See <http://river.suse.de/job/yast-ldap-client-HEAD/382/changes> Changes: [yast-devel] YCP Killer: Unify YaST module structure [yast-devel] YCP Killer: Apply changes needed for Ruby translation [yast-devel] YCP Killer: Translate YCP files into Ruby ------------------------------------------ [...truncated 311 lines...] Read .etc.sssd_conf.v."domain/default"."ldap_group_search_base" "ou=group,dc=suse,dc=cz" -Return true -Return $["base_config_dn":"", "bind_dn":"uid=manager,dc=suse,dc=cz", "create_ldap":false, "file_server":false, "krb5_kdcip":"kdc.suse.cz,kdc.suse.de", "krb5_realm":"SUSE.CZ", "ldap_domain":"dc=suse,dc=cz", "ldap_server":"localhost", "ldap_tls":false, "login_enabled":true, "member_attribute":"member", "mkhomedir":true, "nss_base_group":"ou=group,dc=suse,dc=cz", "pam_password":"crypt", "sssd":true, "sssd_cache_credentials":true, "sssd_enumerate":true, "sssd_ldap_schema":"rfc2307", "sssd_with_krb":true, "start_autofs":true, "start_ldap":true, "tls_cacertdir":"/etc/openldap/cacerts/"] FAIL: Wrong stdout for Export3 See the diff above. Running GetAllAttributes ... FAIL: Wrong stdout for GetAllAttributes The diff follows... --- tests/GetAllAttributes.out 2013-01-22 11:26:37.000000000 +0100 +++ tmp.out.GetAllAttributes 2013-07-30 13:06:03.000000000 +0200 @@ -1,20 +0,0 @@ -Dump ================================================== -Dump ===== current object_classes (keys): -Dump ["objecttemplate", "top"] -Dump ================================================== -Dump ===== looking for 'userTemplate'================== -Dump ===== (superior classes already in cache) ======== -Dump ================================================== -Read .ldap.schema.oc $["name":"usertemplate"] $["desc":"User object template", "may":["secondarygroup"], "must":["cn"], "oid":"1.3.6.1.4.1.7057.10.1.5", "sup":["objecttemplate"]] -Return ["secondarygroup", "cn", "defaultobjectclass", "requiredattribute", "allowedattribute", "defaultvalue", "namingattribute", "objectclass"] -Dump ================================================== -Dump ===== updated object_classes (keys): -Dump ["objecttemplate", "top", "usertemplate"] -Dump ================================================== -Dump ===== looking for non-existent class ============= -Dump ================================================== -Read .ldap.schema.oc $["name":"usertemplat"] nil -Return [] -Dump ================================================== -Dump ===== updated object_classes (keys): -Dump ["objecttemplate", "top", "usertemplat", "usertemplate"] FAIL: Wrong stdout for GetAllAttributes See the diff above. Running LDAPBind ... FAIL: Wrong stdout for LDAPBind The diff follows... --- tests/LDAPBind.out 2013-01-22 11:26:37.000000000 +0100 +++ tmp.out.LDAPBind 2013-07-30 13:06:03.000000000 +0200 @@ -1,10 +0,0 @@ -Dump ==== bind anonymously ============================== -Execute .ldap.bind $[] true -Return -Dump ==== bind failed ==================================== -Execute .ldap.bind $["bind_dn":"uid=manager,dc=suse,dc=cz", "bind_pw":"p"] false -Read .ldap.error $["msg":"Bind failed"] -Return Bind failed -Dump ==== bind ok ======================================== -Execute .ldap.bind $["bind_dn":"uid=manager,dc=suse,dc=cz", "bind_pw":"pw"] true -Return FAIL: Wrong stdout for LDAPBind See the diff above. Running LDAPInit ... FAIL: Wrong stdout for LDAPInit The diff follows... --- tests/LDAPInit.out 2013-01-22 11:26:37.000000000 +0100 +++ tmp.out.LDAPInit 2013-07-30 13:06:04.000000000 +0200 @@ -1,16 +0,0 @@ -Dump ==== init (one server, no port set) ============== -Dump ==== value of server: "localhost" -Execute .ldap $["cacertdir":"", "cacertfile":"", "hostname":"localhost", "port":389, "use_tls":"yes"] true -Return -Dump ==== init (one server, nonsence port set) ======== -Dump ==== value of server: "localhost:sdgfd#$" -Execute .ldap $["cacertdir":"", "cacertfile":"", "hostname":"localhost", "port":389, "use_tls":"yes"] true -Return -Dump ==== init (more servers set, TLS used) =========== -Dump ==== value of server: "chimera.suse.cz:333 localhost" -Execute .ldap $["cacertdir":"/etc/ssl/certs", "cacertfile":"", "hostname":"chimera.suse.cz", "port":333, "use_tls":"yes"] true -Return -Dump ==== init failed ================================= -Execute .ldap $["cacertdir":"/etc/ssl/certs", "cacertfile":"", "hostname":"chimera.suse.cz", "port":333, "use_tls":"yes"] false -Read .ldap.error $["code":11, "msg":"Initialization failed"] -Return Initialization failed FAIL: Wrong stdout for LDAPInit See the diff above. Running Read ... FAIL: Wrong stdout for Read The diff follows... --- tests/Read.out 2013-01-22 11:26:37.000000000 +0100 +++ tmp.out.Read 2013-07-30 13:06:04.000000000 +0200 @@ -1,24 +0,0 @@ -Dump ==== reading... ============================ -Read .etc.ldap_conf.v."/etc/ldap.conf"."uri" "ldap://localhost:333" -Read .etc.ldap_conf.v."/etc/ldap.conf"."base" "dc=suse,dc=cz" -Read .etc.ldap_conf.v."/etc/ldap.conf"."ssl" nil -Read .etc.ldap_conf.v."/etc/ldap.conf"."tls_cacertdir" "/etc/openldap/cacerts/" -Read .etc.ldap_conf.v."/etc/ldap.conf"."tls_cacertfile" nil -Read .etc.ldap_conf.v."/etc/ldap.conf"."tls_checkpeer" "no" -Read .etc.ldap_conf.v."/etc/ldap.conf"."nss_base_passwd" nil -Read .etc.ldap_conf.v."/etc/ldap.conf"."nss_base_shadow" nil -Read .etc.ldap_conf.v."/etc/ldap.conf"."nss_base_group" nil -Read .etc.ldap_conf.v."/etc/ldap.conf"."pam_password" "crypt" -Read .sysconfig.ldap.BASE_CONFIG_DN nil -Read .sysconfig.ldap.FILE_SERVER "no" -Read .sysconfig.ldap.BIND_DN "uid=manager,dc=suse,dc=cz" -Read .etc.ldap_conf.v."/etc/ldap.conf"."nss_map_attribute" 0 -Execute .passwd.init $["base_directory":"/etc"] true -Read .passwd.passwd.pluslines ["+"] -Return true -Dump ============================================ -Dump ldap used: -true- -Dump nsswitch: -$["group":["compat"], "group_compat":["ldap"], "passwd":["compat"], "passwd_compat":["ldap"]]- -Dump base config DN: -- -Dump bind DN: -uid=manager,dc=suse,dc=cz- -Dump server: -localhost:333- FAIL: Wrong stdout for Read See the diff above. Running Read2 ... FAIL: Wrong stdout for Read2 The diff follows... --- tests/Read2.out 2013-06-21 09:50:52.000000000 +0200 +++ tmp.out.Read2 2013-07-30 13:06:05.000000000 +0200 @@ -22,7 +22,6 @@ Read .etc.sssd_conf.v."domain/default"."ldap_id_use_start_tls" nil Read .etc.sssd_conf.v."domain/default"."ldap_user_search_base" nil Read .etc.sssd_conf.v."domain/default"."ldap_group_search_base" "ou=group,dc=suse,dc=cz" -Return true Dump ldap: -true- Dump sssd: -true- Dump nss: -dc=suse,dc=cz- FAIL: Wrong stdout for Read2 See the diff above. Running ReadLdapConfEntry ... FAIL: Wrong stdout for ReadLdapConfEntry The diff follows... --- tests/ReadLdapConfEntry.out 2013-01-22 11:26:37.000000000 +0100 +++ tmp.out.ReadLdapConfEntry 2013-07-30 13:06:05.000000000 +0200 @@ -1,6 +0,0 @@ -Read .etc.ldap_conf.v."/etc/ldap.conf"."host" nil -Return localhost -Read .etc.ldap_conf.v."/etc/ldap.conf"."base" "dc=suse,dc=cz" -Return dc=suse,dc=cz -Read .etc.ldap_conf.v."/etc/ldap.conf"."nss_base_passwd" nil -Return FAIL: Wrong stdout for ReadLdapConfEntry See the diff above. Running Routines ... FAIL: Wrong stdout for Routines The diff follows... --- tests/Routines.out 2013-01-22 11:26:37.000000000 +0100 +++ tmp.out.Routines 2013-07-30 13:06:05.000000000 +0200 @@ -1,9 +0,0 @@ -Return uid=root -Return root -Return cn=admin,dc=suse,dc=cz -Return uid=root -Return root -Return cn=admin -Return root -Return root -Return cn=admin FAIL: Wrong stdout for Routines See the diff above. Running SingleValued ... FAIL: Wrong stdout for SingleValued The diff follows... --- tests/SingleValued.out 2013-01-22 11:26:37.000000000 +0100 +++ tmp.out.SingleValued 2013-07-30 13:06:05.000000000 +0200 @@ -1,26 +0,0 @@ -Dump ================================================== -Dump ===== single attribute =========================== -Read .ldap.schema.at $["name":"uid"] $["desc":"uid desc", "single":true] -Return true -Dump ================================================== -Dump ===== non-existent attribute ===================== -Read .ldap.schema.at $["name":"skeldi"] nil -Return false -Dump ================================================== -Dump ===== non-single attribute ======================= -Read .ldap.schema.at $["name":"skeldir"] $["desc":"skelDir desc"] -Return false -Dump ================================================== -Dump ===== skelDir once again (already in cache) ====== -Return false -Dump ================================================== -Dump ===== cn (not single) ============================ -Read .ldap.schema.at $["name":"cn"] $["desc":"cn attribute description", "oid":"1.2.3.4.5", "single":false] -Return false -Dump ================================================== -Dump ===== description of new attribute =============== -Read .ldap.schema.at $["name":"defaulttemplate"] $["desc":"The DN of a template that should be used by default", "single":false] -Return The DN of a template that should be used by default -Dump ================================================== -Dump ===== description of used attribute (in cache) === -Return cn attribute description FAIL: Wrong stdout for SingleValued See the diff above. Checking finished === yast2-ldap-client Summary === # of unexpected failures 24 make[2]: *** [check-DEJAGNU] Error 1 make[2]: Leaving directory `<http://river.suse.de/job/yast-ldap-client-HEAD/ws/checkout/testsuite'> make[1]: *** [check-am] Error 2 make[1]: Leaving directory `<http://river.suse.de/job/yast-ldap-client-HEAD/ws/checkout/testsuite'> make: *** [check-recursive] Error 1 ++ error_exit 2 ++ echo 'ERROR: detected exitcode 2' ERROR: detected exitcode 2 ++ cleanup ++ echo '==> Running cleanup' ==> Running cleanup ++ rm -f <http://river.suse.de/job/yast-ldap-client-HEAD/ws/ICECC/40c0ab7e54f59a1e4e493c1ea90a882a.tar.gz> ++ footer_and_exit 1 ++ '[' -z 1 ']' ++ MYEXIT=1 ++ '[' 1 == 0 ']' ++ ascii_failed ++ cat ( ) ( ) ( ) _ ) ( \_ _(_\ \)__ (____\___)) build failed ++ exit 1 Build step 'Execute shell' marked build as failure -- To unsubscribe, e-mail: yast-devel+unsubscribe@opensuse.org To contact the owner, e-mail: yast-devel+owner@opensuse.org