Jira: https://issues.apache.org/jira/browse/OOZIE-3465 Build: https://builds.apache.org/job/PreCommit-OOZIE-Build/1227/
################################################################################### ########################## LAST 100 LINES OF THE CONSOLE ########################### [...truncated 2.16 MB...] [TRACE] Modernizer errors after patch: 67 sed: -e expression #1, char 77: unknown option to `s' sed: -e expression #1, char 77: unknown option to `s' Testing JIRA OOZIE-3465 Cleaning local git workspace ---------------------------- +1 PATCH_APPLIES +1 CLEAN +1 RAW_PATCH_ANALYSIS +1 the patch does not introduce any @author tags +1 the patch does not introduce any tabs +1 the patch does not introduce any trailing spaces +1 the patch does not introduce any star imports +1 the patch does not introduce any line longer than 132 +1 the patch adds/modifies 1 testcase(s) +1 RAT +1 the patch does not seem to introduce new RAT warnings +1 JAVADOC +1 Javadoc generation succeeded with the patch +1 the patch does not seem to introduce new Javadoc warning(s) +1 COMPILE +1 HEAD compiles +1 patch compiles +1 the patch does not seem to introduce new javac warnings -1 There are [23] new bugs found below threshold in total that must be fixed. +1 There are no new bugs found in [fluent-job/fluent-job-api]. +1 There are no new bugs found in [docs]. -1 There are [7] new bugs found below threshold in [core] that must be fixed, listing only the first [5] ones. You can find the SpotBugs diff here (look for the red and orange ones): core/findbugs-new.html The top [5] most important SpotBugs errors are: At BulkJPAExecutor.java:[line 206]: This use of javax/persistence/EntityManager.createQuery(Ljava/lang/String;)Ljavax/persistence/Query; can be vulnerable to SQL/JPQL injection At BulkJPAExecutor.java:[line 176]: At BulkJPAExecutor.java:[line 175] At BulkJPAExecutor.java:[line 205]: At BulkJPAExecutor.java:[line 199] This use of javax/persistence/EntityManager.createQuery(Ljava/lang/String;)Ljavax/persistence/Query; can be vulnerable to SQL/JPQL injection: At BulkJPAExecutor.java:[line 206] At BulkJPAExecutor.java:[line 111]: At BulkJPAExecutor.java:[line 127] +1 There are no new bugs found in [sharelib/spark]. +1 There are no new bugs found in [sharelib/git]. +1 There are no new bugs found in [sharelib/sqoop]. +1 There are no new bugs found in [sharelib/hive2]. +1 There are no new bugs found in [sharelib/streaming]. +1 There are no new bugs found in [sharelib/pig]. -1 There are [1] new bugs found below threshold in [sharelib/oozie] that must be fixed. You can find the SpotBugs diff here (look for the red and orange ones): sharelib/oozie/findbugs-new.html The most important SpotBugs errors are: At ShellMain.java:[line 93]: This usage of java/lang/ProcessBuilder.<init>(Ljava/util/List;)V can be vulnerable to Command Injection At ShellMain.java:[line 91]: At ShellMain.java:[line 90] At ShellMain.java:[line 92] +1 There are no new bugs found in [sharelib/hive]. +1 There are no new bugs found in [sharelib/hcatalog]. +1 There are no new bugs found in [sharelib/distcp]. -1 There are [15] new bugs found below threshold in [tools] that must be fixed, listing only the first [5] ones. You can find the SpotBugs diff here (look for the red and orange ones): tools/findbugs-new.html The top [5] most important SpotBugs errors are: At OozieDBCLI.java:[line 584]: This use of java/sql/Statement.executeUpdate(Ljava/lang/String;)I can be vulnerable to SQL injection At OozieDBCLI.java:[line 574]: At OozieDBCLI.java:[line 573] At OozieDBCLI.java:[line 577]: At OozieDBCLI.java:[line 575] At OozieDBCLI.java:[line 579]: At OozieDBCLI.java:[line 578] At OozieDBCLI.java:[line 584]: At OozieDBCLI.java:[line 581] +1 There are no new bugs found in [server]. +1 There are no new bugs found in [client]. +1 There are no new bugs found in [examples]. +1 There are no new bugs found in [webapp]. +1 BACKWARDS_COMPATIBILITY +1 the patch does not change any JPA Entity/Colum/Basic/Lob/Transient annotations +1 the patch does not modify JPA files +1 TESTS Tests run: 3181 +1 DISTRO +1 distro tarball builds with the patch +1 MODERNIZER +1 the patch fixes 2 modernizer error(s) ---------------------------- -1 Overall result, please check the reported -1(s) The full output of the test-patch run is available at https://builds.apache.org/job/PreCommit-OOZIE-Build/1227/ Adding comment to JIRA % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 5209 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0{"self":"https://issues.apache.org/jira/rest/api/2/issue/13226637/comment/16937778","id":"16937778","author":{"self":"https://issues.apache.org/jira/rest/api/2/user?username=hadoopqa","name":"hadoopqa","key":"hadoopqa","avatarUrls":{"48x48":"https://issues.apache.org/jira/secure/useravatar?ownerId=hadoopqa&avatarId=10393","24x24":"https://issues.apache.org/jira/secure/useravatar?size=small&ownerId=hadoopqa&avatarId=10393","16x16":"https://issues.apache.org/jira/secure/useravatar?size=xsmall&ownerId=hadoopqa&avatarId=10393","32x32":"https://issues.apache.org/jira/secure/useravatar?size=medium&ownerId=hadoopqa&avatarId=10393"},"displayName":"Hadoop QA","active":true,"timeZone":"Etc/UTC"},"body":"\nTesting JIRA OOZIE-3465\n\nCleaning local git workspace\n\n----------------------------\n\n{color:green}+1 PATCH_APPLIES{color}\n{color:green}+1 CLEAN{color}\n{color:green}+1 RAW_PATCH_ANALYSIS{color}\n. {color:green}+1{color} the patch does not introduce any @author tags\n. {color:green}+1{color} the patch does not introduce any tabs\n. {color:green}+1{color} the patch does not introduce any trailing spaces\n. {color:green}+1{color} the patch does not introduce any star imports\n. {color:green}+1{color} the patch does not introduce any line longer than 132\n. {color:green}+1{color} the patch adds/modifies 1 testcase(s)\n{color:green}+1 RAT{color}\n. {color:green}+1{color} the patch does not seem to introduce new RAT warnings\n{color:green}+1 JAVADOC{color}\n. {color:green}+1{color} Javadoc generation succeeded with the patch\n. {color:green}+1{color} the patch does not seem to introduce new Javadoc warning(s)\n{color:green}+1 COMPILE{color}\n. {color:green}+1{color} HEAD compiles\n. {color:green}+1{color} patch compiles\n. {color:green}+1{color} the patch does not seem to introduce new javac warnings\n{color:red}-1{color} There are [23] new bugs found below threshold in total that must be fixed.\n. {color:green}+1{color} There are no new bugs found in [fluent-job/fluent-job-api].\n. {color:green}+1{color} There are no new bugs found in [docs].\n. {color:red}-1{color} There are [7] new bugs found below threshold in [core] that must be fixed, listing only the first [5] ones.\n. You can find the SpotBugs diff here (look for the red and orange ones): core/findbugs-new.html\n. The top [5] most important SpotBugs errors are:\n. At BulkJPAExecutor.java:[line 206]: This use of javax/persistence/EntityManager.createQuery(Ljava/lang/String;)Ljavax/persistence/Query; can be vulnerable to SQL/JPQL injection\n. At BulkJPAExecutor.java:[line 176]: At BulkJPAExecutor.java:[line 175]\n. At BulkJPAExecutor.java:[line 205]: At BulkJPAExecutor.java:[line 199]\n. This use of javax/persistence/EntityManager.createQuery(Ljava/lang/String;)Ljavax/persistence/Query; can be vulnerable to SQL/JPQL injection: At BulkJPAExecutor.java:[line 206]\n. At BulkJPAExecutor.java:[line 111]: At BulkJPAExecutor.java:[line 127]\n. {color:green}+1{color} There are no new bugs found in [sharelib/spark].\n. {color:green}+1{color} There are no new bugs found in [sharelib/git].\n. {color:green}+1{color} There are no new bugs found in [sharelib/sqoop].\n. {color:green}+1{color} There are no new bugs found in [sharelib/hive2].\n. {color:green}+1{color} There are no new bugs found in [sharelib/streaming].\n. {color:green}+1{color} There are no new bugs found in [sharelib/pig].\n. {color:red}-1{color} There are [1] new bugs found below threshold in [sharelib/oozie] that must be fixed.\n. You can find the SpotBugs diff here (look for the red and orange ones): sharelib/oozie/findbugs-new.html\n. The most important SpotBugs errors are:\n. At ShellMain.java:[line 93]: This usage of java/lang/ProcessBuilder.<init>(Ljava/util/List;)V can be vulnerable to Command Injection\n. At ShellMain.java:[line 91]: At ShellMain.java:[line 90]\n. At ShellMain.java:[line 92]\n. {color:green}+1{color} There are no new bugs found in [sharelib/hive].\n. {color:green}+1{color} There are 100 11794 0 6585 100 5209 5136 4063 0:00:01 0:00:01 --:--:-- 9199 no new bugs found in [sharelib/hcatalog].\n. {color:green}+1{color} There are no new bugs found in [sharelib/distcp].\n. {color:red}-1{color} There are [15] new bugs found below threshold in [tools] that must be fixed, listing only the first [5] ones.\n. You can find the SpotBugs diff here (look for the red and orange ones): tools/findbugs-new.html\n. The top [5] most important SpotBugs errors are:\n. At OozieDBCLI.java:[line 584]: This use of java/sql/Statement.executeUpdate(Ljava/lang/String;)I can be vulnerable to SQL injection\n. At OozieDBCLI.java:[line 574]: At OozieDBCLI.java:[line 573]\n. At OozieDBCLI.java:[line 577]: At OozieDBCLI.java:[line 575]\n. At OozieDBCLI.java:[line 579]: At OozieDBCLI.java:[line 578]\n. At OozieDBCLI.java:[line 584]: At OozieDBCLI.java:[line 581]\n. {color:green}+1{color} There are no new bugs found in [server].\n. {color:green}+1{color} There are no new bugs found in [client].\n. {color:green}+1{color} There are no new bugs found in [examples].\n. {color:green}+1{color} There are no new bugs found in [webapp].\n{color:green}+1 BACKWARDS_COMPATIBILITY{color}\n. {color:green}+1{color} the patch does not change any JPA Entity/Colum/Basic/Lob/Transient annotations\n. {color:green}+1{color} the patch does not modify JPA files\n{color:green}+1 TESTS{color}\n. Tests run: 3181\n{color:green}+1 DISTRO{color}\n. {color:green}+1{color} distro tarball builds with the patch \n{color:green}+1 MODERNIZER{color}\n. {color:green}+1{color} the patch fixes 2 modernizer error(s)\n\n----------------------------\n{color:red}*-1 Overall result, please check the reported -1(s)*{color}\n\n\nThe full output of the test-patch run is available at\n\n. https://builds.apache.org/job/PreCommit-OOZIE-Build/1227/\n\n","updateAuthor":{"self":"https://issues.apache.org/jira/rest/api/2/user?username=hadoopqa","name":"hadoopqa","key":"hadoopqa","avatarUrls":{"48x48":"https://issues.apache.org/jira/secure/useravatar?ownerId=hadoopqa&avatarId=10393","24x24":"https://issues.apache.org/jira/secure/useravatar?size=small&ownerId=hadoopqa&avatarId=10393","16x16":"https://issues.apache.org/jira/secure/useravatar?size=xsmall&ownerId=hadoopqa&avatarId=10393","32x32":"https://issues.apache.org/jira/secure/useravatar?size=medium&ownerId=hadoopqa&avatarId=10393"},"displayName":"Hadoop QA","active":true,"timeZone":"Etc/UTC"},"created":"2019-09-25T14:18:54.508+0000","updated":"2019-09-25T14:18:54.508+0000"} test-patch exit code: 1 Build step 'Execute shell' marked build as failure [description-setter] Description set: OOZIE-3465 Archiving artifacts Recording test results ERROR: Step ?Publish JUnit test result report? failed: No test report files were found. Configuration error? Email was triggered for: Failure - Any Sending email for trigger: Failure - Any ################################################################################### ############################## FAILED TESTS (if any) ############################## No tests ran.