Geode unit tests completed in 'develop/DistributedTest' with non-zero exit code

2018-02-23 Thread apachegeodeci
Pipeline results can be found at: Concourse: https://concourse.apachegeode-ci.info/teams/main/pipelines/develop/jobs/DistributedTest/builds/162

Re: [Proposal] Thread monitoring mechanism

2018-02-23 Thread Anilkumar Gingade
Good idea, we need better tools (echo systems) to manage/monitor Geode resources. In Geode many times the work is handed to other low-level threads (messaging) or new threads/runnables; it will be nice to have some mechanism to associate main work-thread to low level thread; that will give better i

Geode unit tests completed in 'develop/FlakyTest' with non-zero exit code

2018-02-23 Thread apachegeodeci
Pipeline results can be found at: Concourse: https://concourse.apachegeode-ci.info/teams/main/pipelines/develop/jobs/FlakyTest/builds/254

Re: [Proposal] Thread monitoring mechanism

2018-02-23 Thread Barry Oglesby
A lot of the Geode thread pools are defined in ClusterDistributionManager. Most of these use custom ThreadPoolExecutors like: SerialQueuedExecutorWithDMStats PooledExecutorWithDMStats FunctionExecutionPooledExecutor These classes all extend ThreadPoolExecutor and override beforeExecute and afterE

[Spring CI] Spring Data GemFire > Nightly-ApacheGeode > #837 was SUCCESSFUL (with 2331 tests)

2018-02-23 Thread Spring CI
--- Spring Data GemFire > Nightly-ApacheGeode > #837 was successful. --- Scheduled 2333 tests in total. https://build.spring.io/browse/SGF-NAG-837/ -- This

[SECURITY] CVE-2017-15693 Apache Geode unsafe deserialization of application objects

2018-02-23 Thread Anthony Baker
CVE-2017-15693 Apache Geode unsafe deserialization of application objects Severity: Important Vendor: The Apache Software Foundation Versions Affected: Apache Geode 1.0.0 through 1.3.0 Description: The Geode server stores application objects in serialized form. Certain cluster operations and

[SECURITY] CVE-2017-15692 Apache Geode unsafe deserialization in TcpServer

2018-02-23 Thread Anthony Baker
CVE-2017-15692 Apache Geode unsafe deserialization in TcpServer Severity: Important Vendor: The Apache Software Foundation Versions Affected: Apache Geode 1.0.0 through 1.3.0 Description: The TcpServer within the Geode locator opens a network port that deserializes data. If an unprivileged u

Geode unit tests completed in 'develop/DistributedTest' with non-zero exit code

2018-02-23 Thread apachegeodeci
Pipeline results can be found at: Concourse: https://concourse.apachegeode-ci.info/teams/main/pipelines/develop/jobs/DistributedTest/builds/159

Broken: jinmeiliao/geode#236 (createRegion - ae94531)

2018-02-23 Thread Travis CI
Build Update for jinmeiliao/geode - Build: #236 Status: Broken Duration: 16 minutes and 56 seconds Commit: ae94531 (createRegion) Author: Jinmei Liao Message: add security test View the changeset: https://github.com/jinmeiliao/geode/compare/04079fe98af7...ae9

Broken: apache/geode#6352 (develop - 804ecfa)

2018-02-23 Thread Travis CI
Build Update for apache/geode - Build: #6352 Status: Broken Duration: 20 minutes and 2 seconds Commit: 804ecfa (develop) Author: jinmeiliao Message: GEODE-4625: name collision check when create region through gfsh (#1483) View the changeset: https://github.c