File size: 76,762 Bytes
1ee64fa
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
travis_fold:start:worker_info
Worker information
hostname: 23307b2b-bb95-4c57-bda9-a824f6b4500c@1.i-04da5bb-production-2-worker-org-ec2.travisci.net
version: v3.8.0 https://github.com/travis-ci/worker/tree/cccff7c89da7ba0cf47a90e5615266a45b372e30
instance: c56610e travisci/ci-amethyst:packer-1512508255-986baf0 (via amqp)
startup: 400.729994ms
travis_fold:end:worker_info
travis_fold:start:system_info
Build system information
Build language: perl
Build group: stable
Build dist: trusty
Build id: 388281863
Job id: 388281864
Runtime kernel version: 4.14.12-041412-generic
travis-build version: 23b9e15b3
Build image provisioning date and time
Tue Dec  5 21:48:10 UTC 2017
Operating System Details
Distributor ID:	Ubuntu
Description:	Ubuntu 14.04.5 LTS
Release:	14.04
Codename:	trusty
Cookbooks Version
7c2c6a6 https://github.com/travis-ci/travis-cookbooks/tree/7c2c6a6
git version
git version 2.15.1
bash version
GNU bash, version 4.3.11(1)-release (x86_64-pc-linux-gnu)
gcc version
gcc (Ubuntu 4.8.4-2ubuntu1~14.04.3) 4.8.4
Copyright (C) 2013 Free Software Foundation, Inc.
This is free software; see the source for copying conditions.  There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
docker version
Client:
 Version:      17.09.0-ce
 API version:  1.32
 Go version:   go1.8.3
 Git commit:   afdb6d4
 Built:        Tue Sep 26 22:39:28 2017
 OS/Arch:      linux/amd64
clang version
clang version 5.0.0 (tags/RELEASE_500/final)
Target: x86_64-unknown-linux-gnu
Thread model: posix
InstalledDir: /usr/local/clang-5.0.0/bin
jq version
jq-1.5
bats version
Bats 0.4.0
shellcheck version
0.4.6
shfmt version
v2.0.0
ccache version
ccache version 3.1.9
Copyright (C) 2002-2007 Andrew Tridgell
Copyright (C) 2009-2011 Joel Rosdahl
This program is free software; you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by the Free Software
Foundation; either version 3 of the License, or (at your option) any later
version.
cmake version
cmake version 3.9.2
CMake suite maintained and supported by Kitware (kitware.com/cmake).
heroku version
heroku-cli/6.14.39-addc925 (linux-x64) node-v9.2.0
imagemagick version
Version: ImageMagick 6.7.7-10 2017-07-31 Q16 http://www.imagemagick.org
md5deep version
4.2
mercurial version
Mercurial Distributed SCM (version 4.2.2)
(see https://mercurial-scm.org for more information)
Copyright (C) 2005-2017 Matt Mackall and others
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
mysql version
mysql  Ver 14.14 Distrib 5.6.33, for debian-linux-gnu (x86_64) using  EditLine wrapper
openssl version
OpenSSL 1.0.1f 6 Jan 2014
packer version
Packer v1.0.2
Your version of Packer is out of date! The latest version
is 1.1.2. You can update by downloading from www.packer.io
postgresql client version
psql (PostgreSQL) 9.6.6
ragel version
Ragel State Machine Compiler version 6.8 Feb 2013
Copyright (c) 2001-2009 by Adrian Thurston
subversion version
svn, version 1.8.8 (r1568071)
   compiled Aug 10 2017, 17:20:39 on x86_64-pc-linux-gnu
Copyright (C) 2013 The Apache Software Foundation.
This software consists of contributions made by many people;
see the NOTICE file for more information.
Subversion is open source software, see http://subversion.apache.org/
The following repository access (RA) modules are available:
* ra_svn : Module for accessing a repository using the svn network protocol.
  - with Cyrus SASL authentication
  - handles 'svn' scheme
* ra_local : Module for accessing a repository on local disk.
  - handles 'file' scheme
* ra_serf : Module for accessing a repository via WebDAV protocol using serf.
  - using serf 1.3.3
  - handles 'http' scheme
  - handles 'https' scheme
sudo version
Sudo version 1.8.9p5
Configure options: --prefix=/usr -v --with-all-insults --with-pam --with-fqdn --with-logging=syslog --with-logfac=authpriv --with-env-editor --with-editor=/usr/bin/editor --with-timeout=15 --with-password-timeout=0 --with-passprompt=[sudo] password for %p:  --without-lecture --with-tty-tickets --disable-root-mailer --enable-admin-flag --with-sendmail=/usr/sbin/sendmail --with-timedir=/var/lib/sudo --mandir=/usr/share/man --libexecdir=/usr/lib/sudo --with-sssd --with-sssd-lib=/usr/lib/x86_64-linux-gnu --with-selinux
Sudoers policy plugin version 1.8.9p5
Sudoers file grammar version 43
Sudoers path: /etc/sudoers
Authentication methods: 'pam'
Syslog facility if syslog is being used for logging: authpriv
Syslog priority to use when user authenticates successfully: notice
Syslog priority to use when user authenticates unsuccessfully: alert
Send mail if the user is not in sudoers
Use a separate timestamp for each user/tty combo
Lecture user the first time they run sudo
Root may run sudo
Allow some information gathering to give useful error messages
Require fully-qualified hostnames in the sudoers file
Visudo will honor the EDITOR environment variable
Set the LOGNAME and USER environment variables
Length at which to wrap log file lines (0 for no wrap): 80
Authentication timestamp timeout: 15.0 minutes
Password prompt timeout: 0.0 minutes
Number of tries to enter a password: 3
Umask to use or 0777 to use user's: 022
Path to mail program: /usr/sbin/sendmail
Flags for mail program: -t
Address to send mail to: root
Subject line for mail messages: *** SECURITY information for %h ***
Incorrect password message: Sorry, try again.
Path to authentication timestamp dir: /var/lib/sudo
Default password prompt: [sudo] password for %p: 
Default user to run commands as: root
Value to override user's $PATH with: /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin
Path to the editor for use by visudo: /usr/bin/editor
When to require a password for 'list' pseudocommand: any
When to require a password for 'verify' pseudocommand: all
File descriptors >= 3 will be closed before executing a command
Environment variables to check for sanity:
	TZ
	TERM
	LINGUAS
	LC_*
	LANGUAGE
	LANG
	COLORTERM
Environment variables to remove:
	RUBYOPT
	RUBYLIB
	PYTHONUSERBASE
	PYTHONINSPECT
	PYTHONPATH
	PYTHONHOME
	TMPPREFIX
	ZDOTDIR
	READNULLCMD
	NULLCMD
	FPATH
	PERL5DB
	PERL5OPT
	PERL5LIB
	PERLLIB
	PERLIO_DEBUG 
	JAVA_TOOL_OPTIONS
	SHELLOPTS
	GLOBIGNORE
	PS4
	BASH_ENV
	ENV
	TERMCAP
	TERMPATH
	TERMINFO_DIRS
	TERMINFO
	_RLD*
	LD_*
	PATH_LOCALE
	NLSPATH
	HOSTALIASES
	RES_OPTIONS
	LOCALDOMAIN
	CDPATH
	IFS
Environment variables to preserve:
	JAVA_HOME
	TRAVIS
	CI
	DEBIAN_FRONTEND
	XAUTHORIZATION
	XAUTHORITY
	PS2
	PS1
	PATH
	LS_COLORS
	KRB5CCNAME
	HOSTNAME
	HOME
	DISPLAY
	COLORS
Locale to use while parsing sudoers: C
Directory in which to store input/output logs: /var/log/sudo-io
File in which to store the input/output log: %{seq}
Add an entry to the utmp/utmpx file when allocating a pty
PAM service name to use
PAM service name to use for login shells
Create a new PAM session for the command to run in
Maximum I/O log sequence number: 0
Local IP address and netmask pairs:
	172.17.0.2/255.255.0.0
Sudoers I/O plugin version 1.8.9p5
gzip version
gzip 1.6
Copyright (C) 2007, 2010, 2011 Free Software Foundation, Inc.
Copyright (C) 1993 Jean-loup Gailly.
This is free software.  You may redistribute copies of it under the terms of
the GNU General Public License <http://www.gnu.org/licenses/gpl.html>.
There is NO WARRANTY, to the extent permitted by law.
Written by Jean-loup Gailly.
zip version
Copyright (c) 1990-2008 Info-ZIP - Type 'zip "-L"' for software license.
This is Zip 3.0 (July 5th 2008), by Info-ZIP.
Currently maintained by E. Gordon.  Please send bug reports to
the authors using the web page at www.info-zip.org; see README for details.
Latest sources and executables are at ftp://ftp.info-zip.org/pub/infozip,
as of above date; see http://www.info-zip.org/ for other sites.
Compiled with gcc 4.8.2 for Unix (Linux ELF) on Oct 21 2013.
Zip special compilation options:
	USE_EF_UT_TIME       (store Universal Time)
	BZIP2_SUPPORT        (bzip2 library version 1.0.6, 6-Sept-2010)
