|
travis_fold:start:worker_info |
|
Worker information |
|
hostname: 23307b2b-bb95-4c57-bda9-a824f6b4500c@1.i-04da5bb-production-2-worker-org-ec2.travisci.net |
|
version: v3.8.0 https://github.com/travis-ci/worker/tree/cccff7c89da7ba0cf47a90e5615266a45b372e30 |
|
instance: c56610e travisci/ci-amethyst:packer-1512508255-986baf0 (via amqp) |
|
startup: 400.729994ms |
|
travis_fold:end:worker_info |
|
travis_fold:start:system_info |
|
Build system information |
|
Build language: perl |
|
Build group: stable |
|
Build dist: trusty |
|
Build id: 388281863 |
|
Job id: 388281864 |
|
Runtime kernel version: 4.14.12-041412-generic |
|
travis-build version: 23b9e15b3 |
|
Build image provisioning date and time |
|
Tue Dec 5 21:48:10 UTC 2017 |
|
Operating System Details |
|
Distributor ID: Ubuntu |
|
Description: Ubuntu 14.04.5 LTS |
|
Release: 14.04 |
|
Codename: trusty |
|
Cookbooks Version |
|
7c2c6a6 https://github.com/travis-ci/travis-cookbooks/tree/7c2c6a6 |
|
git version |
|
git version 2.15.1 |
|
bash version |
|
GNU bash, version 4.3.11(1)-release (x86_64-pc-linux-gnu) |
|
gcc version |
|
gcc (Ubuntu 4.8.4-2ubuntu1~14.04.3) 4.8.4 |
|
Copyright (C) 2013 Free Software Foundation, Inc. |
|
This is free software; see the source for copying conditions. There is NO |
|
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. |
|
docker version |
|
Client: |
|
Version: 17.09.0-ce |
|
API version: 1.32 |
|
Go version: go1.8.3 |
|
Git commit: afdb6d4 |
|
Built: Tue Sep 26 22:39:28 2017 |
|
OS/Arch: linux/amd64 |
|
clang version |
|
clang version 5.0.0 (tags/RELEASE_500/final) |
|
Target: x86_64-unknown-linux-gnu |
|
Thread model: posix |
|
InstalledDir: /usr/local/clang-5.0.0/bin |
|
jq version |
|
jq-1.5 |
|
bats version |
|
Bats 0.4.0 |
|
shellcheck version |
|
0.4.6 |
|
shfmt version |
|
v2.0.0 |
|
ccache version |
|
ccache version 3.1.9 |
|
Copyright (C) 2002-2007 Andrew Tridgell |
|
Copyright (C) 2009-2011 Joel Rosdahl |
|
This program is free software; you can redistribute it and/or modify it under |
|
the terms of the GNU General Public License as published by the Free Software |
|
Foundation; either version 3 of the License, or (at your option) any later |
|
version. |
|
cmake version |
|
cmake version 3.9.2 |
|
CMake suite maintained and supported by Kitware (kitware.com/cmake). |
|
heroku version |
|
heroku-cli/6.14.39-addc925 (linux-x64) node-v9.2.0 |
|
imagemagick version |
|
Version: ImageMagick 6.7.7-10 2017-07-31 Q16 http://www.imagemagick.org |
|
md5deep version |
|
4.2 |
|
mercurial version |
|
Mercurial Distributed SCM (version 4.2.2) |
|
(see https://mercurial-scm.org for more information) |
|
Copyright (C) 2005-2017 Matt Mackall and others |
|
This is free software; see the source for copying conditions. There is NO |
|
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. |
|
mysql version |
|
mysql Ver 14.14 Distrib 5.6.33, for debian-linux-gnu (x86_64) using EditLine wrapper |
|
openssl version |
|
OpenSSL 1.0.1f 6 Jan 2014 |
|
packer version |
|
Packer v1.0.2 |
|
Your version of Packer is out of date! The latest version |
|
is 1.1.2. You can update by downloading from www.packer.io |
|
postgresql client version |
|
psql (PostgreSQL) 9.6.6 |
|
ragel version |
|
Ragel State Machine Compiler version 6.8 Feb 2013 |
|
Copyright (c) 2001-2009 by Adrian Thurston |
|
subversion version |
|
svn, version 1.8.8 (r1568071) |
|
compiled Aug 10 2017, 17:20:39 on x86_64-pc-linux-gnu |
|
Copyright (C) 2013 The Apache Software Foundation. |
|
This software consists of contributions made by many people; |
|
see the NOTICE file for more information. |
|
Subversion is open source software, see http://subversion.apache.org/ |
|
The following repository access (RA) modules are available: |
|
* ra_svn : Module for accessing a repository using the svn network protocol. |
|
- with Cyrus SASL authentication |
|
- handles 'svn' scheme |
|
* ra_local : Module for accessing a repository on local disk. |
|
- handles 'file' scheme |
|
* ra_serf : Module for accessing a repository via WebDAV protocol using serf. |
|
- using serf 1.3.3 |
|
- handles 'http' scheme |
|
- handles 'https' scheme |
|
sudo version |
|
Sudo version 1.8.9p5 |
|
Configure options: --prefix=/usr -v --with-all-insults --with-pam --with-fqdn --with-logging=syslog --with-logfac=authpriv --with-env-editor --with-editor=/usr/bin/editor --with-timeout=15 --with-password-timeout=0 --with-passprompt=[sudo] password for %p: --without-lecture --with-tty-tickets --disable-root-mailer --enable-admin-flag --with-sendmail=/usr/sbin/sendmail --with-timedir=/var/lib/sudo --mandir=/usr/share/man --libexecdir=/usr/lib/sudo --with-sssd --with-sssd-lib=/usr/lib/x86_64-linux-gnu --with-selinux |
|
Sudoers policy plugin version 1.8.9p5 |
|
Sudoers file grammar version 43 |
|
Sudoers path: /etc/sudoers |
|
Authentication methods: 'pam' |
|
Syslog facility if syslog is being used for logging: authpriv |
|
Syslog priority to use when user authenticates successfully: notice |
|
Syslog priority to use when user authenticates unsuccessfully: alert |
