[ https://issues.apache.org/jira/browse/GEODE-9090?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Jens Deppe resolved GEODE-9090. ------------------------------- Fix Version/s: 1.15.0 Resolution: Fixed > Suspect Strings in Logs DeploymentManagementRedployDUnitTest > > redeployJarsWithNewVersionsOfFunctions > ----------------------------------------------------------------------------------------------------- > > Key: GEODE-9090 > URL: https://issues.apache.org/jira/browse/GEODE-9090 > Project: Geode > Issue Type: Task > Components: management > Reporter: Bill Burcham > Assignee: Jens Deppe > Priority: Major > Labels: pull-request-available > Fix For: 1.15.0 > > > Suspect strings in logs in this CI run > https://concourse.apachegeode-ci.info/teams/main/pipelines/apache-develop-main/jobs/DistributedTestOpenJDK8/builds/107: > {code:java} > org.apache.geode.management.internal.rest.DeploymentManagementRedployDUnitTest > > redeployJarsWithNewVersionsOfFunctions FAILED > java.lang.AssertionError: Suspicious strings were written to the log > during this run. > Fix the strings or use IgnoredException.addIgnoredException to ignore. > ----------------------------------------------------------------------- > Found suspect string in 'dunit_suspect-vm0.log' at line 691 > > PK\u0003\u0004\u0014\u0000\u0008\u0008\u0008\u0000{4}R\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000)\u0000\u0004\u0000DeployCommandRedeployDUnitFunctionA.class~~~~\u0000\u0000~~~~~~n~~@\u0010~~~~~~?~~IhChh~~~~~~~~~~: > ~~Bp+B~~\u0012E > EP5P$n~~~~J~~r~~h~~F~~g~~\u0000\u0017P9~~\u0000<\u0014b~~qUp~~H\u000f~~~~w~~~y~~~~~~~~~~~~\u000f\u0000O~~~~~~<~~~~Q/b\u0003~~y~~-b\u000b~~\u0005\u0018~~1P7p~~~~}\u0003~~\u000c~~~~~~\u0013~~\u0019C~~l\u001c3d:~~~~3,~~~~~~_~~~~!~~~~~~~~K;~~1W/F\u000c~~f~~~j~~~~-~~~~~~~~@I~~~~\u000f(O~~0~~~~~~a~~~~k\u001dJ~~~~~\u0012<8~~~~\u0006?~~N~~H~~~~~~~~~~~~~~~~~~s~~~~1~~_ZN~~\u001e#V/~~\u001c%|~~~~{~~~~~~(~~~~~\u000e~~x\u0010~~**~~\u001dC~~~~*1\u0011\u001fy~~~~o~~~~~~\u0019\u0011<o3~~~~Ue~~~~Lm~~~~~~J\u000b\u0003?~~\u000e~~ > ~~~~~~~~S~~~~@~~~~~~FG|\u0014}v~~P3\u0017%~~~~~~P E~~\u0018v~~~~ > ~~~~`~~~~~~?~~2~~~~G\u0006~~%~~~~~~~~%~~~~~~~~~~^ > O~~C > > ~~~~i\u0008~~~~?~~.w~~Y~~\u000c~~~~~~~~~~M~~~~y;~~~~~~K\u0006~~\u001c~~~~~~~~ > > dl~~\u001a8~~~~~~\u0003u1~~~~~~OZB#~~mandRedeployDUnitFunctionA.class~~~~\u0000\u0000PK\u0005\u0006\u0000\u0000\u0000\u0000\u0001\u0000\u0001\u0000[\u0000\u0000\u0000j\u0002\u0000\u0000\u0000\u0000 > --uWbis1NkO9dSY3pUDEYgZgkx4bh2w52 > Content-Disposition: form-data; name="config" > Content-Type: application/json > ----------------------------------------------------------------------- > Found suspect string in 'dunit_suspect-vm0.log' at line 710 > > PK\u0003\u0004\u0014\u0000\u0008\u0008\u0008\u0000{4}R\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000:\u0000\u0004\u0000jddunit/function/DeployCommandRedeployDUnitFunctionB.class~~~~\u0000\u0000~~RMo~~@\u0010}~~/\u001b~~~~!~~~~$~~~~\u0016Z'~~j!z+B*~~"~~"~~\u001a(\u0012~~~~~~~~\u001b9vd~~Q~~7q~~\u000b~~\u001c~~\u0001~~(~~~~~~*~~\u0007R~~4~~;~~~~~~~~~~~~~~~~\u0007~~=~~\u000c~~~~]G\u001b\u001d\u001dw~~X~~~~~~~~\u00064~~~~~~~~aC~~\u0026C~~~~\u000c~~z~~P~~~~~~\u000c~~~~~ > > ~~~~~~\u000c~~~~d:\u0016~~+>~~Is~~~~~~G"N|~~A~~2h~~T8~~"~~#k\u0018F~~~~g~~9\u0011~~'(~~~~d~~\u001cb\u000f~~~~Q2\u000c~~a~~~~~~~~OSU=~~~~~~\u000c-~~;~~~~~~~~~~y~~~~#\u0015~~~~~~gh~~3%~~~~~~\u0018~~~~~~H~~y*2~v~~~~~~~~C?~~~~x~~\u0016IN~~(L"G\u000cdZ~~u(f~~~~~\u0000S\u001e~~G~~~~~~~~~~~~~~~~z~~~~~~~~L\u0018~~k~~o~~\u0001~~\u0018~~c\u0011~~d|~~a~~~~~~.~~~~\u001c~~L4q~~ao~~~~ > > ~~~~w~~~~~~~~~~~~~~~~~~~~x"\u001c~~y{NR\u0019v~~F?~~~~~~~~3~~~~\u0008\\\u00111~~D~~~~~~~~~@\\~~\\\u0001N~~~~y~~~~\u0017h~~\u001a\u0016~~~~~~~~:~~~~\u000e~~5~~_~~n~~ > > I~~~~~t3~~~~~~o`_~~~~p~~d-S~~H.`1~~~~sh~~~~~~~~[\u0026~~~~~~\u001c~~C~~\u000e~~~~s~~\u0012C~~|~~J > \u0017~~~~~~~~~~w~~44~~~~~~~~~~/7~~~~\u000b > ~~H~~.\u0017R.\u0016~~Ari\u000e~~V~~~~\u0012/_~~~~+j~~~~)\u0007~~~~ X~~ > > PK\u0007\u0008~~w7~~~~\u0001\u0000\u0000\u0001\u0004\u0000\u0000PK\u0001\u0002\u0014\u0000\u0014\u0000\u0008\u0008\u0008\u0000{4}R~~w7~~~~\u0001\u0000\u0000\u0001\u0004\u0000\u0000:\u0000\u0004\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000jddunit/function/DeployCommandRedeployDUnitFunctionB.class~~~~\u0000\u0000PK\u0005\u0006\u0000\u0000\u0000\u0000\u0001\u0000\u0001\u0000l\u0000\u0000\u0000Z\u0002\u0000\u0000\u0000\u0000 > --XADbzFelszjYv8QsixUwkKt2kmAJrXT6W > Content-Disposition: form-data; name="config" > Content-Type: application/json > ----------------------------------------------------------------------- > Found suspect string in 'dunit_suspect-vm0.log' at line 729 > > PK\u0003\u0004\u0014\u0000\u0008\u0008\u0008\u0000{4}R\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000:\u0000\u0004\u0000jddunit/function/DeployCommandRedeployDUnitFunctionB.class~~~~\u0000\u0000~~RMo~~@\u0010}~~/\u001b~~~~!~~~~$~~~~\u0016Z'~~j > > z+B*~~"~~"~~\u001a(\u0012~~~~~~~~\u001b9vd~~Q~~7q~~\u000b~~\u001c~~\u0001~~(~~~~~~*~~\u0007R~~4~~;~~~~~~~~~~~~~~~~\u0007~~=~~\u000c~~~~]G\u001b\u001d\u001dw~~X~~~~~~~~\u00064~~~~~~~~aC~~\u0026C~~~~\u000c~~z~~P~~~~~~\u000c~~~~~ > > ~~~~~~\u000c~~~~d:\u0016~~+>~~Is~~~~~~G"N|~~A~~2h~~T8~~"~~#k\u0018F~~~~g~~9\u0011~~'(~~~~d~~\u001cb\u000f~~~~Q2\u000c~~a~~~~~~~~OSU=~~~~~~\u000c-~~;~~~~~~~~~~y~~~~#\u0015~~~~~~gh~~3%~~~~~~\u0018~~~~~~H~~y*2~v~~~~~~~~C?~~~~x~~\u0016IN~~(L"G\u000cdZ~~u(f~~~~~\u0000S\u001e~~G~~~~~~~~~~~~~~~~z~~~~~~~~L\u0018~~k~~o~~\u0001~~\u0018~~c\u0011~~d|~~a~~~~~~.~~~~\u001c~~L4q~~ao~~~~ > > ~~~~w~~~~~~~~~~~~~~~~~~~~x"\u001c~~y{NR\u0019v~~F?~~~~~~~~3~~~~\u0008\\\u00111~~D~~~~~~~~~@\\~~\\\u0001N~~~~y~~~~\u0017h~~\u001a\u0016~~~~~~~~:~~~~\u000e~~5~~_~~n~~ > > I~~~~~t3~~~~~~o`_~~~~p~~d-S~~H.`1~~~~sh~~~~~~~~[\u0026~~~~~~\u001c~~C~~\u000e~~~~s~~\u0012C~~|~~J > \u0017~~~~~~~~~~w~~44~~~~~~~~~~/7~~~~\u000b > ~~H~~.\u0017R.\u0016~~Ari\u000e~~V~~~~\u0012/_~~~~+j~~~~)\u0007~~~~ X~~ > > PK\u0007\u0008~~\u0012N~~~~\u0001\u0000\u0000\u0001\u0004\u0000\u0000PK\u0001\u0002\u0014\u0000\u0014\u0000\u0008\u0008\u0008\u0000{4}R~~\u0012N~~~~\u0001\u0000\u0000\u0001\u0004\u0000\u0000:\u0000\u0004\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000jddunit/function/DeployCommandRedeployDUnitFunctionB.class~~~~\u0000\u0000PK\u0005\u0006\u0000\u0000\u0000\u0000\u0001\u0000\u0001\u0000l\u0000\u0000\u0000Z\u0002\u0000\u0000\u0000\u0000 > --QiGWXzRKraL1YniEIPl71n011tz_uVFNOIX > Content-Disposition: form-data; name="config" > Content-Type: application/json > ----------------------------------------------------------------------- > Found suspect string in 'dunit_suspect-vm0.log' at line 748 > > PK\u0003\u0004\u0014\u0000\u0008\u0008\u0008\u0000{4}R\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000)\u0000\u0004\u0000DeployCommandRedeployDUnitFunctionA.class~~~~\u0000\u0000~~~~~~n~~@\u0010~~~~~~?~~IhChh~~~~~~~~~~: > ~~\u0012p+B~~\u0012E > EP5P$n~~~~J~~r~~h~~F~~g~~\u0000\u0017P9~~\u0000<\u0014b~~qUp~~H\u000f~~~~w~~~y~~~~~~~~~~~~\u000f\u0000O~~~~~~<~~~~Q/b\u0003~~y~~-b\u000b~~\u0005\u0018~~1P7p~~~~}\u0003~~\u000c~~~~~~\u0013~~\u0019C~~l\u001c3d:~~~~3,~~~~~~_~~~~!~~~~~~~~K;~~1W/F\u000c~~f~~~j~~~~-~~~~~~~~@I~~~~\u000f(O~~0~~~~~~a~~~~k\u001dJ~~~~~\u0012<8~~~~\u0006?~~N~~H~~~~~~~~~~~~~~~~~~s~~~~1~~_ZN~~\u001e#V/~~\u001c%|~~~~{~~~~~~(~~~~~\u000e~~x\u0010~~**~~\u001dC~~~~*1\u0011\u001fy~~~~o~~~~~~\u0019\u0011<o3~~~~Ue~~~~Lm~~~~~~J\u000b\u0003?~~\u000e~~ > ~~~~~~~~S~~~~@~~~~~~FG|\u0014}v~~P3\u0017%~~~~~~P E~~\u0018v~~~~ > ~~~~`~~~~~~?~~2~~~~G\u0006~~%~~~~~~~~%~~~~~~~~~~^ > O~~C > > ~~~~i\u0008~~~~?~~.w~~Y~~\u000c~~~~~~~~~~M~~~~y;~~~~~~K\u0006~~\u001c~~~~~~~~ > > dl~~\u001a8~~~~~~\u0003u1~~~~~~OZB#~~mandRedeployDUnitFunctionA.class~~~~\u0000\u0000PK\u0005\u0006\u0000\u0000\u0000\u0000\u0001\u0000\u0001\u0000[\u0000\u0000\u0000j\u0002\u0000\u0000\u0000\u0000 > --LJjuttIuOfDPN0rzg-XZ5SW8ARyulFpJ > Content-Disposition: form-data; name="config" > Content-Type: application/json > {code} -- This message was sent by Atlassian Jira (v8.20.1#820001)