Uploaded image for project: 'HBase'
  1. HBase
  2. HBASE-22852

hbase nightlies leaking gpg-agents

    XMLWordPrintableJSON

    Details

    • Type: Bug
    • Status: Resolved
    • Priority: Minor
    • Resolution: Fixed
    • Affects Version/s: None
    • Fix Version/s: 3.0.0, 2.3.0, 2.2.1, 2.1.7
    • Component/s: build
    • Labels:
      None

      Description

      FYI, just triggered yetus master, which includes code to find and kill long-running processes still attached to the Jenkins workspace directory. It came up with this:

      https://builds.apache.org/view/S-Z/view/Yetus/job/yetus-github-multibranch/job/master/134/console

      USER       PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
       jenkins    752  0.0  0.0  93612   584 ?        Ss   Aug12   0:00 gpg-agent --homedir /home/jenkins/jenkins-slave/workspace/HBase_Nightly_HBASE-20952/downloads-hadoop-2/.gpg --use-standard-socket --daemon
       Killing 752 ***
      

      (repeat 10s of times, which slightly different dates, pids, versions, etc)

      Also, be aware that any other process running on the node (such as the other executor) has extremely easy access to whatever gpg creds you are using...

        Attachments

          Issue Links

            Activity

              People

              • Assignee:
                shahrs87 Rushabh Shah
                Reporter:
                aw Allen Wittenauer
              • Votes:
                0 Vote for this issue
                Watchers:
                6 Start watching this issue

                Dates

                • Created:
                  Updated:
                  Resolved: