Jira: https://issues.apache.org/jira/browse/OOZIE-3405
Build: https://builds.apache.org/job/PreCommit-OOZIE-Build/1217/

###################################################################################
########################## LAST 100 LINES OF THE CONSOLE 
###########################
[...truncated 2.16 MB...]
[TRACE] Modernizer errors after patch: 69


Testing JIRA OOZIE-3405

Cleaning local git workspace

----------------------------

+1 PATCH_APPLIES
+1 CLEAN
+1 RAW_PATCH_ANALYSIS
    +1 the patch does not introduce any @author tags
    +1 the patch does not introduce any tabs
    +1 the patch does not introduce any trailing spaces
    +1 the patch does not introduce any star imports
    +1 the patch does not introduce any line longer than 132
    +1 the patch adds/modifies 1 testcase(s)
+1 RAT
    +1 the patch does not seem to introduce new RAT warnings
+1 JAVADOC
    +1 Javadoc generation succeeded with the patch
    +1 the patch does not seem to introduce new Javadoc warning(s)
+1 COMPILE
    +1 HEAD compiles
    +1 patch compiles
    +1 the patch does not seem to introduce new javac warnings
-1 There are [23] new bugs found below threshold in total that must be fixed.
    +1 There are no new bugs found in [fluent-job/fluent-job-api].
    +1 There are no new bugs found in [docs].
    -1 There are [7] new bugs found below threshold in [core] that must be 
fixed, listing only the first [5] ones.
    You can find the SpotBugs diff here (look for the red and orange ones): 
core/findbugs-new.html
    The top [5] most important SpotBugs errors are:
    At SshActionExecutor.java:[line 180]: This usage of 
java/lang/Runtime.exec([Ljava/lang/String;)Ljava/lang/Process; can be 
vulnerable to Command Injection
    At SshActionExecutor.java:[line 145]: At SshActionExecutor.java:[line 144]
    At SshActionExecutor.java:[line 180]: At SshActionExecutor.java:[line 148]
    At SshActionExecutor.java:[line 200]: At SshActionExecutor.java:[line 199]
    This use of 
javax/persistence/EntityManager.createQuery(Ljava/lang/String;)Ljavax/persistence/Query;
 can be vulnerable to SQL/JPQL injection: At SshActionExecutor.java:[line 204]
    +1 There are no new bugs found in [sharelib/spark].
    +1 There are no new bugs found in [sharelib/git].
    +1 There are no new bugs found in [sharelib/sqoop].
    +1 There are no new bugs found in [sharelib/hive2].
    +1 There are no new bugs found in [sharelib/streaming].
    +1 There are no new bugs found in [sharelib/pig].
    -1 There are [1] new bugs found below threshold in [sharelib/oozie] that 
must be fixed.
    You can find the SpotBugs diff here (look for the red and orange ones): 
sharelib/oozie/findbugs-new.html
    The most important SpotBugs errors are:
    At ShellMain.java:[line 93]: This usage of 
java/lang/ProcessBuilder.<init>(Ljava/util/List;)V can be vulnerable to 
Command Injection
    At ShellMain.java:[line 91]: At ShellMain.java:[line 90]
    At ShellMain.java:[line 92]
    +1 There are no new bugs found in [sharelib/hive].
    +1 There are no new bugs found in [sharelib/hcatalog].
    +1 There are no new bugs found in [sharelib/distcp].
    -1 There are [15] new bugs found below threshold in [tools] that must be 
fixed, listing only the first [5] ones.
    You can find the SpotBugs diff here (look for the red and orange ones): 
tools/findbugs-new.html
    The top [5] most important SpotBugs errors are:
    At OozieDBCLI.java:[line 584]: This use of 
java/sql/Statement.executeUpdate(Ljava/lang/String;)I can be vulnerable to SQL 
injection
    At OozieDBCLI.java:[line 574]: At OozieDBCLI.java:[line 573]
    At OozieDBCLI.java:[line 577]: At OozieDBCLI.java:[line 575]
    At OozieDBCLI.java:[line 579]: At OozieDBCLI.java:[line 578]
    At OozieDBCLI.java:[line 584]: At OozieDBCLI.java:[line 581]
    +1 There are no new bugs found in [server].
    +1 There are no new bugs found in [client].
    +1 There are no new bugs found in [examples].
    +1 There are no new bugs found in [webapp].
+1 BACKWARDS_COMPATIBILITY
    +1 the patch does not change any JPA Entity/Colum/Basic/Lob/Transient 
annotations
    +1 the patch does not modify JPA files
+1 TESTS
    Tests run: 3175
    Tests failed at first run:
TestCallableQueueService#testQueueSizeAfterNormalSubmission
    For the complete list of flaky tests, see TEST-SUMMARY-FULL files.
+1 DISTRO
    +1 distro tarball builds with the patch 
+1 MODERNIZER

