '\''9'\'')
        except ldap.LDAPError as e:
            log.error('\''Failed to change the value of passwordmaxage to 9'\'')
            raise e
        log.info('\''AccountInactivityLimit set to 12. Account will be 
inactivated if not accessed in 12 secs'\'')
        log.info('\''Passwordmaxage is set to 9. Password will expire in 9 
secs'\'')
        add_users(topology_st, suffix, subtree, userid, nousrs, 0)
    
        log.info('\''Sleep for 9 secs and check if password expired'\'')
        time.sleep(9)
        account_status(topology_st, suffix, subtree, userid, nousrs, 0, 
"Expired")
        time.sleep(4)  # Passed inactivity
        account_status(topology_st, suffix, subtree, userid, nousrs, 0, 
"Disabled")
    
        log.info('\''Add lastLoginTime to activate the user account'\'')
        add_time_attr(topology_st, suffix, subtree, userid, nousrs, 
'\''lastLoginTime'\'')
        account_status(topology_st, suffix, subtree, userid, nousrs, 0, 
"Expired")
        userpw_reset(topology_st, suffix, subtree, userid, nousrs, "DirMgr", 
PASSWORD, USER_PASW)
        account_status(topology_st, suffix, subtree, userid, nousrs, 0, 
"Enabled")
    
        # Allow password to expire again, but inactivity continues
        time.sleep(7)
        # reset password to counter expiration, we will test expiration again 
later
        userpw_reset(topology_st, suffix, subtree, userid, nousrs, "DirMgr", 
PASSWORD, USER_PASW)
        log.info('\''Sleep for 4 secs and check if account is now inactivated, 
expected error 19'\'')
        time.sleep(4)
        account_status(topology_st, suffix, subtree, userid, nousrs, 0, 
"Disabled")
    
        # Reset inactivity and check for expiration
        add_time_attr(topology_st, suffix, subtree, userid, nousrs, 
'\''lastLoginTime'\'')
>       account_status(topology_st, suffix, subtree, userid, nousrs, 0, 
> "Enabled")

<http://vm-166.abc.idm.lab.eng.brq.redhat.com:8080/job/NIGHTLY/ws/source/389-ds-base/dirsrvtests/tests/suites/plugins/accpol_test.py>:828:
 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

topology_st = <lib389.topologies.TopologyMain object at 0x7f9785659310>
suffix = '\''dc=example,dc=com'\'', subtree = '\''ou=groups'\'', userid = 
'\''pwexpusr'\''
nousrs = 1, ulimit = 0, tochck = '\''Enabled'\''

    def account_status(topology_st, suffix, subtree, userid, nousrs, ulimit, 
tochck):
        """Check account status for the given suffix, subtree, userid and 
nousrs"""
    
        while (nousrs > ulimit):
            usrrdn = '\''{}{}'\''.format(userid, nousrs)
            userdn = '\''uid={},{},{}'\''.format(usrrdn, subtree, suffix)
            if (tochck == "Enabled"):
                try:
                    topology_st.standalone.simple_bind_s(userdn, USER_PASW)
                except ldap.LDAPError as e:
                    log.error('\''User {} failed to login, expected 
0'\''.format(userdn))
>                   raise e
E                   INVALID_CREDENTIALS: {'\''info'\'': '\''password 
expired!'\'', '\''desc'\'': '\''Invalid credentials'\''}

<http://vm-166.abc.idm.lab.eng.brq.redhat.com:8080/job/NIGHTLY/ws/source/389-ds-base/dirsrvtests/tests/suites/plugins/accpol_test.py>:306:
 INVALID_CREDENTIALS
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:AccountInactivityLimit set to 12. Account will be inactivated 
if not accessed in 12 secs
INFO:lib389.utils:Passwordmaxage is set to 9. Password will expire in 9 secs
INFO:lib389.utils:add_users: Pass all of these as parameters suffix, subtree, 
userid and nousrs
INFO:lib389.utils:Sleep for 9 secs and check if password expired
INFO:lib389.utils:Add lastLoginTime to activate the user account
INFO:lib389.utils:Enable account by replacing 
lastLoginTime/createTimeStamp/ModifyTimeStamp attribute
INFO:lib389.utils:Reset user password for 
user-uid=pwexpusr1,ou=groups,dc=example,dc=com
INFO:lib389.utils:Reset user password for 
user-uid=pwexpusr1,ou=groups,dc=example,dc=com
INFO:lib389.utils:Sleep for 4 secs and check if account is now inactivated, 
expected error 19
INFO:lib389.utils:Enable account by replacing 
lastLoginTime/createTimeStamp/ModifyTimeStamp attribute
ERROR:lib389.utils:User uid=pwexpusr1,ou=groups,dc=example,dc=com failed to 
login, expected 0
============= 2 failed, 602 passed, 1 skipped in 13432.54 seconds 
=============='
+ '[' 1 -ne 0 ']'
+ echo CI Tests 'FAILED!'
CI Tests FAILED!
+ MSG=FAILED
+ RC=1
+ sudo /usr/sbin/sendmail mreyno...@redhat.com firsty...@redhat.com
+ sudo rm -rf /var/tmp/slapd.vg.110892 /var/tmp/slapd.vg.21881 
/var/tmp/slapd.vg.6824 /var/tmp/slapd.vg.6976
+ exit 1
Build step 'Execute shell' marked build as failure
_______________________________________________
389-devel mailing list -- 389-devel@lists.fedoraproject.org
To unsubscribe send an email to 389-devel-le...@lists.fedoraproject.org

Reply via email to