	    bzip2 code and library copyright (c) Julian R Seward
	    (See the bzip2 license for terms of use)
	SYMLINK_SUPPORT      (symbolic links supported)
	LARGE_FILE_SUPPORT   (can read and write large files on file system)
	ZIP64_SUPPORT        (use Zip64 to store large files in archives)
	UNICODE_SUPPORT      (store and read UTF-8 Unicode paths)
	STORE_UNIX_UIDs_GIDs (store UID/GID sizes/values using new extra field)
	UIDGID_NOT_16BIT     (old Unix 16-bit UID/GID extra field not used)
	[encryption, version 2.91 of 05 Jan 2007] (modified for Zip 3)
Encryption notice:
	The encryption code of this program is not copyrighted and is
	put in the public domain.  It was originally written in Europe
	and, to the best of our knowledge, can be freely distributed
	in both source and object forms from any country, including
	the USA under License Exception TSU of the U.S. Export
	Administration Regulations (section 740.13(e)) of 6 June 2002.
Zip environment options:
             ZIP:  [none]
          ZIPOPT:  [none]
vim version
VIM - Vi IMproved 7.4 (2013 Aug 10, compiled Nov 24 2016 16:43:18)
Included patches: 1-52
Extra patches: 8.0.0056
Modified by [email protected]
Compiled by buildd@
Huge version without GUI.  Features included (+) or not (-):
+acl             +farsi           +mouse_netterm   +syntax
+arabic          +file_in_path    +mouse_sgr       +tag_binary
+autocmd         +find_in_path    -mouse_sysmouse  +tag_old_static
-balloon_eval    +float           +mouse_urxvt     -tag_any_white
-browse          +folding         +mouse_xterm     -tcl
++builtin_terms  -footer          +multi_byte      +terminfo
+byte_offset     +fork()          +multi_lang      +termresponse
+cindent         +gettext         -mzscheme        +textobjects
-clientserver    -hangul_input    +netbeans_intg   +title
-clipboard       +iconv           +path_extra      -toolbar
+cmdline_compl   +insert_expand   -perl            +user_commands
+cmdline_hist    +jumplist        +persistent_undo +vertsplit
+cmdline_info    +keymap          +postscript      +virtualedit
+comments        +langmap         +printer         +visual
+conceal         +libcall         +profile         +visualextra
+cryptv          +linebreak       +python          +viminfo
+cscope          +lispindent      -python3         +vreplace
+cursorbind      +listcmds        +quickfix        +wildignore
+cursorshape     +localmap        +reltime         +wildmenu
+dialog_con      -lua             +rightleft       +windows
+diff            +menu            -ruby            +writebackup
+digraphs        +mksession       +scrollbind      -X11
-dnd             +modify_fname    +signs           -xfontset
-ebcdic          +mouse           +smartindent     -xim
+emacs_tags      -mouseshape      -sniff           -xsmp
+eval            +mouse_dec       +startuptime     -xterm_clipboard
+ex_extra        +mouse_gpm       +statusline      -xterm_save
+extra_search    -mouse_jsbterm   -sun_workshop    -xpm
   system vimrc file: "$VIM/vimrc"
     user vimrc file: "$HOME/.vimrc"
 2nd user vimrc file: "~/.vim/vimrc"
      user exrc file: "$HOME/.exrc"
  fall-back for $VIM: "/usr/share/vim"
Compilation: gcc -c -I. -Iproto -DHAVE_CONFIG_H     -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=1      
Linking: gcc   -Wl,-Bsymbolic-functions -Wl,-z,relro -Wl,--as-needed -o vim        -lm -ltinfo -lnsl  -lselinux  -lacl -lattr -lgpm -ldl    -L/usr/lib/python2.7/config-x86_64-linux-gnu -lpython2.7 -lpthread -ldl -lutil -lm -Xlinker -export-dynamic -Wl,-O1 -Wl,-Bsymbolic-functions      
iptables version
iptables v1.4.21
curl version
curl 7.35.0 (x86_64-pc-linux-gnu) libcurl/7.35.0 OpenSSL/1.0.1f zlib/1.2.8 libidn/1.28 librtmp/2.3
wget version
GNU Wget 1.15 built on linux-gnu.
rsync version
rsync  version 3.1.0  protocol version 31
gimme version
v1.2.0
nvm version
0.33.6
perlbrew version
/home/travis/perl5/perlbrew/bin/perlbrew  - App::perlbrew/0.80
phpenv version
rbenv 1.1.1-25-g6aa70b6
rvm version
rvm 1.29.3 (latest) by Michal Papis, Piotr Kuczynski, Wayne E. Seguin [https://rvm.io]
default ruby version
ruby 2.4.1p111 (2017-03-22 revision 58053) [x86_64-linux]
CouchDB version
couchdb 1.6.1
ElasticSearch version
5.5.0
Installed Firefox version
firefox 56.0.2
MongoDB version
MongoDB 3.4.10
PhantomJS version
2.1.1
Pre-installed PostgreSQL versions
9.2.24
9.3.20
9.4.15
9.5.10
9.6.6
RabbitMQ Version
3.6.14
Redis version
redis-server 4.0.6
riak version
2.2.3
kerl list installations
19.0
18.3
kiex list
kiex elixirs
   elixir-1.2.6
=* elixir-1.3.2
# => - current
# =* - current && default
#  * - default
rebar --version
rebar 2.6.4 17 20160831_145136 git 2.6.4-dirty
perlbrew list
  5.22 (5.22.0)
  5.22.0
  5.22-extras (5.22.4)
  5.22-shrplib (5.22.4)
  5.22.4
  5.24 (5.24.0)
  5.24.0
  5.24-extras (5.24.3)
  5.24-shrplib (5.24.3)
  5.24.3
travis_fold:end:system_info
Network availability confirmed.
travis_fold:start:git.checkout
travis_time:start:0be281cc
$ git clone --depth=50 --branch=master https://github.com/major/MySQLTuner-perl.git major/MySQLTuner-perl
Cloning into 'major/MySQLTuner-perl'...
remote: Counting objects: 709, done.
remote: Compressing objects:   0% (1/344)   
remote: Compressing objects:   1% (4/344)   
remote: Compressing objects:   2% (7/344)   
remote: Compressing objects:   3% (11/344)   
remote: Compressing objects:   4% (14/344)   
remote: Compressing objects:   5% (18/344)   
remote: Compressing objects:   6% (21/344)   
remote: Compressing objects:   7% (25/344)   
remote: Compressing objects:   8% (28/344)   
remote: Compressing objects:   9% (31/344)   
remote: Compressing objects:  10% (35/344)   
remote: Compressing objects:  11% (38/344)   
remote: Compressing objects:  12% (42/344)   
remote: Compressing objects:  13% (45/344)   
remote: Compressing objects:  14% (49/344)   
remote: Compressing objects:  15% (52/344)   
remote: Compressing objects:  16% (56/344)   
remote: Compressing objects:  17% (59/344)   
remote: Compressing objects:  18% (62/344)   
remote: Compressing objects:  19% (66/344)   
remote: Compressing objects:  20% (69/344)   
remote: Compressing objects:  21% (73/344)   
remote: Compressing objects:  22% (76/344)   
remote: Compressing objects:  23% (80/344)   
remote: Compressing objects:  24% (83/344)   
remote: Compressing objects:  25% (86/344)   
remote: Compressing objects:  26% (90/344)   
remote: Compressing objects:  27% (93/344)   
remote: Compressing objects:  28% (97/344)   
remote: Compressing objects:  29% (100/344)   
remote: Compressing objects:  30% (104/344)   
remote: Compressing objects:  31% (107/344)   
remote: Compressing objects:  32% (111/344)   
remote: Compressing objects:  33% (114/344)   
remote: Compressing objects:  34% (117/344)   
remote: Compressing objects:  35% (121/344)   
remote: Compressing objects:  36% (124/344)   
remote: Compressing objects:  37% (128/344)   
remote: Compressing objects:  38% (131/344)   
remote: Compressing objects:  39% (135/344)   
remote: Compressing objects:  40% (138/344)   
remote: Compressing objects:  41% (142/344)   
remote: Compressing objects:  42% (145/344)   
remote: Compressing objects:  43% (148/344)   
remote: Compressing objects:  44% (152/344)   
remote: Compressing objects:  45% (155/344)   
remote: Compressing objects:  46% (159/344)   
remote: Compressing objects:  47% (162/344)   
remote: Compressing objects:  48% (166/344)   
remote: Compressing objects:  49% (169/344)   
remote: Compressing objects:  50% (172/344)   
remote: Compressing objects:  51% (176/344)   
remote: Compressing objects:  52% (179/344)   
remote: Compressing objects:  53% (183/344)   
remote: Compressing objects:  54% (186/344)   
remote: Compressing objects:  55% (190/344)   
remote: Compressing objects:  56% (193/344)   
remote: Compressing objects:  57% (197/344)   
remote: Compressing objects:  58% (200/344)   
remote: Compressing objects:  59% (203/344)   
