The autobuild test system (on sn-devel-184) has detected an intermittent failing test in the current master tree.
The autobuild log of the failure is available here: https://git.samba.org/autobuild.flakey.sn-devel-184/2019-05-26-0940/flakey.log The failure seems to be in the "samba-ad-member" suite, whose build logs are available here: https://git.samba.org/autobuild.flakey.sn-devel-184/2019-05-26-0940/samba-ad-member.stderr https://git.samba.org/autobuild.flakey.sn-devel-184/2019-05-26-0940/samba-ad-member.stdout The top commit at the time of the failure was: commit da87fa998ab71328f30bcdf5b41aee8675aee48a Author: Volker Lendecke <[email protected]> Date: Thu May 23 11:11:11 2019 +0200 lib: Only compile resolvconftest if fmemopen exists Bug: https://bugzilla.samba.org/show_bug.cgi?id=13961 Signed-off-by: Volker Lendecke <[email protected]> Reviewed-by: Ralph Böhme <[email protected]> Autobuild-User(master): Jeremy Allison <[email protected]> Autobuild-Date(master): Sat May 25 00:05:25 UTC 2019 on sn-devel-184 and the last 50 lines of the stdout log were: [81(640)/87 at 7m7s] samba.wbinfo_sids2xids.(ad_member:local)(ad_member:local) [82(641)/87 at 7m19s] samba.tests.ntlm_auth(ad_member:local) [83(654)/87 at 7m23s] samba.nss.test using winbind(ad_member:local)(ad_member:local) [84(655)/87 at 7m24s] samba.tests.auth_log_winbind(ad_member:local) WARNING: The "server schannel" option is deprecated INFO: Received PING message from server 326258.29 [] {"timestamp": "2019-05-26T09:40:28.656184+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4624, "logonId": "e9b985d9f3744ed6", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": "ipv4:127.0.0.30:1026", "remoteAddress": "ipv4:127.0.0.29:39777", "serviceDescription": "SamLogon", "authDescription": "network", "clientDomain": "ADDOMAIN", "clientAccount": "Administrator", "workstation": "\\\\LOCALADMEMBER", "becameAccount": "Administrator", "becameDomain": "ADDOMAIN", "becameSid": "S-1-5-21-706706806-309805843-2592390462-500", "mappedAccount": "Administrator", "mappedDomain": "ADDOMAIN", "netlogonComputer": "LOCALADMEMBER", "netlogonTrustAccount": "LOCALADMEMBER$", "netlogonNegotiateFlags": "0x610FFFFF", "netlogonSecureChannelType": 2, "netlogonTrustAccountSid": "S-1-5-21-706706806-309805843-2592390462-1109", "passwordType": "NTLMv1", "duration": 9828}} INFO: Received PING message from server 329723.3265064261 [] {"timestamp": "2019-05-26T09:40:28.635412+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4625, "logonId": "d5c3f3e4ffe275d4", "logonType": 2, "status": "NT_STATUS_NO_SUCH_USER", "localAddress": "unix:", "remoteAddress": "unix:", "serviceDescription": "winbind", "authDescription": "PASSDB, wbinfo, 329682", "clientDomain": "", "clientAccount": "Administrator", "workstation": "LOCALADMEMBER", "becameAccount": null, "becameDomain": null, "becameSid": null, "mappedAccount": "Administrator", "mappedDomain": "", "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "NTLMv2", "duration": 184}} INFO: Received PING message from server 329723.3452246710 [] {"timestamp": "2019-05-26T09:40:28.643431+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4625, "logonId": "d5c3f3e4ffe275d4", "logonType": 8, "status": "NT_STATUS_INVALID_HANDLE", "localAddress": "unix:", "remoteAddress": "unix:", "serviceDescription": "winbind", "authDescription": "PAM_AUTH, wbinfo, 329682", "clientDomain": "", "clientAccount": "Administrator", "workstation": null, "becameAccount": "", "becameDomain": "", "becameSid": null, "mappedAccount": null, "mappedDomain": null, "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "Plaintext", "duration": 8316}} INFO: Received PING message from server 329715.3151529715 [] {"timestamp": "2019-05-26T09:40:28.657495+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4624, "logonId": "e9b985d9f3744ed6", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": "unix:", "remoteAddress": "unix:", "serviceDescription": "winbind", "authDescription": "NTLM_AUTH, wbinfo, 329682", "clientDomain": "ADDOMAIN", "clientAccount": "Administrator", "workstation": "LOCALADMEMBER", "becameAccount": "Administrator", "becameDomain": "ADDOMAIN", "becameSid": "S-1-5-21-706706806-309805843-2592390462-500", "mappedAccount": null, "mappedDomain": null, "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "NTLMv1", "duration": 12061}} INFO: Received PING message from server 326302 [] {"timestamp": "2019-05-26T09:40:29.002641+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4624, "logonId": "6f73d7926cd10edc", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": null, "remoteAddress": "ipv4:127.0.0.20:21449", "serviceDescription": "Kerberos KDC", "authDescription": "ENC-TS Pre-authentication", "clientDomain": null, "clientAccount": "[email protected]", "workstation": null, "becameAccount": "idmapridmember$", "becameDomain": "ADDOMAIN", "becameSid": "S-1-5-21-706706806-309805843-2592390462-1113", "mappedAccount": "idmapridmember$", "mappedDomain": "ADDOMAIN", "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "aes256-cts-hmac-sha1-96", "duration": 5230}} INFO: Received PING message from server 326302 [] {"timestamp": "2019-05-26T09:40:29.012539+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4624, "logonId": "9889c1ca3c0b4c95", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": null, "remoteAddress": "ipv4:127.0.0.20:21450", "serviceDescription": "Kerberos KDC", "authDescription": "ENC-TS Pre-authentication", "clientDomain": null, "clientAccount": "[email protected]", "workstation": null, "becameAccount": "idmapridmember$", "becameDomain": "ADDOMAIN", "becameSid": "S-1-5-21-706706806-309805843-2592390462-1113", "mappedAccount": "idmapridmember$", "mappedDomain": "ADDOMAIN", "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "aes256-cts-hmac-sha1-96", "duration": 4987}} INFO: Received PING message from server 411457.1 [] {"timestamp": "2019-05-26T09:40:29.206934+0000", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:127.0.0.30:445", "remoteAddress": "ipv4:127.0.0.20:21447", "serviceDescription": "SMB2", "authType": "krb5", "domain": "ADDOMAIN", "account": "idmapridmember$", "sid": "S-1-5-21-706706806-309805843-2592390462-1113", "sessionId": "2ea38df9-c0b1-488b-b287-2eef5a7e1bc7", "logonServer": "ADDC", "transportProtection": "SMB", "accountFlags": "0x00000280"}} INFO: Received PING message from server 326243.61 [] {"timestamp": "2019-05-26T09:40:29.235647+0000", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:127.0.0.30:135", "remoteAddress": "ipv4:127.0.0.20:21453", "serviceDescription": "DCE/RPC", "authType": "ncacn_ip_tcp", "domain": "NT AUTHORITY", "account": "ANONYMOUS LOGON", "sid": "S-1-5-7", "sessionId": "4739a641-5b05-45b4-b26e-82c1e9904f6a", "logonServer": "ADDC", "transportProtection": "NONE", "accountFlags": "0x00000010"}} INFO: Received PING message from server 326265.8 [] {"timestamp": "2019-05-26T09:40:29.253220+0000", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:127.0.0.30:1026", "remoteAddress": "ipv4:127.0.0.20:21454", "serviceDescription": "DCE/RPC", "authType": "schannel", "domain": "NT AUTHORITY", "account": "ANONYMOUS LOGON", "sid": "S-1-5-7", "sessionId": "b6fdbb17-aa04-4a68-b919-fe99c474cca9", "logonServer": "ADDC", "transportProtection": "SEAL", "accountFlags": "0x00000010"}} UNEXPECTED(failure): samba.tests.auth_log_winbind.samba.tests.auth_log_winbind.AuthLogTestsWinbind.test_wbinfo_ntlmv1(ad_member:local) REASON: Exception: Exception: Traceback (most recent call last): File "bin/python/samba/tests/auth_log_winbind.py", line 437, in test_wbinfo_ntlmv1 self.assertEquals("Authentication", msg["type"]) AssertionError: 'Authentication' != 'Authorization' - Authentication ? ^^^ ^ + Authorization ? ^^ ^ FAILED (1 failures, 0 errors and 0 unexpected successes in 0 testsuites) A summary with detailed information can be found in: ./bin/ab/summary TOP 10 slowest tests samba3.smb2.session krb5(ad_member_idmap_rid) -> 95 idmap.rfc2307(ad_member_rfc2307) -> 48 samba.wbinfo_sids2xids.(ad_member:local)(ad_member:local) -> 13 samba3.blackbox.smbclient_s3.SMB3.sign (ad_member) member creds(ad_member) -> 12 samba3.blackbox.smbclient_s3.NT1.sign (ad_member) member creds(ad_member) -> 11 samba3.blackbox.smbclient_s3.SMB3.plain (ad_member) member creds(ad_member) -> 11 samba3.blackbox.smbclient_s3.NT1.plain (ad_member) member creds(ad_member) -> 11 samba4.blackbox.trust_ntlm(ad_member:local) -> 6 samba4.blackbox.net_ads_dns(ad_member:local)(ad_member:local) -> 6 idmap.ad(ad_member_idmap_ad) -> 6 ERROR: test failed with exit code 1 Makefile:16: recipe for target 'test' failed
