Uploaded image for project: 'HBase'
  1. HBase
  2. HBASE-22852

hbase nightlies leaking gpg-agents

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Resolved
    • Minor
    • Resolution: Fixed
    • None
    • 3.0.0-alpha-1, 2.3.0, 2.2.1, 2.1.7
    • build
    • None

    Description

      FYI, just triggered yetus master, which includes code to find and kill long-running processes still attached to the Jenkins workspace directory. It came up with this:

      https://builds.apache.org/view/S-Z/view/Yetus/job/yetus-github-multibranch/job/master/134/console

      USER       PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
       jenkins    752  0.0  0.0  93612   584 ?        Ss   Aug12   0:00 gpg-agent --homedir /home/jenkins/jenkins-slave/workspace/HBase_Nightly_HBASE-20952/downloads-hadoop-2/.gpg --use-standard-socket --daemon
       Killing 752 ***
      

      (repeat 10s of times, which slightly different dates, pids, versions, etc)

      Also, be aware that any other process running on the node (such as the other executor) has extremely easy access to whatever gpg creds you are using...

      Attachments

        Issue Links

          Activity

            People

              shahrs87 Rushabh Shah
              aw Allen Wittenauer
              Votes:
              0 Vote for this issue
              Watchers:
              6 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: