See <https://builds.apache.org/job/kafka-trunk-jdk8/2708/display/redirect?page=changes>
Changes: [ismael] KAFKA-6841: Support Prefixed ACLs (KIP-290) (#5117) ------------------------------------------ [...truncated 487.01 KB...] kafka.security.auth.SimpleAclAuthorizerTest > testHighConcurrencyDeletionOfResourceAcls STARTED kafka.security.auth.SimpleAclAuthorizerTest > testHighConcurrencyDeletionOfResourceAcls PASSED kafka.security.auth.SimpleAclAuthorizerTest > testNoAclFound STARTED kafka.security.auth.SimpleAclAuthorizerTest > testNoAclFound PASSED kafka.security.auth.SimpleAclAuthorizerTest > testAclInheritance STARTED kafka.security.auth.SimpleAclAuthorizerTest > testAclInheritance PASSED kafka.security.auth.SimpleAclAuthorizerTest > testDistributedConcurrentModificationOfResourceAcls STARTED kafka.security.auth.SimpleAclAuthorizerTest > testDistributedConcurrentModificationOfResourceAcls PASSED kafka.security.auth.SimpleAclAuthorizerTest > testAddAclsOnWildcardResource STARTED kafka.security.auth.SimpleAclAuthorizerTest > testAddAclsOnWildcardResource PASSED kafka.security.auth.SimpleAclAuthorizerTest > testAclManagementAPIs STARTED kafka.security.auth.SimpleAclAuthorizerTest > testAclManagementAPIs PASSED kafka.security.auth.SimpleAclAuthorizerTest > testWildCardAcls STARTED kafka.security.auth.SimpleAclAuthorizerTest > testWildCardAcls PASSED kafka.security.auth.SimpleAclAuthorizerTest > testTopicAcl STARTED kafka.security.auth.SimpleAclAuthorizerTest > testTopicAcl PASSED kafka.security.auth.SimpleAclAuthorizerTest > testSuperUserHasAccess STARTED kafka.security.auth.SimpleAclAuthorizerTest > testSuperUserHasAccess PASSED kafka.security.auth.SimpleAclAuthorizerTest > testDeleteAclOnPrefixedResource STARTED kafka.security.auth.SimpleAclAuthorizerTest > testDeleteAclOnPrefixedResource PASSED kafka.security.auth.SimpleAclAuthorizerTest > testDenyTakesPrecedence STARTED kafka.security.auth.SimpleAclAuthorizerTest > testDenyTakesPrecedence PASSED kafka.security.auth.SimpleAclAuthorizerTest > testNoAclFoundOverride STARTED kafka.security.auth.SimpleAclAuthorizerTest > testNoAclFoundOverride PASSED kafka.security.auth.SimpleAclAuthorizerTest > testDeleteAclOnWildcardResource STARTED kafka.security.auth.SimpleAclAuthorizerTest > testDeleteAclOnWildcardResource PASSED kafka.security.auth.SimpleAclAuthorizerTest > testAccessAllowedIfAllowAclExistsOnPrefixedResource STARTED kafka.security.auth.SimpleAclAuthorizerTest > testAccessAllowedIfAllowAclExistsOnPrefixedResource PASSED kafka.security.auth.SimpleAclAuthorizerTest > testHighConcurrencyModificationOfResourceAcls STARTED kafka.security.auth.SimpleAclAuthorizerTest > testHighConcurrencyModificationOfResourceAcls FAILED java.lang.AssertionError: expected acls: User:36 has Allow permission for operations: Read from hosts: * User:7 has Allow permission for operations: Read from hosts: * User:21 has Allow permission for operations: Read from hosts: * User:39 has Allow permission for operations: Read from hosts: * User:43 has Allow permission for operations: Read from hosts: * User:3 has Allow permission for operations: Read from hosts: * User:35 has Allow permission for operations: Read from hosts: * User:15 has Allow permission for operations: Read from hosts: * User:16 has Allow permission for operations: Read from hosts: * User:22 has Allow permission for operations: Read from hosts: * User:26 has Allow permission for operations: Read from hosts: * User:11 has Allow permission for operations: Read from hosts: * User:38 has Allow permission for operations: Read from hosts: * User:8 has Allow permission for operations: Read from hosts: * User:28 has Allow permission for operations: Read from hosts: * User:32 has Allow permission for operations: Read from hosts: * User:25 has Allow permission for operations: Read from hosts: * User:41 has Allow permission for operations: Read from hosts: * User:44 has Allow permission for operations: Read from hosts: * User:48 has Allow permission for operations: Read from hosts: * User:2 has Allow permission for operations: Read from hosts: * User:9 has Allow permission for operations: Read from hosts: * User:14 has Allow permission for operations: Read from hosts: * User:46 has Allow permission for operations: Read from hosts: * User:13 has Allow permission for operations: Read from hosts: * User:5 has Allow permission for operations: Read from hosts: * User:29 has Allow permission for operations: Read from hosts: * User:45 has Allow permission for operations: Read from hosts: * User:6 has Allow permission for operations: Read from hosts: * User:37 has Allow permission for operations: Read from hosts: * User:23 has Allow permission for operations: Read from hosts: * User:19 has Allow permission for operations: Read from hosts: * User:24 has Allow permission for operations: Read from hosts: * User:17 has Allow permission for operations: Read from hosts: * User:34 has Allow permission for operations: Read from hosts: * User:12 has Allow permission for operations: Read from hosts: * User:42 has Allow permission for operations: Read from hosts: * User:4 has Allow permission for operations: Read from hosts: * User:47 has Allow permission for operations: Read from hosts: * User:18 has Allow permission for operations: Read from hosts: * User:31 has Allow permission for operations: Read from hosts: * User:49 has Allow permission for operations: Read from hosts: * User:33 has Allow permission for operations: Read from hosts: * User:1 has Allow permission for operations: Read from hosts: * User:27 has Allow permission for operations: Read from hosts: * but got: User:36 has Allow permission for operations: Read from hosts: * User:7 has Allow permission for operations: Read from hosts: * User:21 has Allow permission for operations: Read from hosts: * User:39 has Allow permission for operations: Read from hosts: * User:43 has Allow permission for operations: Read from hosts: * User:3 has Allow permission for operations: Read from hosts: * User:35 has Allow permission for operations: Read from hosts: * User:15 has Allow permission for operations: Read from hosts: * User:16 has Allow permission for operations: Read from hosts: * User:22 has Allow permission for operations: Read from hosts: * User:26 has Allow permission for operations: Read from hosts: * User:11 has Allow permission for operations: Read from hosts: * User:38 has Allow permission for operations: Read from hosts: * User:8 has Allow permission for operations: Read from hosts: * User:28 has Allow permission for operations: Read from hosts: * User:32 has Allow permission for operations: Read from hosts: * User:25 has Allow permission for operations: Read from hosts: * User:41 has Allow permission for operations: Read from hosts: * User:44 has Allow permission for operations: Read from hosts: * User:48 has Allow permission for operations: Read from hosts: * User:2 has Allow permission for operations: Read from hosts: * User:9 has Allow permission for operations: Read from hosts: * User:14 has Allow permission for operations: Read from hosts: * User:46 has Allow permission for operations: Read from hosts: * User:13 has Allow permission for operations: Read from hosts: * User:5 has Allow permission for operations: Read from hosts: * User:29 has Allow permission for operations: Read from hosts: * User:45 has Allow permission for operations: Read from hosts: * User:6 has Allow permission for operations: Read from hosts: * User:37 has Allow permission for operations: Read from hosts: * User:23 has Allow permission for operations: Read from hosts: * User:19 has Allow permission for operations: Read from hosts: * User:24 has Allow permission for operations: Read from hosts: * User:17 has Allow permission for operations: Read from hosts: * User:34 has Allow permission for operations: Read from hosts: * User:12 has Allow permission for operations: Read from hosts: * User:42 has Allow permission for operations: Read from hosts: * User:4 has Allow permission for operations: Read from hosts: * User:47 has Allow permission for operations: Read from hosts: * User:18 has Allow permission for operations: Read from hosts: * User:31 has Allow permission for operations: Read from hosts: * User:49 has Allow permission for operations: Read from hosts: * User:33 has Allow permission for operations: Read from hosts: * User:27 has Allow permission for operations: Read from hosts: * at kafka.utils.TestUtils$.fail(TestUtils.scala:354) at