remote: Compressing objects:  60% (207/344)   
remote: Compressing objects:  61% (210/344)   
remote: Compressing objects:  62% (214/344)   
remote: Compressing objects:  63% (217/344)   
remote: Compressing objects:  64% (221/344)   
remote: Compressing objects:  65% (224/344)   
remote: Compressing objects:  66% (228/344)   
remote: Compressing objects:  67% (231/344)   
remote: Compressing objects:  68% (234/344)   
remote: Compressing objects:  69% (238/344)   
remote: Compressing objects:  70% (241/344)   
remote: Compressing objects:  71% (245/344)   
remote: Compressing objects:  72% (248/344)   
remote: Compressing objects:  73% (252/344)   
remote: Compressing objects:  74% (255/344)   
remote: Compressing objects:  75% (258/344)   
remote: Compressing objects:  76% (262/344)   
remote: Compressing objects:  77% (265/344)   
remote: Compressing objects:  78% (269/344)   
remote: Compressing objects:  79% (272/344)   
remote: Compressing objects:  80% (276/344)   
remote: Compressing objects:  81% (279/344)   
remote: Compressing objects:  82% (283/344)   
remote: Compressing objects:  83% (286/344)   
remote: Compressing objects:  84% (289/344)   
remote: Compressing objects:  85% (293/344)   
remote: Compressing objects:  86% (296/344)   
remote: Compressing objects:  87% (300/344)   
remote: Compressing objects:  88% (303/344)   
remote: Compressing objects:  89% (307/344)   
remote: Compressing objects:  90% (310/344)   
remote: Compressing objects:  91% (314/344)   
remote: Compressing objects:  92% (317/344)   
remote: Compressing objects:  93% (320/344)   
remote: Compressing objects:  94% (324/344)   
remote: Compressing objects:  95% (327/344)   
remote: Compressing objects:  96% (331/344)   
remote: Compressing objects:  97% (334/344)   
remote: Compressing objects:  98% (338/344)   
remote: Compressing objects:  99% (341/344)   
remote: Compressing objects: 100% (344/344)   
remote: Compressing objects: 100% (344/344), done.
Receiving objects:   0% (1/709)   
Receiving objects:   1% (8/709)   
Receiving objects:   2% (15/709)   
Receiving objects:   3% (22/709)   
Receiving objects:   4% (29/709)   
Receiving objects:   5% (36/709)   
Receiving objects:   6% (43/709)   
Receiving objects:   7% (50/709)   
Receiving objects:   8% (57/709)   
Receiving objects:   9% (64/709)   
Receiving objects:  10% (71/709)   
Receiving objects:  11% (78/709)   
Receiving objects:  12% (86/709)   
Receiving objects:  13% (93/709)   
Receiving objects:  14% (100/709)   
Receiving objects:  15% (107/709)   
Receiving objects:  16% (114/709)   
Receiving objects:  17% (121/709)   
Receiving objects:  18% (128/709)   
Receiving objects:  19% (135/709)   
Receiving objects:  20% (142/709)   
Receiving objects:  21% (149/709)   
Receiving objects:  22% (156/709)   
Receiving objects:  23% (164/709)   
Receiving objects:  24% (171/709)   
Receiving objects:  25% (178/709)   
Receiving objects:  26% (185/709)   
Receiving objects:  27% (192/709)   
Receiving objects:  28% (199/709)   
Receiving objects:  29% (206/709)   
Receiving objects:  30% (213/709)   
Receiving objects:  31% (220/709)   
Receiving objects:  32% (227/709)   
Receiving objects:  33% (234/709)   
Receiving objects:  34% (242/709)   
Receiving objects:  35% (249/709)   
Receiving objects:  36% (256/709)   
Receiving objects:  37% (263/709)   
Receiving objects:  38% (270/709)   
Receiving objects:  39% (277/709)   
Receiving objects:  40% (284/709)   
Receiving objects:  41% (291/709)   
Receiving objects:  42% (298/709)   
Receiving objects:  43% (305/709)   
Receiving objects:  44% (312/709)   
Receiving objects:  45% (320/709)   
Receiving objects:  46% (327/709)   
Receiving objects:  47% (334/709)   
Receiving objects:  48% (341/709)   
Receiving objects:  49% (348/709)   
Receiving objects:  50% (355/709)   
Receiving objects:  51% (362/709)   
Receiving objects:  52% (369/709)   
Receiving objects:  53% (376/709)   
Receiving objects:  54% (383/709)   
Receiving objects:  55% (390/709)   
Receiving objects:  56% (398/709)   
Receiving objects:  57% (405/709)   
Receiving objects:  58% (412/709)   
Receiving objects:  59% (419/709)   
Receiving objects:  60% (426/709)   
Receiving objects:  61% (433/709)   
Receiving objects:  62% (440/709)   
Receiving objects:  63% (447/709)   
Receiving objects:  64% (454/709)   
Receiving objects:  65% (461/709)   
Receiving objects:  66% (468/709)   
Receiving objects:  67% (476/709)   
Receiving objects:  68% (483/709)   
Receiving objects:  69% (490/709)   
Receiving objects:  70% (497/709)   
Receiving objects:  71% (504/709)   
Receiving objects:  72% (511/709)   
Receiving objects:  73% (518/709)   
Receiving objects:  74% (525/709)   
Receiving objects:  75% (532/709)   
Receiving objects:  76% (539/709)   
Receiving objects:  77% (546/709)   
Receiving objects:  78% (554/709)   
Receiving objects:  79% (561/709)   
Receiving objects:  80% (568/709)   
Receiving objects:  81% (575/709)   
Receiving objects:  82% (582/709)   
Receiving objects:  83% (589/709)   
Receiving objects:  84% (596/709)   
Receiving objects:  85% (603/709)   
Receiving objects:  86% (610/709)   
Receiving objects:  87% (617/709)   
Receiving objects:  88% (624/709)   
Receiving objects:  89% (632/709)   
Receiving objects:  90% (639/709)   
Receiving objects:  91% (646/709)   
Receiving objects:  92% (653/709)   
Receiving objects:  93% (660/709)   
Receiving objects:  94% (667/709)   
Receiving objects:  95% (674/709)   
Receiving objects:  96% (681/709)   
Receiving objects:  97% (688/709)   
remote: Total 709 (delta 444), reused 616 (delta 365), pack-reused 0
Receiving objects:  98% (695/709)   
Receiving objects:  99% (702/709)   
Receiving objects: 100% (709/709)   
Receiving objects: 100% (709/709), 481.70 KiB | 1.86 MiB/s, done.
Resolving deltas:   0% (0/444)   
Resolving deltas:  32% (144/444)   
Resolving deltas:  33% (148/444)   
Resolving deltas:  40% (179/444)   
Resolving deltas:  41% (184/444)   
Resolving deltas:  42% (189/444)   
Resolving deltas:  44% (196/444)   
Resolving deltas:  46% (205/444)   
Resolving deltas:  47% (209/444)   
Resolving deltas:  49% (218/444)   
Resolving deltas:  50% (223/444)   
Resolving deltas:  51% (229/444)   
Resolving deltas:  52% (232/444)   
Resolving deltas:  54% (240/444)   
Resolving deltas:  58% (258/444)   
Resolving deltas:  61% (274/444)   
Resolving deltas:  62% (276/444)   
Resolving deltas:  69% (309/444)   
Resolving deltas:  82% (365/444)   
Resolving deltas: 100% (444/444)   
Resolving deltas: 100% (444/444), done.
travis_time:end:0be281cc:start=1528205099328454378,finish=1528205100306893532,duration=978439154
$ cd major/MySQLTuner-perl
$ git checkout -qf eb7300446c7ce9ec454f21708a9c78d1cdf295ba
travis_fold:end:git.checkout
travis_time:start:01bfdfc0
$ perlbrew use 5.24
travis_time:end:01bfdfc0:start=1528205100339410662,finish=1528205100436831227,duration=97420565
$ perl --version
This is perl 5, version 24, subversion 0 (v5.24.0) built for x86_64-linux
(with 1 registered patch, see perl -V for more detail)
Copyright 1987-2016, Larry Wall
Perl may be copied only under the terms of either the Artistic License or the
GNU General Public License, which may be found in the Perl 5 source kit.
Complete documentation for Perl, including FAQ lists, should be found on
this system using "man perl" or "perldoc perl".  If you have access to the
Internet, point your browser at http://www.perl.org/, the Perl Home Page.
$ cpanm --version
cpanm (App::cpanminus) version 1.7043 (/home/travis/perl5/perlbrew/bin/cpanm)
perl version 5.024000 (/home/travis/perl5/perlbrew/perls/5.24.0/bin/perl)
  %Config:
    archname=x86_64-linux
    installsitelib=/home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0
    installsitebin=/home/travis/perl5/perlbrew/perls/5.24.0/bin
    installman1dir=/home/travis/perl5/perlbrew/perls/5.24.0/man/man1
    installman3dir=/home/travis/perl5/perlbrew/perls/5.24.0/man/man3
    sitearchexp=/home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0/x86_64-linux
    sitelibexp=/home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0
    archlibexp=/home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0/x86_64-linux
    privlibexp=/home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0
  %ENV:
    PERLBREW_BASHRC_VERSION=0.80
    PERLBREW_HOME=/home/travis/.perlbrew
    PERLBREW_MANPATH=/home/travis/perl5/perlbrew/perls/5.24/man
    PERLBREW_PATH=/home/travis/perl5/perlbrew/bin:/home/travis/perl5/perlbrew/perls/5.24/bin
    PERLBREW_PERL=5.24
    PERLBREW_ROOT=/home/travis/perl5/perlbrew
    PERLBREW_VERSION=0.80
  @INC:
    FatPacked::28967920=HASH(0x1ba03f0)
    /home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0/x86_64-linux
    /home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0
    /home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0/x86_64-linux
    /home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0
    .
travis_fold:start:before_install.1
travis_time:start:1667ee20
$ git clone git://github.com/haarg/perl-travis-helper
Cloning into 'perl-travis-helper'...
remote: Counting objects: 1065, done.
remote: Compressing objects:  25% (1/4)   
remote: Compressing objects:  50% (2/4)   
remote: Compressing objects:  75% (3/4)   
remote: Compressing objects: 100% (4/4)   
remote: Compressing objects: 100% (4/4), done.
Receiving objects:   0% (1/1065)   
Receiving objects:   1% (11/1065)   
Receiving objects:   2% (22/1065)   
Receiving objects:   3% (32/1065)   
Receiving objects:   4% (43/1065)   
Receiving objects:   5% (54/1065)   
Receiving objects:   6% (64/1065)   
Receiving objects:   7% (75/1065)   
Receiving objects:   8% (86/1065)   
Receiving objects:   9% (96/1065)   
Receiving objects:  10% (107/1065)   
Receiving objects:  11% (118/1065)   
Receiving objects:  12% (128/1065)   
Receiving objects:  13% (139/1065)   
Receiving objects:  14% (150/1065)   
Receiving objects:  15% (160/1065)   
Receiving objects:  16% (171/1065)   
Receiving objects:  17% (182/1065)   
Receiving objects:  18% (192/1065)   
Receiving objects:  19% (203/1065)   
Receiving objects:  20% (213/1065)   
Receiving objects:  21% (224/1065)   
Receiving objects:  22% (235/1065)   
Receiving objects:  23% (245/1065)   
Receiving objects:  24% (256/1065)   
Receiving objects:  25% (267/1065)   
Receiving objects:  26% (277/1065)   
Receiving objects:  27% (288/1065)   
Receiving objects:  28% (299/1065)   
Receiving objects:  29% (309/1065)   
Receiving objects:  30% (320/1065)   
Receiving objects:  31% (331/1065)   
Receiving objects:  32% (341/1065)   
Receiving objects:  33% (352/1065)   
Receiving objects:  34% (363/1065)   
Receiving objects:  35% (373/1065)   
Receiving objects:  36% (384/1065)   
Receiving objects:  37% (395/1065)   
Receiving objects:  38% (405/1065)   
Receiving objects:  39% (416/1065)   
Receiving objects:  40% (426/1065)   
Receiving objects:  41% (437/1065)   
Receiving objects:  42% (448/1065)   
Receiving objects:  43% (458/1065)   
Receiving objects:  44% (469/1065)   
Receiving objects:  45% (480/1065)   
Receiving objects:  46% (490/1065)   
Receiving objects:  47% (501/1065)   
Receiving objects:  48% (512/1065)   
Receiving objects:  49% (522/1065)   
Receiving objects:  50% (533/1065)   
remote: Total 1065 (delta 2), reused 6 (delta 2), pack-reused 1059
Receiving objects:  51% (544/1065)   
Receiving objects:  52% (554/1065)   
Receiving objects:  53% (565/1065)   
Receiving objects:  54% (576/1065)   
Receiving objects:  55% (586/1065)   
Receiving objects:  56% (597/1065)   
Receiving objects:  57% (608/1065)   
Receiving objects:  58% (618/1065)   
Receiving objects:  59% (629/1065)   
Receiving objects:  60% (639/1065)   
Receiving objects:  61% (650/1065)   
Receiving objects:  62% (661/1065)   
Receiving objects:  63% (671/1065)   
Receiving objects:  64% (682/1065)   
Receiving objects:  65% (693/1065)   
Receiving objects:  66% (703/1065)   
Receiving objects:  67% (714/1065)   
Receiving objects:  68% (725/1065)   
Receiving objects:  69% (735/1065)   
Receiving objects:  70% (746/1065)   
Receiving objects:  71% (757/1065)   
Receiving objects:  72% (767/1065)   
Receiving objects:  73% (778/1065)   
Receiving objects:  74% (789/1065)   
Receiving objects:  75% (799/1065)   
Receiving objects:  76% (810/1065)   
Receiving objects:  77% (821/1065)   
Receiving objects:  78% (831/1065)   
Receiving objects:  79% (842/1065)   
Receiving objects:  80% (852/1065)   
Receiving objects:  81% (863/1065)   
Receiving objects:  82% (874/1065)   
Receiving objects:  83% (884/1065)   
Receiving objects:  84% (895/1065)   
Receiving objects:  85% (906/1065)   
Receiving objects:  86% (916/1065)   
Receiving objects:  87% (927/1065)   
Receiving objects:  88% (938/1065)   
Receiving objects:  89% (948/1065)   
Receiving objects:  90% (959/1065)   
Receiving objects:  91% (970/1065)   
Receiving objects:  92% (980/1065)   
Receiving objects:  93% (991/1065)   
Receiving objects:  94% (1002/1065)   
Receiving objects:  95% (1012/1065)   
Receiving objects:  96% (1023/1065)   
Receiving objects:  97% (1034/1065)   
Receiving objects:  98% (1044/1065)   
Receiving objects:  99% (1055/1065)   
Receiving objects: 100% (1065/1065)   
Receiving objects: 100% (1065/1065), 176.28 KiB | 11.75 MiB/s, done.
Resolving deltas:   0% (0/653)   
Resolving deltas:   1% (10/653)   
Resolving deltas:   6% (44/653)   
Resolving deltas:   7% (49/653)   
Resolving deltas:   9% (59/653)   
Resolving deltas:  10% (71/653)   
Resolving deltas:  11% (78/653)   
Resolving deltas:  12% (80/653)   
Resolving deltas:  15% (100/653)   
Resolving deltas:  16% (110/653)   
Resolving deltas:  17% (114/653)   
Resolving deltas:  18% (120/653)   
Resolving deltas:  29% (191/653)   
Resolving deltas:  30% (200/653)   
Resolving deltas:  31% (206/653)   
Resolving deltas:  32% (210/653)   
Resolving deltas:  35% (229/653)   
Resolving deltas:  40% (263/653)   
Resolving deltas:  41% (273/653)   
Resolving deltas:  42% (275/653)   
Resolving deltas:  44% (289/653)   
Resolving deltas:  47% (312/653)   
Resolving deltas:  49% (325/653)   
Resolving deltas:  50% (327/653)   
Resolving deltas:  53% (348/653)   
Resolving deltas:  56% (372/653)   
Resolving deltas:  58% (385/653)   
Resolving deltas:  66% (432/653)   
Resolving deltas:  71% (467/653)   
Resolving deltas:  72% (472/653)   
Resolving deltas:  74% (486/653)   
Resolving deltas:  75% (490/653)   
Resolving deltas:  76% (501/653)   
Resolving deltas:  78% (511/653)   
Resolving deltas:  79% (516/653)   
Resolving deltas:  80% (523/653)   
Resolving deltas:  81% (532/653)   
Resolving deltas:  82% (539/653)   
Resolving deltas:  83% (546/653)   
Resolving deltas:  84% (555/653)   
Resolving deltas:  89% (583/653)   
Resolving deltas:  91% (598/653)   
Resolving deltas:  93% (611/653)   
Resolving deltas:  95% (622/653)   
Resolving deltas:  96% (627/653)   
Resolving deltas:  99% (648/653)   
Resolving deltas: 100% (653/653)   
Resolving deltas: 100% (653/653), done.
travis_time:end:1667ee20:start=1528205100844348369,finish=1528205101163340402,duration=318992033
travis_fold:end:before_install.1
travis_fold:start:before_install.2
travis_time:start:254b8b3d
$ source perl-travis-helper/init
Perl Travis Helpers: heads/master-0-gcde9ab6
travis_time:end:254b8b3d:start=1528205101171045400,finish=1528205101341160040,duration=170114640
travis_fold:end:before_install.2
travis_fold:start:before_install.3
travis_time:start:05d55756
$ build-perl
Perl 5.24 already installed.
travis_time:end:05d55756:start=1528205101349145862,finish=1528205102419251406,duration=1070105544
travis_fold:end:before_install.3
travis_fold:start:before_install.4
travis_time:start:0e18608e
$ perl -V
Summary of my perl5 (revision 5 version 24 subversion 0) configuration:
   