----------------------------
-1 Overall result, please check the reported -1(s)


The full output of the test-patch run is available at

 https://builds.apache.org/job/PreCommit-OOZIE-Build/1217/

Adding comment to JIRA
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0  
0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     
0{"self":"https://issues.apache.org/jira/rest/api/2/issue/13205154/comment/16925518","id":"16925518","author":{"self":"https://issues.apache.org/jira/rest/api/2/user?username=hadoopqa","name":"hadoopqa","key":"hadoopqa","avatarUrls":{"48x48":"https://issues.apache.org/jira/secure/useravatar?ownerId=hadoopqa&avatarId=10393","24x24":"https://issues.apache.org/jira/secure/useravatar?size=small&ownerId=hadoopqa&avatarId=10393","16x16":"https://issues.apache.org/jira/secure/useravatar?size=xsmall&ownerId=hadoopqa&avatarId=10393","32x32":"https://issues.apache.org/jira/secure/useravatar?size=medium&ownerId=hadoopqa&avatarId=10393"},"displayName":"Hadoop
 QA","active":true,"timeZone":"Etc/UTC"},"body":"\nTesting JIRA 
OOZIE-3405\n\nCleaning local git 
workspace\n\n----------------------------\n\n{color:green}+1 
PATCH_APPLIES{color}\n{color:green}+1 CLEAN{color}\n{color:green}+1 
RAW_PATCH_ANALYSIS{color}\n.    {color:green}+1{color} the patch does not 
introduce any @author tags\n.    {color:green}+1{color} the patch does not 
introduce any tabs\n.    {color:green}+1{color} the patch does not introduce 
any trailing spaces\n.    {color:green}+1{color} the patch does not introduce 
any star imports\n.    {color:green}+1{color} the patch does not introduce any 
line longer than 132\n.    {color:green}+1{color} the patch adds/modifies 1 
testcase(s)\n{color:green}+1 RAT{color}\n.    {color:green}+1{color} the patch 
does not seem to introduce new RAT warnings\n{color:green}+1 JAVADOC{color}\n.  
  {color:green}+1{color} Javadoc generation succeeded with the patch\n.    
{color:green}+1{color} the patch does not seem to introduce new Javadoc 
warning(s)\n{color:green}+1 COMPILE{color}\n.    {color:green}+1{color} HEAD 
compiles\n.    {color:green}+1{color} patch compiles\n.    
{color:green}+1{color} the patch does not seem to introduce new javac 
warnings\n{color:red}-1{color} There are [23] new bugs found below threshold in 
total that must be fixed.\n.    {color:green}+1{color} There are no new bugs 
found in [fluent-job/fluent-job-api].\n.    {color:green}+1{color} There are no 
new bugs found in [docs].\n.    {color:red}-1{color} There are [7] new bugs 
found below threshold in [core] that must be fixed, listing only the first [5] 
ones.\n.    You can find the SpotBugs diff here (look for the red and orange 
ones): core/findbugs-new.html\n.    The top [5] most important SpotBugs errors 
are:\n.    At SshActionExecutor.java:[line 180]: This usage of 
java/lang/Runtime.exec([Ljava/lang/String;)Ljava/lang/Process; can be 
vulnerable to Command Injection\n.    At SshActionExecutor.java:[line 145]: At 
SshActionExecutor.java:[line 144]\n.    At SshActionExecutor.java:[line 180]: 
At SshActionExecutor.java:[line 148]\n.    At SshActionExecutor.java:[line 
200]: At SshActionExecutor.java:[line 199]\n.    This use of 
javax/persistence/EntityManager.createQuery(Ljava/lang/String;)Ljavax/persistence/Query;
 can be vulnerable to SQL/JPQL injection: At SshActionExecutor.java:[line 
204]\n.    {color:green}+1{color} There are no new bugs found in 
[sharelib/spark].\n.    {color:green}+1{color} There are no new bugs found in 
[sharelib/git].\n.    {color:green}+1{color} There are no new bugs found in 
[sharelib/sqoop].\n.    {color:green}+1{color} There are no new bugs found in 
[sharelib/hive2].\n.    {color:green}+1{color} There are no new bugs found in 
[sharelib/streaming].\n.    {color:green}+1{color} There are no new bugs found 
