See
<https://builds.apache.org/job/kafka-trunk-jdk8/2708/display/redirect?page=changes>
Changes:
[ismael] KAFKA-6841: Support Prefixed ACLs (KIP-290) (#5117)
------------------------------------------
[...truncated 487.01 KB...]
kafka.security.auth.SimpleAclAuthorizerTest >
testHighConcurrencyDeletionOfResourceAcls STARTED
kafka.security.auth.SimpleAclAuthorizerTest >
testHighConcurrencyDeletionOfResourceAcls PASSED
kafka.security.auth.SimpleAclAuthorizerTest > testNoAclFound STARTED
kafka.security.auth.SimpleAclAuthorizerTest > testNoAclFound PASSED
kafka.security.auth.SimpleAclAuthorizerTest > testAclInheritance STARTED
kafka.security.auth.SimpleAclAuthorizerTest > testAclInheritance PASSED
kafka.security.auth.SimpleAclAuthorizerTest >
testDistributedConcurrentModificationOfResourceAcls STARTED
kafka.security.auth.SimpleAclAuthorizerTest >
testDistributedConcurrentModificationOfResourceAcls PASSED
kafka.security.auth.SimpleAclAuthorizerTest > testAddAclsOnWildcardResource
STARTED
kafka.security.auth.SimpleAclAuthorizerTest > testAddAclsOnWildcardResource
PASSED
kafka.security.auth.SimpleAclAuthorizerTest > testAclManagementAPIs STARTED
kafka.security.auth.SimpleAclAuthorizerTest > testAclManagementAPIs PASSED
kafka.security.auth.SimpleAclAuthorizerTest > testWildCardAcls STARTED
kafka.security.auth.SimpleAclAuthorizerTest > testWildCardAcls PASSED
kafka.security.auth.SimpleAclAuthorizerTest > testTopicAcl STARTED
kafka.security.auth.SimpleAclAuthorizerTest > testTopicAcl PASSED
kafka.security.auth.SimpleAclAuthorizerTest > testSuperUserHasAccess STARTED
kafka.security.auth.SimpleAclAuthorizerTest > testSuperUserHasAccess PASSED
kafka.security.auth.SimpleAclAuthorizerTest > testDeleteAclOnPrefixedResource
STARTED
kafka.security.auth.SimpleAclAuthorizerTest > testDeleteAclOnPrefixedResource
PASSED
kafka.security.auth.SimpleAclAuthorizerTest > testDenyTakesPrecedence STARTED
kafka.security.auth.SimpleAclAuthorizerTest > testDenyTakesPrecedence PASSED
kafka.security.auth.SimpleAclAuthorizerTest > testNoAclFoundOverride STARTED
kafka.security.auth.SimpleAclAuthorizerTest > testNoAclFoundOverride PASSED
kafka.security.auth.SimpleAclAuthorizerTest > testDeleteAclOnWildcardResource
STARTED
kafka.security.auth.SimpleAclAuthorizerTest > testDeleteAclOnWildcardResource
PASSED
kafka.security.auth.SimpleAclAuthorizerTest >
testAccessAllowedIfAllowAclExistsOnPrefixedResource STARTED
kafka.security.auth.SimpleAclAuthorizerTest >
testAccessAllowedIfAllowAclExistsOnPrefixedResource PASSED
kafka.security.auth.SimpleAclAuthorizerTest >
testHighConcurrencyModificationOfResourceAcls STARTED
kafka.security.auth.SimpleAclAuthorizerTest >
testHighConcurrencyModificationOfResourceAcls FAILED
java.lang.AssertionError: expected acls:
User:36 has Allow permission for operations: Read from hosts: *
User:7 has Allow permission for operations: Read from hosts: *
User:21 has Allow permission for operations: Read from hosts: *
User:39 has Allow permission for operations: Read from hosts: *
User:43 has Allow permission for operations: Read from hosts: *
User:3 has Allow permission for operations: Read from hosts: *
User:35 has Allow permission for operations: Read from hosts: *
User:15 has Allow permission for operations: Read from hosts: *
User:16 has Allow permission for operations: Read from hosts: *
User:22 has Allow permission for operations: Read from hosts: *
User:26 has Allow permission for operations: Read from hosts: *
User:11 has Allow permission for operations: Read from hosts: *
User:38 has Allow permission for operations: Read from hosts: *
User:8 has Allow permission for operations: Read from hosts: *
User:28 has Allow permission for operations: Read from hosts: *
User:32 has Allow permission for operations: Read from hosts: *
User:25 has Allow permission for operations: Read from hosts: *
User:41 has Allow permission for operations: Read from hosts: *
User:44 has Allow permission for operations: Read from hosts: *
User:48 has Allow permission for operations: Read from hosts: *
User:2 has Allow permission for operations: Read from hosts: *
User:9 has Allow permission for operations: Read from hosts: *
User:14 has Allow permission for operations: Read from hosts: *
User:46 has Allow permission for operations: Read from hosts: *
User:13 has Allow permission for operations: Read from hosts: *
User:5 has Allow permission for operations: Read from hosts: *
User:29 has Allow permission for operations: Read from hosts: *
User:45 has Allow permission for operations: Read from hosts: *
User:6 has Allow permission for operations: Read from hosts: *
User:37 has Allow permission for operations: Read from hosts: *
User:23 has Allow permission for operations: Read from hosts: *
User:19 has Allow permission for operations: Read from hosts: *
User:24 has Allow permission for operations: Read from hosts: *
User:17 has Allow permission for operations: Read from hosts: *
User:34 has Allow permission for operations: Read from hosts: *
User:12 has Allow permission for operations: Read from hosts: *
User:42 has Allow permission for operations: Read from hosts: *
User:4 has Allow permission for operations: Read from hosts: *
User:47 has Allow permission for operations: Read from hosts: *
User:18 has Allow permission for operations: Read from hosts: *
User:31 has Allow permission for operations: Read from hosts: *
User:49 has Allow permission for operations: Read from hosts: *
User:33 has Allow permission for operations: Read from hosts: *
User:1 has Allow permission for operations: Read from hosts: *
User:27 has Allow permission for operations: Read from hosts: *
but got:
User:36 has Allow permission for operations: Read from hosts: *
User:7 has Allow permission for operations: Read from hosts: *
User:21 has Allow permission for operations: Read from hosts: *
User:39 has Allow permission for operations: Read from hosts: *
User:43 has Allow permission for operations: Read from hosts: *
User:3 has Allow permission for operations: Read from hosts: *
User:35 has Allow permission for operations: Read from hosts: *
User:15 has Allow permission for operations: Read from hosts: *
User:16 has Allow permission for operations: Read from hosts: *
User:22 has Allow permission for operations: Read from hosts: *
User:26 has Allow permission for operations: Read from hosts: *
User:11 has Allow permission for operations: Read from hosts: *
User:38 has Allow permission for operations: Read from hosts: *
User:8 has Allow permission for operations: Read from hosts: *
User:28 has Allow permission for operations: Read from hosts: *
User:32 has Allow permission for operations: Read from hosts: *
User:25 has Allow permission for operations: Read from hosts: *
User:41 has Allow permission for operations: Read from hosts: *
User:44 has Allow permission for operations: Read from hosts: *
User:48 has Allow permission for operations: Read from hosts: *
User:2 has Allow permission for operations: Read from hosts: *
User:9 has Allow permission for operations: Read from hosts: *
User:14 has Allow permission for operations: Read from hosts: *
User:46 has Allow permission for operations: Read from hosts: *
User:13 has Allow permission for operations: Read from hosts: *
User:5 has Allow permission for operations: Read from hosts: *
User:29 has Allow permission for operations: Read from hosts: *
User:45 has Allow permission for operations: Read from hosts: *
User:6 has Allow permission for operations: Read from hosts: *
User:37 has Allow permission for operations: Read from hosts: *
User:23 has Allow permission for operations: Read from hosts: *
User:19 has Allow permission for operations: Read from hosts: *
User:24 has Allow permission for operations: Read from hosts: *
User:17 has Allow permission for operations: Read from hosts: *
User:34 has Allow permission for operations: Read from hosts: *
User:12 has Allow permission for operations: Read from hosts: *
User:42 has Allow permission for operations: Read from hosts: *
User:4 has Allow permission for operations: Read from hosts: *
User:47 has Allow permission for operations: Read from hosts: *
User:18 has Allow permission for operations: Read from hosts: *
User:31 has Allow permission for operations: Read from hosts: *
User:49 has Allow permission for operations: Read from hosts: *
User:33 has Allow permission for operations: Read from hosts: *
User:27 has Allow permission for operations: Read from hosts: *
at kafka.utils.TestUtils$.fail(TestUtils.scala:354)
at kafka.utils.TestUtils$.waitUntilTrue(TestUtils.scala:802)
at kafka.utils.TestUtils$.waitAndVerifyAcls(TestUtils.scala:1147)
at
kafka.security.auth.SimpleAclAuthorizerTest.testHighConcurrencyModificationOfResourceAcls(SimpleAclAuthorizerTest.scala:362)
kafka.security.auth.SimpleAclAuthorizerTest >
testDeleteAllAclOnPrefixedResource STARTED
kafka.security.auth.SimpleAclAuthorizerTest >
testDeleteAllAclOnPrefixedResource PASSED
kafka.security.auth.SimpleAclAuthorizerTest > testAddAclsOnLiteralResource
STARTED
kafka.security.auth.SimpleAclAuthorizerTest > testAddAclsOnLiteralResource
PASSED
kafka.security.auth.SimpleAclAuthorizerTest >
testAuthorizeThrowsOnNoneLiteralResource STARTED
kafka.security.auth.SimpleAclAuthorizerTest >
testAuthorizeThrowsOnNoneLiteralResource PASSED
kafka.security.auth.SimpleAclAuthorizerTest > testGetAclsPrincipal STARTED
kafka.security.auth.SimpleAclAuthorizerTest > testGetAclsPrincipal PASSED
kafka.security.auth.SimpleAclAuthorizerTest > testAddAclsOnPrefiexedResource
STARTED
kafka.security.auth.SimpleAclAuthorizerTest > testAddAclsOnPrefiexedResource
PASSED
kafka.security.auth.SimpleAclAuthorizerTest >
testAccessAllowedIfAllowAclExistsOnWildcardResource STARTED
kafka.security.auth.SimpleAclAuthorizerTest >
testAccessAllowedIfAllowAclExistsOnWildcardResource PASSED
kafka.security.auth.SimpleAclAuthorizerTest > testLoadCache STARTED
kafka.security.auth.SimpleAclAuthorizerTest > testLoadCache PASSED
kafka.security.auth.AclTest > testAclJsonConversion STARTED
kafka.security.auth.AclTest > testAclJsonConversion PASSED
kafka.security.auth.ZkAuthorizationTest > testIsZkSecurityEnabled STARTED
kafka.security.auth.ZkAuthorizationTest > testIsZkSecurityEnabled PASSED
kafka.security.auth.ZkAuthorizationTest > testZkUtils STARTED
kafka.security.auth.ZkAuthorizationTest > testZkUtils PASSED
kafka.security.auth.ZkAuthorizationTest > testZkAntiMigration STARTED
kafka.security.auth.ZkAuthorizationTest > testZkAntiMigration PASSED
kafka.security.auth.ZkAuthorizationTest > testZkMigration STARTED
kafka.security.auth.ZkAuthorizationTest > testZkMigration PASSED
kafka.security.auth.ZkAuthorizationTest > testChroot STARTED
kafka.security.auth.ZkAuthorizationTest > testChroot PASSED
kafka.security.auth.ZkAuthorizationTest > testDelete STARTED
kafka.security.auth.ZkAuthorizationTest > testDelete PASSED
kafka.security.auth.ZkAuthorizationTest > testDeleteRecursive STARTED
kafka.security.auth.ZkAuthorizationTest > testDeleteRecursive PASSED
2063 tests completed, 1 failed, 5 skipped
> Task :kafka-trunk-jdk8:core:test FAILED
> Task :test_core_2_11 FAILED
FAILURE: Build failed with an exception.
* What went wrong:
Execution failed for task ':kafka-trunk-jdk8:core:test'.
> There were failing tests. See the report at:
> file://<https://builds.apache.org/job/kafka-trunk-jdk8/ws/core/build/reports/tests/test/index.html>
* Try:
Run with --stacktrace option to get the stack trace. Run with --info or --debug
option to get more log output. Run with --scan to get full insights.
* Get more help at https://help.gradle.org
BUILD FAILED in 1h 54m 13s
25 actionable tasks: 3 executed, 22 up-to-date
Build step 'Execute shell' marked build as failure
[FINDBUGS] Collecting findbugs analysis files...
Setting GRADLE_4_4_HOME=/home/jenkins/tools/gradle/4.4
[FINDBUGS] Searching for all files in
<https://builds.apache.org/job/kafka-trunk-jdk8/ws/> that match the pattern
**/build/reports/findbugs/*.xml
[FINDBUGS] Parsing 1 file in
<https://builds.apache.org/job/kafka-trunk-jdk8/ws/>
[FINDBUGS] Successfully parsed file
<https://builds.apache.org/job/kafka-trunk-jdk8/ws/core/build/reports/findbugs/main.xml>
with 0 unique warnings and 0 duplicates.
Setting GRADLE_4_4_HOME=/home/jenkins/tools/gradle/4.4
Setting GRADLE_4_4_HOME=/home/jenkins/tools/gradle/4.4
<Git Blamer> Using GitBlamer to create author and commit information for all
warnings.
<Git Blamer> GIT_COMMIT=b3aa655a70d92fedfebd32cf469a87b45766fc59,
workspace=<https://builds.apache.org/job/kafka-trunk-jdk8/ws/>
[FINDBUGS] Computing warning deltas based on reference build #2707
Recording test results
Setting GRADLE_4_4_HOME=/home/jenkins/tools/gradle/4.4
Setting GRADLE_4_4_HOME=/home/jenkins/tools/gradle/4.4
Not sending mail to unregistered user [email protected]