  Platform:
    osname=linux, osvers=4.4.0-93-generic, archname=x86_64-linux
    uname='linux travis-job-282a49a7-d5d1-4e5b-a870-68df9527dd24 4.4.0-93-generic #116~14.04.1-ubuntu smp mon aug 14 16:07:05 utc 2017 x86_64 x86_64 x86_64 gnulinux '
    config_args='-de -Dprefix=/home/travis/perl5/perlbrew/perls/5.24.0 -Aeval:scriptdir=/home/travis/perl5/perlbrew/perls/5.24.0/bin'
    hint=recommended, useposix=true, d_sigaction=define
    useithreads=undef, usemultiplicity=undef
    use64bitint=define, use64bitall=define, uselongdouble=undef
    usemymalloc=n, bincompat5005=undef
  Compiler:
    cc='cc', ccflags ='-fwrapv -fno-strict-aliasing -pipe -fstack-protector -I/usr/local/include -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64',
    optimize='-O2',
    cppflags='-fwrapv -fno-strict-aliasing -pipe -fstack-protector -I/usr/local/include'
    ccversion='', gccversion='4.8.4', gccosandvers=''
    intsize=4, longsize=8, ptrsize=8, doublesize=8, byteorder=12345678, doublekind=3
    d_longlong=define, longlongsize=8, d_longdbl=define, longdblsize=16, longdblkind=3
    ivtype='long', ivsize=8, nvtype='double', nvsize=8, Off_t='off_t', lseeksize=8
    alignbytes=8, prototype=define
  Linker and Libraries:
    ld='cc', ldflags =' -fstack-protector -L/usr/local/lib'
    libpth=/usr/local/lib /usr/lib/gcc/x86_64-linux-gnu/4.8/include-fixed /usr/include/x86_64-linux-gnu /usr/lib /lib/x86_64-linux-gnu /lib/../lib /usr/lib/x86_64-linux-gnu /usr/lib/../lib /lib
    libs=-lpthread -lnsl -lgdbm -ldl -lm -lcrypt -lutil -lc -lgdbm_compat
    perllibs=-lpthread -lnsl -ldl -lm -lcrypt -lutil -lc
    libc=libc-2.19.so, so=so, useshrplib=false, libperl=libperl.a
    gnulibc_version='2.19'
  Dynamic Linking:
    dlsrc=dl_dlopen.xs, dlext=so, d_dlsymun=undef, ccdlflags='-Wl,-E'
    cccdlflags='-fPIC', lddlflags='-shared -O2 -L/usr/local/lib -fstack-protector'
Characteristics of this binary (from libperl): 
  Compile-time options: HAS_TIMES PERLIO_LAYERS PERL_COPY_ON_WRITE
                        PERL_DONT_CREATE_GVSV
                        PERL_HASH_FUNC_ONE_AT_A_TIME_HARD PERL_MALLOC_WRAP
                        PERL_PRESERVE_IVUV USE_64_BIT_ALL USE_64_BIT_INT
                        USE_LARGE_FILES USE_LOCALE USE_LOCALE_COLLATE
                        USE_LOCALE_CTYPE USE_LOCALE_NUMERIC USE_LOCALE_TIME
                        USE_PERLIO USE_PERL_ATOF
  Locally applied patches:
	Devel::PatchPerl 1.48
  Built under linux
  Compiled at Nov 14 2017 02:21:16
  %ENV:
    PERLBREW_BASHRC_VERSION="0.80"
    PERLBREW_HOME="/home/travis/.perlbrew"
    PERLBREW_MANPATH="/home/travis/perl5/perlbrew/perls/5.24/man"
    PERLBREW_PATH="/home/travis/perl5/perlbrew/bin:/home/travis/perl5/perlbrew/perls/5.24/bin"
    PERLBREW_PERL="5.24"
    PERLBREW_ROOT="/home/travis/perl5/perlbrew"
    PERLBREW_VERSION="0.83"
    PERL_AUTOINSTALL_PREFER_CPAN="1"
    PERL_MM_USE_DEFAULT="1"
  @INC:
    /home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0/x86_64-linux
    /home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0
    /home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0/x86_64-linux
    /home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0
    .
travis_time:end:0e18608e:start=1528205102427427766,finish=1528205102447822908,duration=20395142
travis_fold:end:before_install.4
travis_fold:start:install.1
travis_time:start:24ab7cc2
$ cpanm --quiet --notest Data::Dumper
Successfully installed Data-Dumper-2.161 (upgraded from 2.160)
1 distribution installed
travis_time:end:24ab7cc2:start=1528205102456150129,finish=1528205105612816663,duration=3156666534
travis_fold:end:install.1
travis_fold:start:install.2
travis_time:start:02b990e0
$ cpanm --quiet --notest JSON
Successfully installed JSON-2.97001
1 distribution installed
travis_time:end:02b990e0:start=1528205105620753955,finish=1528205107476495346,duration=1855741391
travis_fold:end:install.2
travis_fold:start:install.3
travis_time:start:045d2e84
$ cpanm --quiet --notest Perl::Critic
Successfully installed Readonly-2.05
Successfully installed PPIx-Utilities-1.001000
Successfully installed PPIx-Regexp-0.059
Successfully installed PPIx-QuoteLike-0.005
Successfully installed Perl-Tidy-20180220
Successfully installed String-Format-1.18
Successfully installed Config-Tiny-2.23
Successfully installed B-Keywords-1.18
Successfully installed Class-Tiny-1.006
Successfully installed Lingua-EN-Inflect-1.903
Successfully installed Pod-Spell-1.20
Successfully installed Perl-Critic-1.132
12 distributions installed
travis_time:end:045d2e84:start=1528205107484480389,finish=1528205128757420441,duration=21272940052
travis_fold:end:install.3
travis_fold:start:install.4
travis_time:start:1dbd0c8c
$ cpanm --quiet --notest Text::Template
Successfully installed Text-Template-1.53 (upgraded from 1.47)
1 distribution installed
travis_time:end:1dbd0c8c:start=1528205128765255411,finish=1528205130458103846,duration=1692848435
travis_fold:end:install.4
travis_fold:start:before_script.1
travis_time:start:1ed9b3c0
$ echo -e "[client]\nuser=root\npassword=\"\"" > .my.cnf
travis_time:end:1ed9b3c0:start=1528205130466096952,finish=1528205130472670308,duration=6573356
travis_fold:end:before_script.1
travis_fold:start:before_script.2
travis_time:start:04dc52e0
$ chmod 600 .my.cnf
travis_time:end:04dc52e0:start=1528205130480576976,finish=1528205130488333334,duration=7756358
travis_fold:end:before_script.2
travis_time:start:10d20704
$ perlcritic mysqltuner.pl
Having more than one /x regexp modifier is deprecated at /home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0/Perl/Critic/Policy/ValuesAndExpressions/RequireInterpolationOfMetachars.pm line 110.
Use IO::Interactive::is_interactive() instead of -t at line 69, column 28.  See page 218 of PBP.  (Severity: 5)
Use IO::Interactive::is_interactive() instead of -t at line 203, column 28.  See page 218 of PBP.  (Severity: 5)
travis_time:end:10d20704:start=1528205130496235762,finish=1528205135590547102,duration=5094311340
The command "perlcritic mysqltuner.pl" exited with 2.
travis_time:start:153a884a
$ ./mysqltuner.pl --idxstat --dbstat
 >>  MySQLTuner 1.7.9 - Major Hayden <[email protected]>
 >>  Bug reports, feature requests, and downloads at http://mysqltuner.com/
 >>  Run with '--help' for additional options and output filtering
[--] Skipped version check for MySQLTuner script
[OK] Currently running supported MySQL version 5.6.33-0ubuntu0.14.04.1
[OK] Operating on 64-bit architecture
 
-------- Log file Recommendations ------------------------------------------------------------------
[--] Log file: /var/lib/mysql/travis-job-major-mysqltuner-per-388281864.travisci.net.err(0B)
[!!] Log file /var/lib/mysql/travis-job-major-mysqltuner-per-388281864.travisci.net.err doesn't exist
[!!] Log file /var/lib/mysql/travis-job-major-mysqltuner-per-388281864.travisci.net.err isn't readable.
 
-------- Storage Engine Statistics -----------------------------------------------------------------
[--] Status: +ARCHIVE +BLACKHOLE +CSV -FEDERATED +InnoDB +MEMORY +MRG_MYISAM +MyISAM +PERFORMANCE_SCHEMA 
[--] Data in InnoDB tables: 16K (Tables: 1)
[OK] Total fragmented tables: 0
 
-------- Database Metrics --------------------------------------------------------------------------
[--] There is 1 Database(s).
[--] All User Databases:
[--]  +-- TABLE : 1
[--]  +-- ROWS  : 0
[--]  +-- DATA  : 16.0K(100.00%)
[--]  +-- INDEX : 0B(0.00%)
[--]  +-- SIZE  : 16.0K
[--]  +-- COLLA : 1 (utf8_general_ci, utf8_bin, latin1_swedish_ci)
[--]  +-- ENGIN : 1 (MEMORY, MyISAM, CSV, InnoDB, PERFORMANCE_SCHEMA)
[--] Database: travis
[--]  +-- TABLE: 1
[--]  +-- COLL : 1 (latin1_swedish_ci)
[--]  +-- ROWS : 0
[--]  +-- DATA : 16.0K(100.00%)
[--]  +-- INDEX: 0B(0.00%)
[--]  +-- TOTAL: 16.0K
[--]  +-- ENGIN : 1 (InnoDB)
[OK] 1 collation for travis database.
[OK] 1 engine for travis database.
[--] Charsets for travis database table column: 
[OK] travis table column(s) has same charset defined for all text like column(s).
[--] Collations for travis database table column: 
[OK] travis table column(s) has same collation defined for all text like column(s).
 
-------- Table Column Metrics ----------------------------------------------------------------------
[--] Database: travis
[--]  +-- TABLE: test
[--]      +-- Column test.id:
[--]       Current Fieldtype: INT(11)
[--]       Optimal Fieldtype: ENUM('4') NOT NULL
[!!] Consider changing type for column id in table travis.test
 
-------- Indexes Metrics ---------------------------------------------------------------------------
[--] Worst selectivity indexes:
 
-------- Security Recommendations ------------------------------------------------------------------
[OK] There are no anonymous accounts for any database users
[!!] User '[email protected]' has no password set.
[!!] User 'root@::1' has no password set.
[!!] User 'root@a5ca16b8c093' has no password set.
[!!] User 'root@localhost' has no password set.
[!!] User 'travis@%' has no password set.
[!!] User '[email protected]' has no password set.
[!!] User 'travis@localhost' has no password set.
[!!] User 'travis@%' does not specify hostname restrictions.
[--] There are 612 basic passwords in the list.
 
-------- CVE Security Recommendations --------------------------------------------------------------
[!!] CVE-2016-5584(<= 5.6.33) : "Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier
[!!] CVE-2016-8318(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server
[!!] CVE-2016-8327(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts)."
[!!] CVE-2017-10155(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-10227(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-10268(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.57 and earlier
[!!] CVE-2017-10276(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: FTS). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-10279(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-10283(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-10286(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-10294(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-10314(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-10378(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier
[!!] CVE-2017-10379(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier
[!!] CVE-2017-10384(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.57 and earlier 5.6.37 and earlier 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-15365(<= 5.6.36) : "sql/event_data_objects.cc in MariaDB before 10.1.30 and 10.2.x before 10.2.10 and Percona XtraDB Cluster before 5.6.37-26.21-3 and 5.7.x before 5.7.19-29.22-3 allows remote authenticated users with SQL access to bypass intended access restrictions and replicate data definition language (DDL) statements to cluster nodes by leveraging incorrect ordering of DDL replication and ACL checking."
[!!] CVE-2017-3238(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3244(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3257(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.6.34 and earlier5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts)."
[!!] CVE-2017-3258(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3265(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3273(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts)."
[!!] CVE-2017-3291(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3305(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: C API). Supported versions that are affected are 5.5.55 and earlier and 5.6.35 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue allows man-in-the-middle attackers to hijack the authentication of users by leveraging incorrect ordering of security parameter verification in a client
[!!] CVE-2017-3308(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3309(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3312(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3313(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: MyISAM). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3317(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Logging). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3318(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Error Handling). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3329(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Thread Pooling). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3450(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily ""exploitable"" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-3452(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.35 and earlier. Easily ""exploitable"" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-3453(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3456(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3461(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3462(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3463(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3464(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3599(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily ""exploitable"" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue is an integer overflow in sql/auth/sql_authentication.cc which allows remote attackers to cause a denial of service via a crafted authentication packet."
[!!] CVE-2017-3600(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3633(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Memcached to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update
[!!] CVE-2017-3634(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-3636(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update
[!!] CVE-2017-3641(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.56 and earlier
[!!] CVE-2017-3647(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-3648(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.56 and earlier
[!!] CVE-2017-3649(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-3651(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.56 and earlier
[!!] CVE-2017-3652(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier
[!!] CVE-2017-3653(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier
[!!] CVE-2018-2562(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior
[!!] CVE-2018-2573(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: GIS). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2583(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Stored Procedure). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server
[!!] CVE-2018-2590(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2591(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2612(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation
[!!] CVE-2018-2622(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.58 and prior
[!!] CVE-2018-2640(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior
[!!] CVE-2018-2645(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)."
[!!] CVE-2018-2647(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update
[!!] CVE-2018-2665(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior
[!!] CVE-2018-2668(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior
[!!] CVE-2018-2696(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2703(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2755(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior
[!!] CVE-2018-2758(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2761(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior
[!!] CVE-2018-2766(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2771(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior
[!!] CVE-2018-2773(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior
[!!] CVE-2018-2781(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior
[!!] CVE-2018-2782(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2784(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2787(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update
[!!] CVE-2018-2805(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: GIS Extension). Supported versions that are affected are 5.6.39 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2813(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior
[!!] CVE-2018-2817(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior
[!!] CVE-2018-2818(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.5.59 and prior
[!!] CVE-2018-2819(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior
[!!] 80 CVE(s) found for your MySQL release.
 
-------- Performance Metrics -----------------------------------------------------------------------
[--] Up for: 51s (119 q [2.333 qps], 42 conn, TX: 47K, RX: 12K)
[--] Reads / Writes: 100% / 0%
[--] Binary logging is disabled
[--] Physical Memory     : 59.0G
[--] Max MySQL memory    : 352.4M
[--] Other process memory: 66.5M
[--] Total buffers: 192.0M global + 1.1M per thread (151 max threads)
[--] P_S Max memory usage: 0B
[--] Galera GCache Max memory usage: 0B
[OK] Maximum reached memory usage: 193.1M (0.32% of installed RAM)
[OK] Maximum possible memory usage: 352.4M (0.58% of installed RAM)
[OK] Overall possible memory usage with other process is compatible with memory available
[OK] Slow queries: 0% (0/119)
[OK] Highest usage of available connections: 0% (1/151)
[OK] Aborted connections: 0.00%  (0/42)
[!!] name resolution is active : a reverse name resolution is made for each new connection and can reduce performance
[!!] Query cache may be disabled by default due to mutex contention.
[!!] Query cache efficiency: 0.0% (0 cached / 73 selects)
[OK] Query cache prunes per day: 0
[OK] No Sort requiring temporary tables
[OK] No joins without indexes
[OK] Temporary tables created on disk: 19% (60 on disk / 311 total)
[OK] Thread cache hit rate: 97% (1 created / 42 connections)
[OK] Table cache hit rate: 92% (81 open / 88 opened)
[OK] Open file limit used: 0% (46/1M)
[OK] Table locks acquired immediately: 100% (95 immediate / 95 locks)
 
-------- Performance schema ------------------------------------------------------------------------
[--] Performance schema is disabled.
[--] Memory used by P_S: 0B
[--] Sys schema isn't installed.
 
-------- ThreadPool Metrics ------------------------------------------------------------------------
[--] ThreadPool stat is disabled.
 
-------- MyISAM Metrics ----------------------------------------------------------------------------
[!!] Key buffer used: 18.2% (3M used / 16M cache)
[OK] Key buffer size / total MyISAM indexes: 16.0M/104.0K
 
-------- InnoDB Metrics ----------------------------------------------------------------------------
[--] InnoDB is enabled.
[--] InnoDB Thread Concurrency: 0
[OK] InnoDB File per table is activated
[OK] InnoDB buffer pool / data size: 128.0M/16.0K
[!!] Ratio InnoDB log file size / InnoDB Buffer pool size (75 %): 48.0M * 2/128.0M should be equal 25%
[!!] InnoDB buffer pool <= 1G and Innodb_buffer_pool_instances(!=1).
[--] InnoDB Buffer Pool Chunk Size not used or defined in your version
[!!] InnoDB Read buffer efficiency: 83.27% (901 hits/ 1082 total)
[!!] InnoDB Write Log efficiency: 0% (1 hits/ 0 total)
[OK] InnoDB log waits: 0.00% (0 waits / 1 writes)
 
-------- AriaDB Metrics ----------------------------------------------------------------------------
[--] AriaDB is disabled.
 
-------- TokuDB Metrics ----------------------------------------------------------------------------
[--] TokuDB is disabled.
 
-------- XtraDB Metrics ----------------------------------------------------------------------------
[--] XtraDB is disabled.
 
-------- RocksDB Metrics ---------------------------------------------------------------------------
[--] RocksDB is disabled.
 
-------- Spider Metrics ----------------------------------------------------------------------------
[--] Spider is disabled.
 
-------- Connect Metrics ---------------------------------------------------------------------------
[--] Connect is disabled.
 
-------- Galera Metrics ----------------------------------------------------------------------------
[--] Galera is disabled.
 
-------- Replication Metrics -----------------------------------------------------------------------
[--] Galera Synchronous replication: NO
[--] No replication slave(s) for this server.
[--] Binlog format: STATEMENT
[--] XA support enabled: ON
[--] Semi synchronous replication Master: Not Activated
[--] Semi synchronous replication Slave: Not Activated
[--] This is a standalone server
 
-------- Recommendations ---------------------------------------------------------------------------
General recommendations:
    ALTER TABLE travis.test MODIFY id ENUM('4') NOT NULL;
    Set up a Password for user with the following SQL statement ( SET PASSWORD FOR 'user'@'SpecificDNSorIp' = PASSWORD('secure_password'); )
    Restrict Host for user@% to user@SpecificDNSorIp
    80 CVE(s) found for your MySQL release. Consider upgrading your version !
    MySQL was started within the last 24 hours - recommendations may be inaccurate
    Configure your accounts with ip or subnets only, then update your configuration with skip-name-resolve=1
    Performance schema should be activated for better diagnostics
    Consider installing Sys schema from https://github.com/mysql/mysql-sys
    Before changing innodb_log_file_size and/or innodb_log_files_in_group read this: http://bit.ly/2wgkDvS
Variables to adjust:
    query_cache_size (=0)
    query_cache_type (=0)
    query_cache_limit (> 1M, or use smaller result sets)
    performance_schema = ON enable PFS
    innodb_log_file_size should be (=16M) if possible, so InnoDB total log files size equals to 25% of buffer pool size.
    innodb_buffer_pool_instances (=1)
travis_time:end:153a884a:start=1528205135598893592,finish=1528205141058617924,duration=5459724332
The command "./mysqltuner.pl --idxstat --dbstat" exited with 0.
Done. Your build exited with 1.