Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Stop using devtoolset-2 to provide GCC4.8 #2339

Closed
wants to merge 9 commits into from

Conversation

sxa
Copy link
Member

@sxa sxa commented Oct 5, 2021

DRAFT as I don't necessarily want to merge this, but I want to see if it unblocks the playbook execution on CentOS6 (Let's Encrypt failure from people.centos.com)

I don't think 4.8 is needed any more for any releases, as the lines that used it (JDK8/J9/s390x) are superceded by later directives in build.sh

Signed-off-by: Stewart X Addison [email protected]

Checklist
  • commit message has one of the standard prefixes
  • faq.md updated if appropriate
  • other documentation is changed or added (if applicable)
  • playbook changes run through VPC or QPC (if you have access) VPC
  • for inventory.yml changes, bastillion/nagios/jenkins updated accordingly

@sxa
Copy link
Member Author

sxa commented Oct 5, 2021

Looks like the unarchive module doesn't work with the problematic certificates so this isn't going to work sadly ...

TASK [Python2.7 : Install Python2.7 to /usr/local/python2] *********************
FAILED - RETRYING: Install Python2.7 to /usr/local/python2 (3 retries left).
FAILED - RETRYING: Install Python2.7 to /usr/local/python2 (2 retries left).
FAILED - RETRYING: Install Python2.7 to /usr/local/python2 (1 retries left).
fatal: [localhost]: FAILED! => {"attempts": 3, "changed": false, "msg": "Failed to validate the SSL certificate for ci.adoptopenjdk.net:443. Make sure your managed systems have a valid CA certificate installed. If the website serving the url uses SNI you need python >= 2.7.9 on your managed machine  (the python executable used (/usr/bin/python) is version: 2.6.6 (r266:84292, Jun 20 2019, 14:14:55) [GCC 4.4.7 20120313 (Red Hat 4.4.7-23)]) or you can install the `urllib3`, `pyOpenSSL`, `ndg-httpsclient`, and `pyasn1` python modules to perform SNI verification in python >= 2.6. You can use validate_certs=False if you do not need to confirm the servers identity but this is unsafe and not recommended. Paths checked for this platform: /etc/ssl/certs, /etc/pki/ca-trust/extracted/pem, /etc/pki/tls/certs, /usr/share/ca-certificates/cacert.org, /etc/ansible. The exception msg was: [Errno 1] _ssl.c:492: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed."}
	to retry, use: --limit @/ansible/ansible/playbooks/AdoptOpenJDK_Unix_Playbook/main.retry

@sxa
Copy link
Member Author

sxa commented Oct 13, 2021

Superceded by #2344 in order to resolve the certificate problem, but we should considere whether we still need GCC4.8 on the machines going forward.

@sxa
Copy link
Member Author

sxa commented Nov 9, 2021

Closing as #2344 was ultimatley a preferable solution here.

@sxa sxa closed this Nov 9, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant