Bug#906051: init-system-helpers breaks puppet autopkgtest: puppet service not running

Paul Gevers elbrus at debian.org
Mon Aug 13 16:53:57 BST 2018


Source: puppet, init-system-helpers
Version: init-system-helpers/1.52
Version: puppet/5.5.3-1
User: debian-ci at lists.debian.org
Usertags: breaks needs-update regression

Dear maintainers,

With a recent upload of init-system-helpers the autpkgtest of puppet
started to fail in testing (unstable has been failing longer due to the
unfinished leatherman transition). I copied the output below.

Currently this regression is contributing to delaying the migration of
init-system-helpers to testing by 13 days (the other is the regression
of its own test). Could you please investigate the situation and
assign the bug to the right package? If needed, please change severity
as appropriate.

More information about this bug and the reason for filing it can be
found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

https://ci.debian.net/data/autopkgtest/testing/amd64/p/puppet/810497/log.gz

autopkgtest [08:09:22]: test command2: cd debian/tests && rspec
spec/puppet-master/*_spec.rb
autopkgtest [08:09:22]: test command2: [-----------------------

Package "puppet-master"
  should be installed

Service "puppet-master"
  should be enabled
  should be running (FAILED - 1)

Port "8140"
  should be listening with tcp (FAILED - 2)

Command "puppet cert print $(hostname --fqdn)"
  exit_status
    should eq 0 (FAILED - 3)
  stdout
    should match /X509v3 Subject Alternative Name/ (FAILED - 4)

Command "puppet resource host puppet ip=127.0.81.40"
  exit_status
    should eq 0

Command "puppet cert generate agent.example.com"
  exit_status
    should eq 0
  stdout
    should contain "Signed certificate request for agent.example.com"

Command "puppet agent --enable"
  exit_status
    should eq 0

Command "puppet agent --test --certname agent.example.com"
  exit_status
    should eq 0 (FAILED - 5)
  stdout
    should contain "Caching catalog for agent.example.com" (FAILED - 6)

Failures:

  1) Service "puppet-master" should be running
     Failure/Error: it { should be_running }
       expected Service "puppet-master" to be running
       /bin/sh -c service\ puppet-master\ status
       * puppet-master.service - Puppet master
   Loaded: loaded (/lib/systemd/system/puppet-master.service; enabled;
vendor preset: enabled)
   Active: inactive (dead)
     Docs: man:puppet-master(8)

     # ./spec/puppet-master/install_spec.rb:9:in `block (2 levels) in
<top (required)>'

  2) Port "8140" should be listening with tcp
     Failure/Error: it { should be_listening.with('tcp') }
       expected Port "8140" to be listening with tcp
       /bin/sh -c netstat\ -tunl\ \|\ grep\ --\ \\\^tcp\\\ .\\\*:8140\\\

     # ./spec/puppet-master/install_spec.rb:13:in `block (2 levels) in
<top (required)>'

  3) Command "puppet cert print $(hostname --fqdn)" exit_status should eq 0
     Failure/Error: its(:exit_status) { should eq 0 }

       expected: 0
            got: 24

       (compared using ==)
       /bin/sh -c puppet\ cert\ print\ \$\(hostname\ --fqdn\)
       Notice: Signed certificate request for ca

     # ./spec/puppet-master/install_spec.rb:17:in `block (2 levels) in
<top (required)>'

  4) Command "puppet cert print $(hostname --fqdn)" stdout should match
/X509v3 Subject Alternative Name/
     Failure/Error: its(:stdout) { should match( /X509v3 Subject
Alternative Name/) }
       expected "\e[mNotice: Signed certificate request for ca\e[0m\n"
to match /X509v3 Subject Alternative Name/
       Diff:
       @@ -1,2 +1,2 @@
       -/X509v3 Subject Alternative Name/
       +Notice: Signed certificate request for ca

     # ./spec/puppet-master/install_spec.rb:18:in `block (2 levels) in
<top (required)>'

  5) Command "puppet agent --test --certname agent.example.com"
exit_status should eq 0
     Failure/Error: its(:exit_status) { should eq 0 }

       expected: 0
            got: 1

       (compared using ==)
       /bin/sh -c puppet\ agent\ --test\ --certname\ agent.example.com
       Info: Retrieving pluginfacts
Info: Retrieving plugin

     # ./spec/puppet-master/use_spec.rb:17:in `block (2 levels) in <top
(required)>'

  6) Command "puppet agent --test --certname agent.example.com" stdout
should contain "Caching catalog for agent.example.com"
     Failure/Error: its(:stdout) { should contain('Caching catalog for
agent.example.com') }
       expected "\e[0;32mInfo: Retrieving
pluginfacts\e[0m\n\e[0;32mInfo: Retrieving plugin\e[0m\n" to contain
"Caching catalog for agent.example.com"

     # ./spec/puppet-master/use_spec.rb:18:in `block (2 levels) in <top
(required)>'

Finished in 11.1 seconds (files took 0.38659 seconds to load)
12 examples, 6 failures

Failed examples:

rspec ./spec/puppet-master/install_spec.rb:9 # Service "puppet-master"
should be running
rspec ./spec/puppet-master/install_spec.rb:13 # Port "8140" should be
listening with tcp
rspec ./spec/puppet-master/install_spec.rb:17 # Command "puppet cert
print $(hostname --fqdn)" exit_status should eq 0
rspec ./spec/puppet-master/install_spec.rb:18 # Command "puppet cert
print $(hostname --fqdn)" stdout should match /X509v3 Subject
Alternative Name/
rspec ./spec/puppet-master/use_spec.rb:17 # Command "puppet agent --test
--certname agent.example.com" exit_status should eq 0
rspec ./spec/puppet-master/use_spec.rb:18 # Command "puppet agent --test
--certname agent.example.com" stdout should contain "Caching catalog for
agent.example.com"

autopkgtest [08:09:34]: test command2: -----------------------]

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: OpenPGP digital signature
URL: <http://alioth-lists.debian.net/pipermail/pkg-systemd-maintainers/attachments/20180813/635edfa8/attachment.sig>


More information about the Pkg-systemd-maintainers mailing list