kafka.utils.TestUtils$.waitUntilTrue(TestUtils.scala:802) at kafka.utils.TestUtils$.waitAndVerifyAcls(TestUtils.scala:1147) at kafka.security.auth.SimpleAclAuthorizerTest.testHighConcurrencyModificationOfResourceAcls(SimpleAclAuthorizerTest.scala:362) kafka.security.auth.SimpleAclAuthorizerTest > testDeleteAllAclOnPrefixedResource STARTED kafka.security.auth.SimpleAclAuthorizerTest > testDeleteAllAclOnPrefixedResource PASSED kafka.security.auth.SimpleAclAuthorizerTest > testAddAclsOnLiteralResource STARTED kafka.security.auth.SimpleAclAuthorizerTest > testAddAclsOnLiteralResource PASSED kafka.security.auth.SimpleAclAuthorizerTest > testAuthorizeThrowsOnNoneLiteralResource STARTED kafka.security.auth.SimpleAclAuthorizerTest > testAuthorizeThrowsOnNoneLiteralResource PASSED kafka.security.auth.SimpleAclAuthorizerTest > testGetAclsPrincipal STARTED kafka.security.auth.SimpleAclAuthorizerTest > testGetAclsPrincipal PASSED kafka.security.auth.SimpleAclAuthorizerTest > testAddAclsOnPrefiexedResource STARTED kafka.security.auth.SimpleAclAuthorizerTest > testAddAclsOnPrefiexedResource PASSED kafka.security.auth.SimpleAclAuthorizerTest > testAccessAllowedIfAllowAclExistsOnWildcardResource STARTED kafka.security.auth.SimpleAclAuthorizerTest > testAccessAllowedIfAllowAclExistsOnWildcardResource PASSED kafka.security.auth.SimpleAclAuthorizerTest > testLoadCache STARTED kafka.security.auth.SimpleAclAuthorizerTest > testLoadCache PASSED kafka.security.auth.AclTest > testAclJsonConversion STARTED kafka.security.auth.AclTest > testAclJsonConversion PASSED kafka.security.auth.ZkAuthorizationTest > testIsZkSecurityEnabled STARTED kafka.security.auth.ZkAuthorizationTest > testIsZkSecurityEnabled PASSED kafka.security.auth.ZkAuthorizationTest > testZkUtils STARTED kafka.security.auth.ZkAuthorizationTest > testZkUtils PASSED kafka.security.auth.ZkAuthorizationTest > testZkAntiMigration STARTED kafka.security.auth.ZkAuthorizationTest > testZkAntiMigration PASSED kafka.security.auth.ZkAuthorizationTest > testZkMigration STARTED kafka.security.auth.ZkAuthorizationTest > testZkMigration PASSED kafka.security.auth.ZkAuthorizationTest > testChroot STARTED kafka.security.auth.ZkAuthorizationTest > testChroot PASSED kafka.security.auth.ZkAuthorizationTest > testDelete STARTED kafka.security.auth.ZkAuthorizationTest > testDelete PASSED kafka.security.auth.ZkAuthorizationTest > testDeleteRecursive STARTED kafka.security.auth.ZkAuthorizationTest > testDeleteRecursive PASSED 2063 tests completed, 1 failed, 5 skipped > Task :kafka-trunk-jdk8:core:test FAILED > Task :test_core_2_11 FAILED FAILURE: Build failed with an exception. * What went wrong: Execution failed for task ':kafka-trunk-jdk8:core:test'. > There were failing tests. See the report at: > file://<https://builds.apache.org/job/kafka-trunk-jdk8/ws/core/build/reports/tests/test/index.html> * Try: Run with --stacktrace option to get the stack trace. Run with --info or --debug option to get more log output. Run with --scan to get full insights. * Get more help at https://help.gradle.org BUILD FAILED in 1h 54m 13s 25 actionable tasks: 3 executed, 22 up-to-date Build step 'Execute shell' marked build as failure [FINDBUGS] Collecting findbugs analysis files... Setting GRADLE_4_4_HOME=/home/jenkins/tools/gradle/4.4 [FINDBUGS] Searching for all files in <https://builds.apache.org/job/kafka-trunk-jdk8/ws/> that match the pattern **/build/reports/findbugs/*.xml [FINDBUGS] Parsing 1 file in <https://builds.apache.org/job/kafka-trunk-jdk8/ws/> [FINDBUGS] Successfully parsed file <https://builds.apache.org/job/kafka-trunk-jdk8/ws/core/build/reports/findbugs/main.xml> with 0 unique warnings and 0 duplicates. Setting GRADLE_4_4_HOME=/home/jenkins/tools/gradle/4.4 Setting GRADLE_4_4_HOME=/home/jenkins/tools/gradle/4.4 <Git Blamer> Using GitBlamer to create author and commit information for all warnings. <Git Blamer> GIT_COMMIT=b3aa655a70d92fedfebd32cf469a87b45766fc59, workspace=<https://builds.apache.org/job/kafka-trunk-jdk8/ws/> [FINDBUGS] Computing warning deltas based on reference build #2707 Recording test results Setting GRADLE_4_4_HOME=/home/jenkins/tools/gradle/4.4 Setting GRADLE_4_4_HOME=/home/jenkins/tools/gradle/4.4 Not sending mail to unregistered user ism...@juma.me.uk