in [sharelib/pig].\n.    {color:red}-1{color} There are [1] new bugs found 
below threshold in [sharelib/oozie] that must be fixed.\n.    You can find the 
SpotBugs diff here (look for the red and orange ones): 
sharelib/oozie/findbugs-new.html\n.    The most important SpotBugs errors 
are:\n.    At ShellMain.java:[line 93]: This usage of 
java/lang/ProcessBuilder.<init>(Ljava/util/List;)V can be vulnerable to 
Command Injection\n.    At ShellMain.java:[line 91]: At ShellMain.java:[line 
90]\n.    At ShellMain.java:[line 92]\n.    {color:green}+1{color} There are no 
new bugs found in [sharelib/hive].\n.    {color:green}+1{color} There are no 
new bu100 12018    0  6697  100  5321   5498   4368  0:00:01  0:00:01 --:--:--  
9866
gs found in [sharelib/hcatalog].\n.    {color:green}+1{color} There are no new 
bugs found in [sharelib/distcp].\n.    {color:red}-1{color} There are [15] new 
bugs found below threshold in [tools] that must be fixed, listing only the 
first [5] ones.\n.    You can find the SpotBugs diff here (look for the red and 
orange ones): tools/findbugs-new.html\n.    The top [5] most important SpotBugs 
errors are:\n.    At OozieDBCLI.java:[line 584]: This use of 
java/sql/Statement.executeUpdate(Ljava/lang/String;)I can be vulnerable to SQL 
injection\n.    At OozieDBCLI.java:[line 574]: At OozieDBCLI.java:[line 573]\n. 
   At OozieDBCLI.java:[line 577]: At OozieDBCLI.java:[line 575]\n.    At 
OozieDBCLI.java:[line 579]: At OozieDBCLI.java:[line 578]\n.    At 
OozieDBCLI.java:[line 584]: At OozieDBCLI.java:[line 581]\n.    
{color:green}+1{color} There are no new bugs found in [server].\n.    
{color:green}+1{color} There are no new bugs found in [client].\n.    
{color:green}+1{color} There are no new bugs found in [examples].\n.    
{color:green}+1{color} There are no new bugs found in 
[webapp].\n{color:green}+1 BACKWARDS_COMPATIBILITY{color}\n.    
{color:green}+1{color} the patch does not change any JPA 
Entity/Colum/Basic/Lob/Transient annotations\n.    {color:green}+1{color} the 
patch does not modify JPA files\n{color:green}+1 TESTS{color}\n.    Tests run: 
3175\n.    {color:orange}Tests failed at first 
run:{color}\nTestCallableQueueService#testQueueSizeAfterNormalSubmission\n.    
For the complete list of flaky tests, see TEST-SUMMARY-FULL 
files.\n{color:green}+1 DISTRO{color}\n.    {color:green}+1{color} distro 
tarball builds with the patch \n{color:green}+1 
MODERNIZER{color}\n\n----------------------------\n{color:red}*-1 Overall 
result, please check the reported -1(s)*{color}\n\n\nThe full output of the 
test-patch run is available at\n\n. 
https://builds.apache.org/job/PreCommit-OOZIE-Build/1217/\n\n","updateAuthor":{"self":"https://issues.apache.org/jira/rest/api/2/user?username=hadoopqa","name":"hadoopqa","key":"hadoopqa","avatarUrls":{"48x48":"https://issues.apache.org/jira/secure/useravatar?ownerId=hadoopqa&avatarId=10393","24x24":"https://issues.apache.org/jira/secure/useravatar?size=small&ownerId=hadoopqa&avatarId=10393","16x16":"https://issues.apache.org/jira/secure/useravatar?size=xsmall&ownerId=hadoopqa&avatarId=10393","32x32":"https://issues.apache.org/jira/secure/useravatar?size=medium&ownerId=hadoopqa&avatarId=10393"},"displayName":"Hadoop
 
QA","active":true,"timeZone":"Etc/UTC"},"created":"2019-09-09T09:31:27.411+0000","updated":"2019-09-09T09:31:27.411+0000"}
test-patch exit code: 1

Build step 'Execute shell' marked build as failure
[description-setter] Description set: OOZIE-3405
Archiving artifacts
Recording test results
ERROR: Step ?Publish JUnit test result report? failed: No test report files 
were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any



###################################################################################
############################## FAILED TESTS (if any) 
##############################
No tests ran.

Reply via email to