See
<
http://vm-166.abc.idm.lab.eng.brq.redhat.com:8080/job/NIGHTLY/72/display/...
------------------------------------------
[...truncated 4530 lines...]
suites/plugins/accpol_test.py::test_locact_inact PASSED
suites/plugins/accpol_test.py::test_locinact_modrdn PASSED
suites/plugins/accpol_test.py::test_locact_modrdn PASSED
suites/plugins/attr_uniqueness_test.py::test_attr_uniqueness_init PASSED
suites/plugins/attr_uniqueness_test.py::test_attr_uniqueness PASSED
suites/plugins/dna_test.py::test_basic PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_001 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_003 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_004 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_005 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_006 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_007 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_008 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_009 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_010 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_011 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_012 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_013 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_014 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_015 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_016 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_017 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_018 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_019 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_020 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_021 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_022 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_023 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_024 PASSED
suites/plugins/memberof_test.py::test_memberof_MultiGrpAttr_025 PASSED
suites/plugins/memberof_test.py::test_memberof_auto_add_oc PASSED
suites/plugins/rootdn_plugin_test.py::test_rootdn_init PASSED
suites/plugins/rootdn_plugin_test.py::test_rootdn_access_specific_time PASSED
suites/plugins/rootdn_plugin_test.py::test_rootdn_access_day_of_week PASSED
suites/plugins/rootdn_plugin_test.py::test_rootdn_access_denied_ip PASSED
suites/plugins/rootdn_plugin_test.py::test_rootdn_access_denied_host PASSED
suites/plugins/rootdn_plugin_test.py::test_rootdn_access_allowed_ip PASSED
suites/plugins/rootdn_plugin_test.py::test_rootdn_access_allowed_host PASSED
suites/plugins/rootdn_plugin_test.py::test_rootdn_config_validate PASSED
suites/psearch/psearch_test.py::test_psearch PASSED
suites/replication/acceptance_test.py::test_add_entry PASSED
suites/replication/acceptance_test.py::test_modify_entry PASSED
suites/replication/acceptance_test.py::test_delete_entry PASSED
suites/replication/acceptance_test.py::test_modrdn_entry[0] PASSED
suites/replication/acceptance_test.py::test_modrdn_entry[1] PASSED
suites/replication/acceptance_test.py::test_modrdn_after_pause PASSED
suites/replication/acceptance_test.py::test_modify_stripattrs PASSED
suites/replication/acceptance_test.py::test_new_suffix PASSED
suites/replication/acceptance_test.py::test_many_attrs PASSED
suites/replication/acceptance_test.py::test_double_delete PASSED
suites/replication/acceptance_test.py::test_password_repl_error PASSED
suites/replication/cleanallruv_test.py::test_clean PASSED
suites/replication/cleanallruv_test.py::test_clean_restart PASSED
suites/replication/cleanallruv_test.py::test_clean_force PASSED
suites/replication/cleanallruv_test.py::test_abort PASSED
suites/replication/cleanallruv_test.py::test_abort_restart PASSED
suites/replication/cleanallruv_test.py::test_abort_certify PASSED
suites/replication/cleanallruv_test.py::test_stress_clean PASSED
suites/replication/cleanallruv_test.py::test_multiple_tasks_with_force PASSED
suites/replication/single_master_test.py::test_mail_attr_repl PASSED
suites/replication/single_master_test.py::test_lastupdate_attr_before_init PASSED
suites/replication/tombstone_test.py::test_purge_success PASSED
suites/replication/wait_for_async_feature_test.py::test_not_int_value PASSED
suites/replication/wait_for_async_feature_test.py::test_multi_value PASSED
suites/replication/wait_for_async_feature_test.py::test_value_check[waitfor_async_attr0]
PASSED
suites/replication/wait_for_async_feature_test.py::test_value_check[waitfor_async_attr1]
PASSED
suites/replication/wait_for_async_feature_test.py::test_value_check[waitfor_async_attr2]
PASSED
suites/replication/wait_for_async_feature_test.py::test_value_check[waitfor_async_attr3]
PASSED
suites/replication/wait_for_async_feature_test.py::test_behavior_with_value[waitfor_async_attr0]
PASSED
suites/replication/wait_for_async_feature_test.py::test_behavior_with_value[waitfor_async_attr1]
PASSED
suites/replication/wait_for_async_feature_test.py::test_behavior_with_value[waitfor_async_attr2]
PASSED
suites/replication/wait_for_async_feature_test.py::test_behavior_with_value[waitfor_async_attr3]
PASSED
suites/schema/test_eduperson.py::test_account_locking PASSED
suites/schema/test_schema.py::test_schema_comparewithfiles PASSED
suites/setup_ds/setup_ds_test.py::test_slapd_InstScriptsEnabled[true] PASSED
suites/setup_ds/setup_ds_test.py::test_slapd_InstScriptsEnabled[false] PASSED
=================================== FAILURES ===================================
_______________________________ test_ticket49303 _______________________________
topo = <lib389.topologies.TopologyMain object at 0x7f9785591d10>
def test_ticket49303(topo):
"""
Test the nsTLSAllowClientRenegotiation setting.
"""
sslport = SECUREPORT_STANDALONE1
log.info("Ticket 49303 - Allow disabling of SSL renegotiation")
# No value set, defaults to reneg allowed
enable_ssl(topo.standalone, sslport)
<
http://vm-166.abc.idm.lab.eng.brq.redhat.com:8080/job/NIGHTLY/ws/source/3...:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
<
http://vm-166.abc.idm.lab.eng.brq.redhat.com:8080/job/NIGHTLY/ws/source/3...:
in enable_ssl
server.restart()
<
http://vm-166.abc.idm.lab.eng.brq.redhat.com:8080/job/NIGHTLY/ws/source/l...:
in restart
self.start(timeout, post_open)
<
http://vm-166.abc.idm.lab.eng.brq.redhat.com:8080/job/NIGHTLY/ws/source/l...:
in start
"dirsrv@%s" % self.serverid])
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
popenargs = (['\''/usr/bin/systemctl'\'',
'\''start'\'',
'\''dirsrv@standalone1'\''],)
kwargs = {}, retcode = 1
cmd = ['\''/usr/bin/systemctl'\'',
'\''start'\'',
'\''dirsrv@standalone1'\'']
def check_call(*popenargs, **kwargs):
"""Run command with arguments. Wait for command to complete. If
the exit code was zero then return, otherwise raise
CalledProcessError. The CalledProcessError object will have the
return code in the returncode attribute.
The arguments are the same as for the Popen constructor. Example:
check_call(["ls", "-l"])
"""
retcode = call(*popenargs, **kwargs)
if retcode:
cmd = kwargs.get("args")
if cmd is None:
cmd = popenargs[0]
raise CalledProcessError(retcode, cmd)
E
CalledProcessError: Command
'\''['\''/usr/bin/systemctl'\'',
'\''start'\'',
'\''dirsrv@standalone1'\'']'\'' returned non-zero exit
status 1
/usr/lib64/python2.7/subprocess.py:186: CalledProcessError
---------------------------- Captured stdout setup -----------------------------
OK group dirsrv exists
OK user dirsrv exists
---------------------------- Captured stderr setup -----------------------------
INFO:lib389.topologies:Instance with parameters
{'\''ldap-port'\'': 38901, '\''suffix'\'':
'\''dc=example,dc=com'\'',
'\''krb5_realm'\'': None,
'\''deployed-dir'\'': '\''/usr'\'',
'\''inst-backupdir'\'': '\''/tmp'\'',
'\''hostname'\'': '\''localhost'\'',
'\''server-id'\'': '\''standalone1'\'',
'\''root-pw'\'': '\''password'\'',
'\''root-dn'\'': '\''cn=Directory
Manager'\'', '\''group-id'\'': None,
'\''InstScriptsEnabled'\'': None,
'\''user-id'\'': None,
'\''ldap-secureport'\'': None} was created.
----------------------------- Captured stderr call -----------------------------
INFO:dirsrvtests.tests.tickets.ticket49303_test:Ticket 49303 - Allow disabling of SSL
renegotiation
Generating key. This may take a few moments...
Generating key. This may take a few moments...
Job for dirsrv(a)standalone1.service failed because the control process exited with error
code.
See "systemctl status dirsrv(a)standalone1.service" and "journalctl -xe"
for details.
______________________________ test_glnact_pwexp _______________________________
topology_st = <lib389.topologies.TopologyMain object at 0x7f9785659310>
accpol_global = None
def test_glnact_pwexp(topology_st, accpol_global):
"""Verify if user account is activated when password is reset after
password is expired
:ID: 3bb97992-101a-4e5a-b60a-4cc21adcc76e
:feature: Account Policy Plugin
:setup: Standalone instance, Global account policy plugin configuration,
set accountInactivityLimit to few secs.
:steps: 1. Add few users to ou=groups subtree in the default suffix
2. Set passwordmaxage to few secs
3. Wait for passwordmaxage to reach and check if password expired
4. Run ldapsearch as normal user, expected error 19.
5. Reset the password for user account
6. Wait till accountInactivityLimit exceeded and check users
7. Run ldapsearch as normal user, expected error 19.
8. Replace the lastLoginTime attribute and check if account is activated
9. Run ldapsearch as normal user, expected 0.
:assert: Should return success once the user is activated
"""
suffix = DEFAULT_SUFFIX
subtree = "ou=groups"
userid = "pwexpusr"
nousrs = 1
topology_st.standalone.simple_bind_s(DN_DM, PASSWORD)
try:
topology_st.standalone.config.set('\''passwordmaxage'\'',
'\''9'\'')
except ldap.LDAPError as e:
log.error('\''Failed to change the value of passwordmaxage to
9'\'')
raise e
log.info('\''AccountInactivityLimit set to 12. Account will be
inactivated if not accessed in 12 secs'\'')
log.info('\''Passwordmaxage is set to 9. Password will expire in 9
secs'\'')
add_users(topology_st, suffix, subtree, userid, nousrs, 0)
log.info('\''Sleep for 9 secs and check if password
expired'\'')
time.sleep(9)
account_status(topology_st, suffix, subtree, userid, nousrs, 0,
"Expired")
time.sleep(4) # Passed inactivity
account_status(topology_st, suffix, subtree, userid, nousrs, 0,
"Disabled")
log.info('\''Add lastLoginTime to activate the user
account'\'')
add_time_attr(topology_st, suffix, subtree, userid, nousrs,
'\''lastLoginTime'\'')
account_status(topology_st, suffix, subtree, userid, nousrs, 0,
"Expired")
userpw_reset(topology_st, suffix, subtree, userid, nousrs, "DirMgr",
PASSWORD, USER_PASW)
account_status(topology_st, suffix, subtree, userid, nousrs, 0,
"Enabled")
# Allow password to expire again, but inactivity continues
time.sleep(7)
# reset password to counter expiration, we will test expiration again later
userpw_reset(topology_st, suffix, subtree, userid, nousrs, "DirMgr",
PASSWORD, USER_PASW)
log.info('\''Sleep for 4 secs and check if account is now inactivated,
expected error 19'\'')
time.sleep(4)
account_status(topology_st, suffix, subtree, userid, nousrs, 0,
"Disabled")
# Reset inactivity and check for expiration
add_time_attr(topology_st, suffix, subtree, userid, nousrs,
'\''lastLoginTime'\'')
account_status(topology_st, suffix, subtree, userid, nousrs, 0,
"Enabled")
<
http://vm-166.abc.idm.lab.eng.brq.redhat.com:8080/job/NIGHTLY/ws/source/3...:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
topology_st = <lib389.topologies.TopologyMain object at 0x7f9785659310>
suffix = '\''dc=example,dc=com'\'', subtree =
'\''ou=groups'\'', userid =
'\''pwexpusr'\''
nousrs = 1, ulimit = 0, tochck = '\''Enabled'\''
def account_status(topology_st, suffix, subtree, userid, nousrs, ulimit, tochck):
"""Check account status for the given suffix, subtree, userid and
nousrs"""
while (nousrs > ulimit):
usrrdn = '\''{}{}'\''.format(userid, nousrs)
userdn = '\''uid={},{},{}'\''.format(usrrdn, subtree,
suffix)
if (tochck == "Enabled"):
try:
topology_st.standalone.simple_bind_s(userdn, USER_PASW)
except ldap.LDAPError as e:
log.error('\''User {} failed to login, expected
0'\''.format(userdn))
raise e
E
INVALID_CREDENTIALS: {'\''info'\'': '\''password
expired!'\'', '\''desc'\'': '\''Invalid
credentials'\''}
<
http://vm-166.abc.idm.lab.eng.brq.redhat.com:8080/job/NIGHTLY/ws/source/3...:
INVALID_CREDENTIALS
----------------------------- Captured stderr call -----------------------------
INFO:lib389.utils:AccountInactivityLimit set to 12. Account will be inactivated if not
accessed in 12 secs
INFO:lib389.utils:Passwordmaxage is set to 9. Password will expire in 9 secs
INFO:lib389.utils:add_users: Pass all of these as parameters suffix, subtree, userid and
nousrs
INFO:lib389.utils:Sleep for 9 secs and check if password expired
INFO:lib389.utils:Add lastLoginTime to activate the user account
INFO:lib389.utils:Enable account by replacing
lastLoginTime/createTimeStamp/ModifyTimeStamp attribute
INFO:lib389.utils:Reset user password for user-uid=pwexpusr1,ou=groups,dc=example,dc=com
INFO:lib389.utils:Reset user password for user-uid=pwexpusr1,ou=groups,dc=example,dc=com
INFO:lib389.utils:Sleep for 4 secs and check if account is now inactivated, expected error
19
INFO:lib389.utils:Enable account by replacing
lastLoginTime/createTimeStamp/ModifyTimeStamp attribute
ERROR:lib389.utils:User uid=pwexpusr1,ou=groups,dc=example,dc=com failed to login,
expected 0
============= 2 failed, 602 passed, 1 skipped in 13432.54 seconds =============='
+ '[' 1 -ne 0 ']'
+ echo CI Tests 'FAILED!'
CI Tests FAILED!
+ MSG=FAILED
+ RC=1
+ sudo /usr/sbin/sendmail mreynolds(a)redhat.com firstyear(a)redhat.com
+ sudo rm -rf /var/tmp/slapd.vg.110892 /var/tmp/slapd.vg.21881 /var/tmp/slapd.vg.6824
/var/tmp/slapd.vg.6976
+ exit 1
Build step 'Execute shell' marked build as failure