The autobuild test system (on sn-devel-184) has detected an intermittent failing test in the current master tree.
The autobuild log of the failure is available here: https://git.samba.org/autobuild.flakey.sn-devel-184/2019-06-03-0951/flakey.log The failure seems to be in the "samba-ad-member" suite, whose build logs are available here: https://git.samba.org/autobuild.flakey.sn-devel-184/2019-06-03-0951/samba-ad-member.stderr https://git.samba.org/autobuild.flakey.sn-devel-184/2019-06-03-0951/samba-ad-member.stdout The top commit at the time of the failure was: commit eb2e29c354ceb7ffe3bcc786929006a6cf9b13ea Author: Anoop C S <[email protected]> Date: Wed May 29 11:40:55 2019 +0530 s3-smbcontrol: Replace && with || to declare variables in do_sleep() --enable-developer internally use --enable-selftest alongside. But when configured only with --enable-selftest the following code block becomes invalid: #if defined(DEVELOPER) && defined(ENABLE_SELFTEST) unsigned int seconds; long input; const long MAX_SLEEP = 60 * 60; /* One hour maximum sleep */ #endif making those variables undeclared for further use. Therefore replace && with || to have those variables declared with --enable-selftest configure option. Signed-off-by: Anoop C S <[email protected]> Reviewed-by: Ralph Boehme <[email protected]> Reviewed-by: Alexander Bokovoy <[email protected]> Autobuild-User(master): Ralph Böhme <[email protected]> Autobuild-Date(master): Fri May 31 20:38:09 UTC 2019 on sn-devel-184 and the last 50 lines of the stdout log were: [81(640)/87 at 6m58s] samba.wbinfo_sids2xids.(ad_member:local)(ad_member:local) [82(641)/87 at 7m11s] samba.tests.ntlm_auth(ad_member:local) [83(654)/87 at 7m14s] samba.nss.test using winbind(ad_member:local)(ad_member:local) [84(655)/87 at 7m15s] samba.tests.auth_log_winbind(ad_member:local) WARNING: The "server schannel" option is deprecated INFO: Received PING message from server 4098816 [] {"timestamp": "2019-06-03T09:50:48.281328+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4624, "logonId": "c37e9ea0d4e4e7a2", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": null, "remoteAddress": "ipv4:127.0.0.20:15480", "serviceDescription": "Kerberos KDC", "authDescription": "ENC-TS Pre-authentication", "clientDomain": null, "clientAccount": "[email protected]", "workstation": null, "becameAccount": "idmapridmember$", "becameDomain": "ADDOMAIN", "becameSid": "S-1-5-21-169290843-3341449363-3184552747-1113", "mappedAccount": "idmapridmember$", "mappedDomain": "ADDOMAIN", "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "aes256-cts-hmac-sha1-96", "duration": 5544}} INFO: Received PING message from server 4098816 [] {"timestamp": "2019-06-03T09:50:48.293536+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4624, "logonId": "57028a2ad247735f", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": null, "remoteAddress": "ipv4:127.0.0.20:15481", "serviceDescription": "Kerberos KDC", "authDescription": "ENC-TS Pre-authentication", "clientDomain": null, "clientAccount": "[email protected]", "workstation": null, "becameAccount": "idmapridmember$", "becameDomain": "ADDOMAIN", "becameSid": "S-1-5-21-169290843-3341449363-3184552747-1113", "mappedAccount": "idmapridmember$", "mappedDomain": "ADDOMAIN", "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "aes256-cts-hmac-sha1-96", "duration": 6500}} INFO: Received PING message from server 4098793.8 [] {"timestamp": "2019-06-03T09:50:48.304812+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4624, "logonId": "1c1d2b0cfd5e16e8", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": "ipv4:127.0.0.30:1026", "remoteAddress": "ipv4:127.0.0.29:11849", "serviceDescription": "SamLogon", "authDescription": "network", "clientDomain": "ADDOMAIN", "clientAccount": "Administrator", "workstation": "\\\\LOCALADMEMBER", "becameAccount": "Administrator", "becameDomain": "ADDOMAIN", "becameSid": "S-1-5-21-169290843-3341449363-3184552747-500", "mappedAccount": "Administrator", "mappedDomain": "ADDOMAIN", "netlogonComputer": "LOCALADMEMBER", "netlogonTrustAccount": "LOCALADMEMBER$", "netlogonNegotiateFlags": "0x610FFFFF", "netlogonSecureChannelType": 2, "netlogonTrustAccountSid": "S-1-5-21-169290843-3341449363-3184552747-1109", "passwordType": "NTLMv2", "duration": 9141}} INFO: Received PING message from server 4101810.819771152 [] {"timestamp": "2019-06-03T09:50:48.195027+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4625, "logonId": "d74aaa23ae09e858", "logonType": 