|
Send mail if the user is not in sudoers |
|
Use a separate timestamp for each user/tty combo |
|
Lecture user the first time they run sudo |
|
Root may run sudo |
|
Allow some information gathering to give useful error messages |
|
Require fully-qualified hostnames in the sudoers file |
|
Visudo will honor the EDITOR environment variable |
|
Set the LOGNAME and USER environment variables |
|
Length at which to wrap log file lines (0 for no wrap): 80 |
|
Authentication timestamp timeout: 15.0 minutes |
|
Password prompt timeout: 0.0 minutes |
|
Number of tries to enter a password: 3 |
|
Umask to use or 0777 to use user's: 022 |
|
Path to mail program: /usr/sbin/sendmail |
|
Flags for mail program: -t |
|
Address to send mail to: root |
|
Subject line for mail messages: *** SECURITY information for %h *** |
|
Incorrect password message: Sorry, try again. |
|
Path to authentication timestamp dir: /var/lib/sudo |
|
Default password prompt: [sudo] password for %p: |
|
Default user to run commands as: root |
|
Value to override user's $PATH with: /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin |
|
Path to the editor for use by visudo: /usr/bin/editor |
|
When to require a password for 'list' pseudocommand: any |
|
When to require a password for 'verify' pseudocommand: all |
|
File descriptors >= 3 will be closed before executing a command |
|
Environment variables to check for sanity: |
|
TZ |
|
TERM |
|
LINGUAS |
|
LC_* |
|
LANGUAGE |
|
LANG |
|
COLORTERM |
|
Environment variables to remove: |
|
RUBYOPT |
|
RUBYLIB |
|
PYTHONUSERBASE |
|
PYTHONINSPECT |
|
PYTHONPATH |
|
PYTHONHOME |
|
TMPPREFIX |
|
ZDOTDIR |
|
READNULLCMD |
|
NULLCMD |
|
FPATH |
|
PERL5DB |
|
PERL5OPT |
|
PERL5LIB |
|
PERLLIB |
|
PERLIO_DEBUG |
|
JAVA_TOOL_OPTIONS |
|
SHELLOPTS |
|
GLOBIGNORE |
|
PS4 |
|
BASH_ENV |
|
ENV |
|
TERMCAP |
|
TERMPATH |
|
TERMINFO_DIRS |
|
TERMINFO |
|
_RLD* |
|
LD_* |
|
PATH_LOCALE |
|
NLSPATH |
|
HOSTALIASES |
|
RES_OPTIONS |
|
LOCALDOMAIN |
|
CDPATH |
|
IFS |
|
Environment variables to preserve: |
|
JAVA_HOME |
|
TRAVIS |
|
CI |
|
DEBIAN_FRONTEND |
|
XAUTHORIZATION |
|
XAUTHORITY |
|
PS2 |
|
PS1 |
|
PATH |
|
LS_COLORS |
|
KRB5CCNAME |
|
HOSTNAME |
|
HOME |
|
DISPLAY |
|
COLORS |
|
Locale to use while parsing sudoers: C |
|
Directory in which to store input/output logs: /var/log/sudo-io |
|
File in which to store the input/output log: %{seq} |
|
Add an entry to the utmp/utmpx file when allocating a pty |
|
PAM service name to use |
|
PAM service name to use for login shells |
|
Create a new PAM session for the command to run in |
|
Maximum I/O log sequence number: 0 |
|
Local IP address and netmask pairs: |
|
172.17.0.2/255.255.0.0 |
|
Sudoers I/O plugin version 1.8.9p5 |
|
gzip version |
|
gzip 1.6 |
|
Copyright (C) 2007, 2010, 2011 Free Software Foundation, Inc. |
|
Copyright (C) 1993 Jean-loup Gailly. |
|
This is free software. You may redistribute copies of it under the terms of |
|
the GNU General Public License <http://www.gnu.org/licenses/gpl.html>. |
|
There is NO WARRANTY, to the extent permitted by law. |
|
Written by Jean-loup Gailly. |
|
zip version |
|
Copyright (c) 1990-2008 Info-ZIP - Type 'zip "-L"' for software license. |
|
This is Zip 3.0 (July 5th 2008), by Info-ZIP. |
|
Currently maintained by E. Gordon. Please send bug reports to |
|
the authors using the web page at www.info-zip.org; see README for details. |
|
Latest sources and executables are at ftp://ftp.info-zip.org/pub/infozip, |
|
as of above date; see http://www.info-zip.org/ for other sites. |
|
Compiled with gcc 4.8.2 for Unix (Linux ELF) on Oct 21 2013. |
|
Zip special compilation options: |
|
USE_EF_UT_TIME (store Universal Time) |
|
BZIP2_SUPPORT (bzip2 library version 1.0.6, 6-Sept-2010) |
|
bzip2 code and library copyright (c) Julian R Seward |
|
(See the bzip2 license for terms of use) |
|
SYMLINK_SUPPORT (symbolic links supported) |
|
LARGE_FILE_SUPPORT (can read and write large files on file system) |
|
ZIP64_SUPPORT (use Zip64 to store large files in archives) |
|
UNICODE_SUPPORT (store and read UTF-8 Unicode paths) |
|
STORE_UNIX_UIDs_GIDs (store UID/GID sizes/values using new extra field) |
|
UIDGID_NOT_16BIT (old Unix 16-bit UID/GID extra field not used) |
|
[encryption, version 2.91 of 05 Jan 2007] (modified for Zip 3) |
|
Encryption notice: |
|
The encryption code of this program is not copyrighted and is |
|
put in the public domain. It was originally written in Europe |
|
and, to the best of our knowledge, can be freely distributed |
|
in both source and object forms from any country, including |
|
the USA under License Exception TSU of the U.S. Export |
|
Administration Regulations (section 740.13(e)) of 6 June 2002. |
|
Zip environment options: |
|
ZIP: [none] |
|
ZIPOPT: [none] |
|
vim version |
|
VIM - Vi IMproved 7.4 (2013 Aug 10, compiled Nov 24 2016 16:43:18) |
|
Included patches: 1-52 |
|
Extra patches: 8.0.0056 |
|
Modified by [email protected] |
|
Compiled by buildd@ |
|
Huge version without GUI. Features included (+) or not (-): |
|
+acl +farsi +mouse_netterm +syntax |
|
+arabic +file_in_path +mouse_sgr +tag_binary |
|
+autocmd +find_in_path -mouse_sysmouse +tag_old_static |
|
-balloon_eval +float +mouse_urxvt -tag_any_white |
|
-browse +folding +mouse_xterm -tcl |
|
++builtin_terms -footer +multi_byte +terminfo |
|
+byte_offset +fork() +multi_lang +termresponse |
|
+cindent +gettext -mzscheme +textobjects |
|
-clientserver -hangul_input +netbeans_intg +title |
|
-clipboard +iconv +path_extra -toolbar |
|
+cmdline_compl +insert_expand -perl +user_commands |
|
+cmdline_hist +jumplist +persistent_undo +vertsplit |
|
+cmdline_info +keymap +postscript +virtualedit |
|
+comments +langmap +printer +visual |
|
+conceal +libcall +profile +visualextra |
|
+cryptv +linebreak +python +viminfo |
|
+cscope +lispindent -python3 +vreplace |
|
+cursorbind +listcmds +quickfix +wildignore |
|
+cursorshape +localmap +reltime +wildmenu |
|
+dialog_con -lua +rightleft +windows |
|
+diff +menu -ruby +writebackup |
|
+digraphs +mksession +scrollbind -X11 |
|
-dnd +modify_fname +signs -xfontset |
|
-ebcdic +mouse +smartindent -xim |
|
+emacs_tags -mouseshape -sniff -xsmp |
|
+eval +mouse_dec +startuptime -xterm_clipboard |
|
+ex_extra +mouse_gpm +statusline -xterm_save |
|
+extra_search -mouse_jsbterm -sun_workshop -xpm |
|
system vimrc file: "$VIM/vimrc" |
|
user vimrc file: "$HOME/.vimrc" |
|
2nd user vimrc file: "~/.vim/vimrc" |
|
user exrc file: "$HOME/.exrc" |
|
fall-back for $VIM: "/usr/share/vim" |
|
Compilation: gcc -c -I. -Iproto -DHAVE_CONFIG_H -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=1 |
|
Linking: gcc -Wl,-Bsymbolic-functions -Wl,-z,relro -Wl,--as-needed -o vim -lm -ltinfo -lnsl -lselinux -lacl -lattr -lgpm -ldl -L/usr/lib/python2.7/config-x86_64-linux-gnu -lpython2.7 -lpthread -ldl -lutil -lm -Xlinker -export-dynamic -Wl,-O1 -Wl,-Bsymbolic-functions |
|
iptables version |
|
iptables v1.4.21 |
|
curl version |
|
curl 7.35.0 (x86_64-pc-linux-gnu) libcurl/7.35.0 OpenSSL/1.0.1f zlib/1.2.8 libidn/1.28 librtmp/2.3 |
|
wget version |
|
GNU Wget 1.15 built on linux-gnu. |
|
rsync version |
|
rsync version 3.1.0 protocol version 31 |
|
gimme version |
|
v1.2.0 |
|
nvm version |
|
0.33.6 |
|
perlbrew version |
|
/home/travis/perl5/perlbrew/bin/perlbrew - App::perlbrew/0.80 |
|
phpenv version |
|
rbenv 1.1.1-25-g6aa70b6 |
|
rvm version |
|
rvm 1.29.3 (latest) by Michal Papis, Piotr Kuczynski, Wayne E. Seguin [https://rvm.io] |
|
default ruby version |
|
ruby 2.4.1p111 (2017-03-22 revision 58053) [x86_64-linux] |
|
CouchDB version |
|
couchdb 1.6.1 |
|
ElasticSearch version |
|
5.5.0 |
|
Installed Firefox version |
|
firefox 56.0.2 |
|
MongoDB version |
|
MongoDB 3.4.10 |
|
PhantomJS version |
|
2.1.1 |
|
Pre-installed PostgreSQL versions |
|
9.2.24 |
|
9.3.20 |
|
9.4.15 |
|
9.5.10 |
|
9.6.6 |
|
RabbitMQ Version |
|
3.6.14 |
|
Redis version |
|
redis-server 4.0.6 |
|
riak version |
|
2.2.3 |
|
kerl list installations |
|
19.0 |
|
18.3 |
|
kiex list |
|
kiex elixirs |
|
elixir-1.2.6 |
|
=* elixir-1.3.2 |
|
# => - current |
|
# =* - current && default |
|
# * - default |
|
rebar --version |
|
rebar 2.6.4 17 20160831_145136 git 2.6.4-dirty |
|
perlbrew list |
|
5.22 (5.22.0) |
|
5.22.0 |
|
5.22-extras (5.22.4) |
|
5.22-shrplib (5.22.4) |
|
5.22.4 |
|
5.24 (5.24.0) |
|
5.24.0 |
|
5.24-extras (5.24.3) |
|
5.24-shrplib (5.24.3) |
|
5.24.3 |
|
travis_fold:end:system_info |
|
Network availability confirmed. |
|
travis_fold:start:git.checkout |
|
travis_time:start:0be281cc |
|
$ git clone --depth=50 --branch=master https://github.com/major/MySQLTuner-perl.git major/MySQLTuner-perl |
|
Cloning into 'major/MySQLTuner-perl'... |
|
remote: Counting objects: 709, done. |
|
remote: Compressing objects: 0% (1/344) |
|
remote: Compressing objects: 1% (4/344) |
|
remote: Compressing objects: 2% (7/344) |
|
remote: Compressing objects: 3% (11/344) |
|
remote: Compressing objects: 4% (14/344) |
|
remote: Compressing objects: 5% (18/344) |
|
remote: Compressing objects: 6% (21/344) |
|
remote: Compressing objects: 7% (25/344) |
|
remote: Compressing objects: 8% (28/344) |
|
remote: Compressing objects: 9% (31/344) |
|
remote: Compressing objects: 10% (35/344) |
|
remote: Compressing objects: 11% (38/344) |
|
remote: Compressing objects: 12% (42/344) |
|
remote: Compressing objects: 13% (45/344) |
|
remote: Compressing objects: 14% (49/344) |
|
remote: Compressing objects: 15% (52/344) |
|
remote: Compressing objects: 16% (56/344) |
|
remote: Compressing objects: 17% (59/344) |
|
remote: Compressing objects: 18% (62/344) |
|
remote: Compressing objects: 19% (66/344) |
|
remote: Compressing objects: 20% (69/344) |
|
remote: Compressing objects: 21% (73/344) |
|
remote: Compressing objects: 22% (76/344) |
|
remote: Compressing objects: 23% (80/344) |
|
remote: Compressing objects: 24% (83/344) |
|
remote: Compressing objects: 25% (86/344) |
|
remote: Compressing objects: 26% (90/344) |
|
remote: Compressing objects: 27% (93/344) |
|
remote: Compressing objects: 28% (97/344) |
|
remote: Compressing objects: 29% (100/344) |
|
remote: Compressing objects: 30% (104/344) |
|
remote: Compressing objects: 31% (107/344) |
|
remote: Compressing objects: 32% (111/344) |
|
remote: Compressing objects: 33% (114/344) |
|
remote: Compressing objects: 34% (117/344) |
|
remote: Compressing objects: 35% (121/344) |
|
remote: Compressing objects: 36% (124/344) |
|
remote: Compressing objects: 37% (128/344) |
|
remote: Compressing objects: 38% (131/344) |
|
remote: Compressing objects: 39% (135/344) |
|
remote: Compressing objects: 40% (138/344) |
|
remote: Compressing objects: 41% (142/344) |
|
remote: Compressing objects: 42% (145/344) |
|
remote: Compressing objects: 43% (148/344) |
|
remote: Compressing objects: 44% (152/344) |
|
remote: Compressing objects: 45% (155/344) |
|
remote: Compressing objects: 46% (159/344) |
|
remote: Compressing objects: 47% (162/344) |
|
remote: Compressing objects: 48% (166/344) |
|
remote: Compressing objects: 49% (169/344) |
|
remote: Compressing objects: 50% (172/344) |
|
remote: Compressing objects: 51% (176/344) |
|
remote: Compressing objects: 52% (179/344) |
|
remote: Compressing objects: 53% (183/344) |
|
remote: Compressing objects: 54% (186/344) |
|
remote: Compressing objects: 55% (190/344) |
|
remote: Compressing objects: 56% (193/344) |
|
remote: Compressing objects: 57% (197/344) |
|
remote: Compressing objects: 58% (200/344) |
|
remote: Compressing objects: 59% (203/344) |
|
remote: Compressing objects: 60% (207/344) |
|
remote: Compressing objects: 61% (210/344) |
|
remote: Compressing objects: 62% (214/344) |
|
remote: Compressing objects: 63% (217/344) |
|
remote: Compressing objects: 64% (221/344) |
|
remote: Compressing objects: 65% (224/344) |
|
remote: Compressing objects: 66% (228/344) |
|
remote: Compressing objects: 67% (231/344) |
|
remote: Compressing objects: 68% (234/344) |
|
remote: Compressing objects: 69% (238/344) |
|
remote: Compressing objects: 70% (241/344) |
|
remote: Compressing objects: 71% (245/344) |
|
remote: Compressing objects: 72% (248/344) |
|
remote: Compressing objects: 73% (252/344) |
|
remote: Compressing objects: 74% (255/344) |
|
remote: Compressing objects: 75% (258/344) |
|
remote: Compressing objects: 76% (262/344) |
|
remote: Compressing objects: 77% (265/344) |
|
remote: Compressing objects: 78% (269/344) |
|
remote: Compressing objects: 79% (272/344) |
|
remote: Compressing objects: 80% (276/344) |
|
remote: Compressing objects: 81% (279/344) |
|
remote: Compressing objects: 82% (283/344) |
|
remote: Compressing objects: 83% (286/344) |
|
remote: Compressing objects: 84% (289/344) |
|
remote: Compressing objects: 85% (293/344) |
|
remote: Compressing objects: 86% (296/344) |
|
remote: Compressing objects: 87% (300/344) |
|
remote: Compressing objects: 88% (303/344) |
|
remote: Compressing objects: 89% (307/344) |
|
remote: Compressing objects: 90% (310/344) |
|
remote: Compressing objects: 91% (314/344) |
|
remote: Compressing objects: 92% (317/344) |
|
remote: Compressing objects: 93% (320/344) |
|
remote: Compressing objects: 94% (324/344) |
|
remote: Compressing objects: 95% (327/344) |
|
remote: Compressing objects: 96% (331/344) |
|
remote: Compressing objects: 97% (334/344) |
|
remote: Compressing objects: 98% (338/344) |
|
remote: Compressing objects: 99% (341/344) |
|
remote: Compressing objects: 100% (344/344) |
|
remote: Compressing objects: 100% (344/344), done. |
|
Receiving objects: 0% (1/709) |
|
Receiving objects: 1% (8/709) |
|
Receiving objects: 2% (15/709) |
|
Receiving objects: 3% (22/709) |
|
Receiving objects: 4% (29/709) |
|
Receiving objects: 5% (36/709) |
|
Receiving objects: 6% (43/709) |
|
Receiving objects: 7% (50/709) |
|
Receiving objects: 8% (57/709) |
|
Receiving objects: 9% (64/709) |
|
Receiving objects: 10% (71/709) |
|
Receiving objects: 11% (78/709) |
|
Receiving objects: 12% (86/709) |
|
Receiving objects: 13% (93/709) |
|
Receiving objects: 14% (100/709) |
|
Receiving objects: 15% (107/709) |
|
Receiving objects: 16% (114/709) |
|
Receiving objects: 17% (121/709) |
|
Receiving objects: 18% (128/709) |
|
Receiving objects: 19% (135/709) |
|
Receiving objects: 20% (142/709) |
|
Receiving objects: 21% (149/709) |
|
Receiving objects: 22% (156/709) |
|
Receiving objects: 23% (164/709) |
|
Receiving objects: 24% (171/709) |
|
Receiving objects: 25% (178/709) |
|
Receiving objects: 26% (185/709) |
|
Receiving objects: 27% (192/709) |
|
Receiving objects: 28% (199/709) |
|
Receiving objects: 29% (206/709) |
|
Receiving objects: 30% (213/709) |
|
Receiving objects: 31% (220/709) |
|
Receiving objects: 32% (227/709) |
|
Receiving objects: 33% (234/709) |
|
Receiving objects: 34% (242/709) |
|
Receiving objects: 35% (249/709) |
|
Receiving objects: 36% (256/709) |
|
Receiving objects: 37% (263/709) |
|
Receiving objects: 38% (270/709) |
|
Receiving objects: 39% (277/709) |
|
Receiving objects: 40% (284/709) |
|
Receiving objects: 41% (291/709) |
|
Receiving objects: 42% (298/709) |
|
Receiving objects: 43% (305/709) |
|
Receiving objects: 44% (312/709) |
|
Receiving objects: 45% (320/709) |
|
Receiving objects: 46% (327/709) |
|
Receiving objects: 47% (334/709) |
|
Receiving objects: 48% (341/709) |
|
Receiving objects: 49% (348/709) |
|
Receiving objects: 50% (355/709) |
|
Receiving objects: 51% (362/709) |
|
Receiving objects: 52% (369/709) |
|
Receiving objects: 53% (376/709) |
|
Receiving objects: 54% (383/709) |
|
Receiving objects: 55% (390/709) |
|
Receiving objects: 56% (398/709) |
|
Receiving objects: 57% (405/709) |
|
Receiving objects: 58% (412/709) |
|
Receiving objects: 59% (419/709) |
|
Receiving objects: 60% (426/709) |
|
Receiving objects: 61% (433/709) |
|
Receiving objects: 62% (440/709) |
|
Receiving objects: 63% (447/709) |
|
Receiving objects: 64% (454/709) |
|
Receiving objects: 65% (461/709) |
|
Receiving objects: 66% (468/709) |
|
Receiving objects: 67% (476/709) |
|
Receiving objects: 68% (483/709) |
|
Receiving objects: 69% (490/709) |
|
Receiving objects: 70% (497/709) |
|
Receiving objects: 71% (504/709) |
|
Receiving objects: 72% (511/709) |
|
Receiving objects: 73% (518/709) |
|
Receiving objects: 74% (525/709) |
|
Receiving objects: 75% (532/709) |
|
Receiving objects: 76% (539/709) |
|
Receiving objects: 77% (546/709) |
|
Receiving objects: 78% (554/709) |
|
Receiving objects: 79% (561/709) |
|
Receiving objects: 80% (568/709) |
|
Receiving objects: 81% (575/709) |
|
Receiving objects: 82% (582/709) |
|
Receiving objects: 83% (589/709) |
|
Receiving objects: 84% (596/709) |
|
Receiving objects: 85% (603/709) |
|
Receiving objects: 86% (610/709) |
|
Receiving objects: 87% (617/709) |
|
Receiving objects: 88% (624/709) |
|
Receiving objects: 89% (632/709) |
|
Receiving objects: 90% (639/709) |
|
Receiving objects: 91% (646/709) |
|
Receiving objects: 92% (653/709) |
|
Receiving objects: 93% (660/709) |
|
Receiving objects: 94% (667/709) |
|
Receiving objects: 95% (674/709) |
|
Receiving objects: 96% (681/709) |
|
Receiving objects: 97% (688/709) |
|
remote: Total 709 (delta 444), reused 616 (delta 365), pack-reused 0 |
|
Receiving objects: 98% (695/709) |
|
Receiving objects: 99% (702/709) |
|
Receiving objects: 100% (709/709) |
|
Receiving objects: 100% (709/709), 481.70 KiB | 1.86 MiB/s, done. |
|
Resolving deltas: 0% (0/444) |
|
Resolving deltas: 32% (144/444) |
|
Resolving deltas: 33% (148/444) |
|
Resolving deltas: 40% (179/444) |
|
Resolving deltas: 41% (184/444) |
|
Resolving deltas: 42% (189/444) |
|
Resolving deltas: 44% (196/444) |
|
Resolving deltas: 46% (205/444) |
|
Resolving deltas: 47% (209/444) |
|
Resolving deltas: 49% (218/444) |
|
Resolving deltas: 50% (223/444) |
|
Resolving deltas: 51% (229/444) |
|
Resolving deltas: 52% (232/444) |
|
Resolving deltas: 54% (240/444) |
|
Resolving deltas: 58% (258/444) |
|
Resolving deltas: 61% (274/444) |
|
Resolving deltas: 62% (276/444) |
|
Resolving deltas: 69% (309/444) |
|
Resolving deltas: 82% (365/444) |
|
Resolving deltas: 100% (444/444) |
|
Resolving deltas: 100% (444/444), done. |
|
travis_time:end:0be281cc:start=1528205099328454378,finish=1528205100306893532,duration=978439154 |
|
$ cd major/MySQLTuner-perl |
|
$ git checkout -qf eb7300446c7ce9ec454f21708a9c78d1cdf295ba |
|
travis_fold:end:git.checkout |
|
travis_time:start:01bfdfc0 |
|
$ perlbrew use 5.24 |
|
travis_time:end:01bfdfc0:start=1528205100339410662,finish=1528205100436831227,duration=97420565 |
|
$ perl --version |
|
This is perl 5, version 24, subversion 0 (v5.24.0) built for x86_64-linux |
|
(with 1 registered patch, see perl -V for more detail) |
|
Copyright 1987-2016, Larry Wall |
|
Perl may be copied only under the terms of either the Artistic License or the |
|
GNU General Public License, which may be found in the Perl 5 source kit. |
|
Complete documentation for Perl, including FAQ lists, should be found on |
|
this system using "man perl" or "perldoc perl". If you have access to the |
|
Internet, point your browser at http://www.perl.org/, the Perl Home Page. |
|
$ cpanm --version |
|
cpanm (App::cpanminus) version 1.7043 (/home/travis/perl5/perlbrew/bin/cpanm) |
|
perl version 5.024000 (/home/travis/perl5/perlbrew/perls/5.24.0/bin/perl) |
|
%Config: |
|
archname=x86_64-linux |
|
installsitelib=/home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0 |
|
installsitebin=/home/travis/perl5/perlbrew/perls/5.24.0/bin |
|
installman1dir=/home/travis/perl5/perlbrew/perls/5.24.0/man/man1 |
|
installman3dir=/home/travis/perl5/perlbrew/perls/5.24.0/man/man3 |
|
sitearchexp=/home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0/x86_64-linux |
|
sitelibexp=/home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0 |
|
archlibexp=/home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0/x86_64-linux |
|
privlibexp=/home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0 |
|
%ENV: |
|
PERLBREW_BASHRC_VERSION=0.80 |
|
PERLBREW_HOME=/home/travis/.perlbrew |
|
PERLBREW_MANPATH=/home/travis/perl5/perlbrew/perls/5.24/man |
|
PERLBREW_PATH=/home/travis/perl5/perlbrew/bin:/home/travis/perl5/perlbrew/perls/5.24/bin |
|
PERLBREW_PERL=5.24 |
|
PERLBREW_ROOT=/home/travis/perl5/perlbrew |
|
PERLBREW_VERSION=0.80 |
|
@INC: |
|
FatPacked::28967920=HASH(0x1ba03f0) |
|
/home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0/x86_64-linux |
|
/home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0 |
|
/home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0/x86_64-linux |
|
/home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0 |
|
. |
|
travis_fold:start:before_install.1 |
|
travis_time:start:1667ee20 |
|
$ git clone git://github.com/haarg/perl-travis-helper |
|
Cloning into 'perl-travis-helper'... |
|
remote: Counting objects: 1065, done. |
|
remote: Compressing objects: 25% (1/4) |
|
remote: Compressing objects: 50% (2/4) |
|
remote: Compressing objects: 75% (3/4) |
|
remote: Compressing objects: 100% (4/4) |
|
remote: Compressing objects: 100% (4/4), done. |
|
Receiving objects: 0% (1/1065) |
|
Receiving objects: 1% (11/1065) |
|
Receiving objects: 2% (22/1065) |
|
Receiving objects: 3% (32/1065) |
|
Receiving objects: 4% (43/1065) |
|
Receiving objects: 5% (54/1065) |
|
Receiving objects: 6% (64/1065) |
|
Receiving objects: 7% (75/1065) |
|
Receiving objects: 8% (86/1065) |
|
Receiving objects: 9% (96/1065) |
|
Receiving objects: 10% (107/1065) |
|
Receiving objects: 11% (118/1065) |
|
Receiving objects: 12% (128/1065) |
|
Receiving objects: 13% (139/1065) |
|
Receiving objects: 14% (150/1065) |
|
Receiving objects: 15% (160/1065) |
|
Receiving objects: 16% (171/1065) |
|
Receiving objects: 17% (182/1065) |
|
Receiving objects: 18% (192/1065) |
|
Receiving objects: 19% (203/1065) |
|
Receiving objects: 20% (213/1065) |
|
Receiving objects: 21% (224/1065) |
|
Receiving objects: 22% (235/1065) |
|
Receiving objects: 23% (245/1065) |
|
Receiving objects: 24% (256/1065) |
|
Receiving objects: 25% (267/1065) |
|
Receiving objects: 26% (277/1065) |
|
Receiving objects: 27% (288/1065) |
|
Receiving objects: 28% (299/1065) |
|
Receiving objects: 29% (309/1065) |
|
Receiving objects: 30% (320/1065) |
|
Receiving objects: 31% (331/1065) |
|
Receiving objects: 32% (341/1065) |
|
Receiving objects: 33% (352/1065) |
|
Receiving objects: 34% (363/1065) |
|
Receiving objects: 35% (373/1065) |
|
Receiving objects: 36% (384/1065) |
|
Receiving objects: 37% (395/1065) |
|
Receiving objects: 38% (405/1065) |
|
Receiving objects: 39% (416/1065) |
|
Receiving objects: 40% (426/1065) |
|
Receiving objects: 41% (437/1065) |
|
Receiving objects: 42% (448/1065) |
|
Receiving objects: 43% (458/1065) |
|
Receiving objects: 44% (469/1065) |
|
Receiving objects: 45% (480/1065) |
|
Receiving objects: 46% (490/1065) |
|
Receiving objects: 47% (501/1065) |
|
Receiving objects: 48% (512/1065) |
|
Receiving objects: 49% (522/1065) |
|
Receiving objects: 50% (533/1065) |
|
remote: Total 1065 (delta 2), reused 6 (delta 2), pack-reused 1059 |
|
Receiving objects: 51% (544/1065) |
|
Receiving objects: 52% (554/1065) |
|
Receiving objects: 53% (565/1065) |
|
Receiving objects: 54% (576/1065) |
|
Receiving objects: 55% (586/1065) |
|
Receiving objects: 56% (597/1065) |
|
Receiving objects: 57% (608/1065) |
|
Receiving objects: 58% (618/1065) |
|
Receiving objects: 59% (629/1065) |
|
Receiving objects: 60% (639/1065) |
|
Receiving objects: 61% (650/1065) |
|
Receiving objects: 62% (661/1065) |
|
Receiving objects: 63% (671/1065) |
|
Receiving objects: 64% (682/1065) |
|
Receiving objects: 65% (693/1065) |
|
Receiving objects: 66% (703/1065) |
|
Receiving objects: 67% (714/1065) |
|
Receiving objects: 68% (725/1065) |
|
Receiving objects: 69% (735/1065) |
|
Receiving objects: 70% (746/1065) |
|
Receiving objects: 71% (757/1065) |
|
Receiving objects: 72% (767/1065) |
|
Receiving objects: 73% (778/1065) |
|
Receiving objects: 74% (789/1065) |
|
Receiving objects: 75% (799/1065) |
|
Receiving objects: 76% (810/1065) |
|
Receiving objects: 77% (821/1065) |
|
Receiving objects: 78% (831/1065) |
|
Receiving objects: 79% (842/1065) |
|
Receiving objects: 80% (852/1065) |
|
Receiving objects: 81% (863/1065) |
|
Receiving objects: 82% (874/1065) |
|
Receiving objects: 83% (884/1065) |
|
Receiving objects: 84% (895/1065) |
|
Receiving objects: 85% (906/1065) |
|
Receiving objects: 86% (916/1065) |
|
Receiving objects: 87% (927/1065) |
|
Receiving objects: 88% (938/1065) |
|
Receiving objects: 89% (948/1065) |
|
Receiving objects: 90% (959/1065) |
|
Receiving objects: 91% (970/1065) |
|
Receiving objects: 92% (980/1065) |
|
Receiving objects: 93% (991/1065) |
|
Receiving objects: 94% (1002/1065) |
|
Receiving objects: 95% (1012/1065) |
|
Receiving objects: 96% (1023/1065) |
|
Receiving objects: 97% (1034/1065) |
|
Receiving objects: 98% (1044/1065) |
|
Receiving objects: 99% (1055/1065) |
|
Receiving objects: 100% (1065/1065) |
|
Receiving objects: 100% (1065/1065), 176.28 KiB | 11.75 MiB/s, done. |
|
Resolving deltas: 0% (0/653) |
|
Resolving deltas: 1% (10/653) |
|
Resolving deltas: 6% (44/653) |
|
Resolving deltas: 7% (49/653) |
|
Resolving deltas: 9% (59/653) |
|
Resolving deltas: 10% (71/653) |
|
Resolving deltas: 11% (78/653) |
|
Resolving deltas: 12% (80/653) |
|
Resolving deltas: 15% (100/653) |
|
Resolving deltas: 16% (110/653) |
|
Resolving deltas: 17% (114/653) |
|
Resolving deltas: 18% (120/653) |
|
Resolving deltas: 29% (191/653) |
|
Resolving deltas: 30% (200/653) |
|
Resolving deltas: 31% (206/653) |
|
Resolving deltas: 32% (210/653) |
|
Resolving deltas: 35% (229/653) |
|
Resolving deltas: 40% (263/653) |
|
Resolving deltas: 41% (273/653) |
|
Resolving deltas: 42% (275/653) |
|
Resolving deltas: 44% (289/653) |
|
Resolving deltas: 47% (312/653) |
|
Resolving deltas: 49% (325/653) |
|
Resolving deltas: 50% (327/653) |
|
Resolving deltas: 53% (348/653) |
|
Resolving deltas: 56% (372/653) |
|
Resolving deltas: 58% (385/653) |
|
Resolving deltas: 66% (432/653) |
|
Resolving deltas: 71% (467/653) |
|
Resolving deltas: 72% (472/653) |
|
Resolving deltas: 74% (486/653) |
|
Resolving deltas: 75% (490/653) |
|
Resolving deltas: 76% (501/653) |
|
Resolving deltas: 78% (511/653) |
|
Resolving deltas: 79% (516/653) |
|
Resolving deltas: 80% (523/653) |
|
Resolving deltas: 81% (532/653) |
|
Resolving deltas: 82% (539/653) |
|
Resolving deltas: 83% (546/653) |
|
Resolving deltas: 84% (555/653) |
|
Resolving deltas: 89% (583/653) |
|
Resolving deltas: 91% (598/653) |
|
Resolving deltas: 93% (611/653) |
|
Resolving deltas: 95% (622/653) |
|
Resolving deltas: 96% (627/653) |
|
Resolving deltas: 99% (648/653) |
|
Resolving deltas: 100% (653/653) |
|
Resolving deltas: 100% (653/653), done. |
|
travis_time:end:1667ee20:start=1528205100844348369,finish=1528205101163340402,duration=318992033 |
|
travis_fold:end:before_install.1 |
|
travis_fold:start:before_install.2 |
|
travis_time:start:254b8b3d |
|
$ source perl-travis-helper/init |
|
Perl Travis Helpers: heads/master-0-gcde9ab6 |
|
travis_time:end:254b8b3d:start=1528205101171045400,finish=1528205101341160040,duration=170114640 |
|
travis_fold:end:before_install.2 |
|
travis_fold:start:before_install.3 |
|
travis_time:start:05d55756 |
|
$ build-perl |
|
Perl 5.24 already installed. |
|
travis_time:end:05d55756:start=1528205101349145862,finish=1528205102419251406,duration=1070105544 |
|
travis_fold:end:before_install.3 |
|
travis_fold:start:before_install.4 |
|
travis_time:start:0e18608e |
|
$ perl -V |
|
Summary of my perl5 (revision 5 version 24 subversion 0) configuration: |
|
|
|
Platform: |
|
osname=linux, osvers=4.4.0-93-generic, archname=x86_64-linux |
|
uname='linux travis-job-282a49a7-d5d1-4e5b-a870-68df9527dd24 4.4.0-93-generic #116~14.04.1-ubuntu smp mon aug 14 16:07:05 utc 2017 x86_64 x86_64 x86_64 gnulinux ' |
|
config_args='-de -Dprefix=/home/travis/perl5/perlbrew/perls/5.24.0 -Aeval:scriptdir=/home/travis/perl5/perlbrew/perls/5.24.0/bin' |
|
hint=recommended, useposix=true, d_sigaction=define |
|
useithreads=undef, usemultiplicity=undef |
|
use64bitint=define, use64bitall=define, uselongdouble=undef |
|
usemymalloc=n, bincompat5005=undef |
|
Compiler: |
|
cc='cc', ccflags ='-fwrapv -fno-strict-aliasing -pipe -fstack-protector -I/usr/local/include -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64', |
|
optimize='-O2', |
|
cppflags='-fwrapv -fno-strict-aliasing -pipe -fstack-protector -I/usr/local/include' |
|
ccversion='', gccversion='4.8.4', gccosandvers='' |
|
intsize=4, longsize=8, ptrsize=8, doublesize=8, byteorder=12345678, doublekind=3 |
|
d_longlong=define, longlongsize=8, d_longdbl=define, longdblsize=16, longdblkind=3 |
|
ivtype='long', ivsize=8, nvtype='double', nvsize=8, Off_t='off_t', lseeksize=8 |
|
alignbytes=8, prototype=define |
|
Linker and Libraries: |
|
ld='cc', ldflags =' -fstack-protector -L/usr/local/lib' |
|
libpth=/usr/local/lib /usr/lib/gcc/x86_64-linux-gnu/4.8/include-fixed /usr/include/x86_64-linux-gnu /usr/lib /lib/x86_64-linux-gnu /lib/../lib /usr/lib/x86_64-linux-gnu /usr/lib/../lib /lib |
|
libs=-lpthread -lnsl -lgdbm -ldl -lm -lcrypt -lutil -lc -lgdbm_compat |
|
perllibs=-lpthread -lnsl -ldl -lm -lcrypt -lutil -lc |
|
libc=libc-2.19.so, so=so, useshrplib=false, libperl=libperl.a |
|
gnulibc_version='2.19' |
|
Dynamic Linking: |
|
dlsrc=dl_dlopen.xs, dlext=so, d_dlsymun=undef, ccdlflags='-Wl,-E' |
|
cccdlflags='-fPIC', lddlflags='-shared -O2 -L/usr/local/lib -fstack-protector' |
|
Characteristics of this binary (from libperl): |
|
Compile-time options: HAS_TIMES PERLIO_LAYERS PERL_COPY_ON_WRITE |
|
PERL_DONT_CREATE_GVSV |
|
PERL_HASH_FUNC_ONE_AT_A_TIME_HARD PERL_MALLOC_WRAP |
|
PERL_PRESERVE_IVUV USE_64_BIT_ALL USE_64_BIT_INT |
|
USE_LARGE_FILES USE_LOCALE USE_LOCALE_COLLATE |
|
USE_LOCALE_CTYPE USE_LOCALE_NUMERIC USE_LOCALE_TIME |
|
USE_PERLIO USE_PERL_ATOF |
|
Locally applied patches: |
|
Devel::PatchPerl 1.48 |
|
Built under linux |
|
Compiled at Nov 14 2017 02:21:16 |
|
%ENV: |
|
PERLBREW_BASHRC_VERSION="0.80" |
|
PERLBREW_HOME="/home/travis/.perlbrew" |
|
PERLBREW_MANPATH="/home/travis/perl5/perlbrew/perls/5.24/man" |
|
PERLBREW_PATH="/home/travis/perl5/perlbrew/bin:/home/travis/perl5/perlbrew/perls/5.24/bin" |
|
PERLBREW_PERL="5.24" |
|
PERLBREW_ROOT="/home/travis/perl5/perlbrew" |
|
PERLBREW_VERSION="0.83" |
|
PERL_AUTOINSTALL_PREFER_CPAN="1" |
|
PERL_MM_USE_DEFAULT="1" |
|
@INC: |
|
/home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0/x86_64-linux |