2, "status": "NT_STATUS_NO_SUCH_USER", "localAddress": "unix:", "remoteAddress": "unix:", "serviceDescription": "winbind", "authDescription": "PASSDB, wbinfo, 4101764", "clientDomain": "", "clientAccount": "Administrator", "workstation": "LOCALADMEMBER", "becameAccount": null, "becameDomain": null, "becameSid": null, "mappedAccount": "Administrator", "mappedDomain": "", "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "NTLMv2", "duration": 241}} INFO: Received PING message from server 4101810.4219195744 [] {"timestamp": "2019-06-03T09:50:48.292314+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4625, "logonId": "d74aaa23ae09e858", "logonType": 8, "status": "NT_STATUS_INVALID_HANDLE", "localAddress": "unix:", "remoteAddress": "unix:", "serviceDescription": "winbind", "authDescription": "PAM_AUTH, wbinfo, 4101764", "clientDomain": "", "clientAccount": "Administrator", "workstation": null, "becameAccount": "", "becameDomain": "", "becameSid": null, "mappedAccount": null, "mappedDomain": null, "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "Plaintext", "duration": 97660}} INFO: Received PING message from server 4101787.537817403 [] {"timestamp": "2019-06-03T09:50:48.306255+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4624, "logonId": "1c1d2b0cfd5e16e8", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": "unix:", "remoteAddress": "unix:", "serviceDescription": "winbind", "authDescription": "NTLM_AUTH, wbinfo, 4101764", "clientDomain": "ADDOMAIN", "clientAccount": "Administrator", "workstation": "LOCALADMEMBER", "becameAccount": "Administrator", "becameDomain": "ADDOMAIN", "becameSid": "S-1-5-21-169290843-3341449363-3184552747-500", "mappedAccount": null, "mappedDomain": null, "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "NTLMv2", "duration": 11536}} INFO: Received PING message from server 5483.1 [] {"timestamp": "2019-06-03T09:50:48.617239+0000", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:127.0.0.30:445", "remoteAddress": "ipv4:127.0.0.20:15478", "serviceDescription": "SMB2", "authType": "krb5", "domain": "ADDOMAIN", "account": "idmapridmember$", "sid": "S-1-5-21-169290843-3341449363-3184552747-1113", "sessionId": "3b4a57c1-45f2-4258-8ce1-344b290dcf81", "logonServer": "ADDC", "transportProtection": "SMB", "accountFlags": "0x00000280"}} INFO: Received PING message from server 4098774.61 [] {"timestamp": "2019-06-03T09:50:48.653506+0000", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:127.0.0.30:135", "remoteAddress": "ipv4:127.0.0.20:15484", "serviceDescription": "DCE/RPC", "authType": "ncacn_ip_tcp", "domain": "NT AUTHORITY", "account": "ANONYMOUS LOGON", "sid": "S-1-5-7", "sessionId": "fe6341bd-bf3d-4ecb-84cc-51f7912c4fce", "logonServer": "ADDC", "transportProtection": "NONE", "accountFlags": "0x00000010"}} INFO: Received PING message from server 4098784.34 [] {"timestamp": "2019-06-03T09:50:48.660079+0000", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:127.0.0.30:1026", "remoteAddress": "ipv4:127.0.0.20:15485", "serviceDescription": "DCE/RPC", "authType": "schannel", "domain": "NT AUTHORITY", "account": "ANONYMOUS LOGON", "sid": "S-1-5-7", "sessionId": "ff1f4271-600c-40b0-8bf2-3184b2fd99f1", "logonServer": "ADDC", "transportProtection": "SEAL", "accountFlags": "0x00000010"}} UNEXPECTED(failure): samba.tests.auth_log_winbind.samba.tests.auth_log_winbind.AuthLogTestsWinbind.test_wbinfo(ad_member:local) REASON: Exception: Exception: Traceback (most recent call last): File "bin/python/samba/tests/auth_log_winbind.py", line 327, in test_wbinfo self.assertEquals("Authentication", msg["type"]) AssertionError: 'Authentication' != 'Authorization' - Authentication ? ^^^ ^ + Authorization ? ^^ ^ FAILED (1 failures, 0 errors and 0 unexpected successes in 0 testsuites) A summary with detailed information can be found in: ./bin/ab/summary TOP 10 slowest tests samba3.smb2.session krb5(ad_member_idmap_rid) -> 95 idmap.rfc2307(ad_member_rfc2307) -> 47 samba.wbinfo_sids2xids.(ad_member:local)(ad_member:local) -> 13 samba3.blackbox.smbclient_s3.SMB3.sign (ad_member) member creds(ad_member) -> 12 samba3.blackbox.smbclient_s3.NT1.sign (ad_member) member creds(ad_member) -> 11 samba3.blackbox.smbclient_s3.SMB3.plain (ad_member) member creds(ad_member) -> 11 samba3.blackbox.smbclient_s3.NT1.plain (ad_member) member creds(ad_member) -> 11 samba4.blackbox.trust_ntlm(ad_member:local) -> 7 idmap.ad(ad_member_idmap_ad) -> 6 samba4.blackbox.net_ads_dns(ad_member:local)(ad_member:local) -> 6 ERROR: test failed with exit code 1 Makefile:16: recipe for target 'test' failed