|
/home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0 |
|
/home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0/x86_64-linux |
|
/home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0 |
|
. |
|
travis_time:end:0e18608e:start=1528205102427427766,finish=1528205102447822908,duration=20395142 |
|
travis_fold:end:before_install.4 |
|
travis_fold:start:install.1 |
|
travis_time:start:24ab7cc2 |
|
$ cpanm --quiet --notest Data::Dumper |
|
Successfully installed Data-Dumper-2.161 (upgraded from 2.160) |
|
1 distribution installed |
|
travis_time:end:24ab7cc2:start=1528205102456150129,finish=1528205105612816663,duration=3156666534 |
|
travis_fold:end:install.1 |
|
travis_fold:start:install.2 |
|
travis_time:start:02b990e0 |
|
$ cpanm --quiet --notest JSON |
|
Successfully installed JSON-2.97001 |
|
1 distribution installed |
|
travis_time:end:02b990e0:start=1528205105620753955,finish=1528205107476495346,duration=1855741391 |
|
travis_fold:end:install.2 |
|
travis_fold:start:install.3 |
|
travis_time:start:045d2e84 |
|
$ cpanm --quiet --notest Perl::Critic |
|
Successfully installed Readonly-2.05 |
|
Successfully installed PPIx-Utilities-1.001000 |
|
Successfully installed PPIx-Regexp-0.059 |
|
Successfully installed PPIx-QuoteLike-0.005 |
|
Successfully installed Perl-Tidy-20180220 |
|
Successfully installed String-Format-1.18 |
|
Successfully installed Config-Tiny-2.23 |
|
Successfully installed B-Keywords-1.18 |
|
Successfully installed Class-Tiny-1.006 |
|
Successfully installed Lingua-EN-Inflect-1.903 |
|
Successfully installed Pod-Spell-1.20 |
|
Successfully installed Perl-Critic-1.132 |
|
12 distributions installed |
|
travis_time:end:045d2e84:start=1528205107484480389,finish=1528205128757420441,duration=21272940052 |
|
travis_fold:end:install.3 |
|
travis_fold:start:install.4 |
|
travis_time:start:1dbd0c8c |
|
$ cpanm --quiet --notest Text::Template |
|
Successfully installed Text-Template-1.53 (upgraded from 1.47) |
|
1 distribution installed |
|
travis_time:end:1dbd0c8c:start=1528205128765255411,finish=1528205130458103846,duration=1692848435 |
|
travis_fold:end:install.4 |
|
travis_fold:start:before_script.1 |
|
travis_time:start:1ed9b3c0 |
|
$ echo -e "[client]\nuser=root\npassword=\"\"" > .my.cnf |
|
travis_time:end:1ed9b3c0:start=1528205130466096952,finish=1528205130472670308,duration=6573356 |
|
travis_fold:end:before_script.1 |
|
travis_fold:start:before_script.2 |
|
travis_time:start:04dc52e0 |
|
$ chmod 600 .my.cnf |
|
travis_time:end:04dc52e0:start=1528205130480576976,finish=1528205130488333334,duration=7756358 |
|
travis_fold:end:before_script.2 |
|
travis_time:start:10d20704 |
|
$ perlcritic mysqltuner.pl |
|
Having more than one /x regexp modifier is deprecated at /home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0/Perl/Critic/Policy/ValuesAndExpressions/RequireInterpolationOfMetachars.pm line 110. |
|
Use IO::Interactive::is_interactive() instead of -t at line 69, column 28. See page 218 of PBP. (Severity: 5) |
|
Use IO::Interactive::is_interactive() instead of -t at line 203, column 28. See page 218 of PBP. (Severity: 5) |
|
travis_time:end:10d20704:start=1528205130496235762,finish=1528205135590547102,duration=5094311340 |
|
The command "perlcritic mysqltuner.pl" exited with 2. |
|
travis_time:start:153a884a |
|
$ ./mysqltuner.pl --idxstat --dbstat |
|
>> MySQLTuner 1.7.9 - Major Hayden <[email protected]> |
|
>> Bug reports, feature requests, and downloads at http://mysqltuner.com/ |
|
>> Run with '--help' for additional options and output filtering |
|
[--] Skipped version check for MySQLTuner script |
|
[OK] Currently running supported MySQL version 5.6.33-0ubuntu0.14.04.1 |
|
[OK] Operating on 64-bit architecture |
|
|
|
-------- Log file Recommendations ------------------------------------------------------------------ |
|
[--] Log file: /var/lib/mysql/travis-job-major-mysqltuner-per-388281864.travisci.net.err(0B) |
|
[!!] Log file /var/lib/mysql/travis-job-major-mysqltuner-per-388281864.travisci.net.err doesn't exist |
|
[!!] Log file /var/lib/mysql/travis-job-major-mysqltuner-per-388281864.travisci.net.err isn't readable. |
|
|
|
-------- Storage Engine Statistics ----------------------------------------------------------------- |
|
[--] Status: +ARCHIVE +BLACKHOLE +CSV -FEDERATED +InnoDB +MEMORY +MRG_MYISAM +MyISAM +PERFORMANCE_SCHEMA |
|
[--] Data in InnoDB tables: 16K (Tables: 1) |
|
[OK] Total fragmented tables: 0 |
|
|
|
-------- Database Metrics -------------------------------------------------------------------------- |
|
[--] There is 1 Database(s). |
|
[--] All User Databases: |
|
[--] +-- TABLE : 1 |
|
[--] +-- ROWS : 0 |
|
[--] +-- DATA : 16.0K(100.00%) |
|
[--] +-- INDEX : 0B(0.00%) |
|
[--] +-- SIZE : 16.0K |
|
[--] +-- COLLA : 1 (utf8_general_ci, utf8_bin, latin1_swedish_ci) |
|
[--] +-- ENGIN : 1 (MEMORY, MyISAM, CSV, InnoDB, PERFORMANCE_SCHEMA) |
|
[--] Database: travis |
|
[--] +-- TABLE: 1 |
|
[--] +-- COLL : 1 (latin1_swedish_ci) |
|
[--] +-- ROWS : 0 |
|
[--] +-- DATA : 16.0K(100.00%) |
|
[--] +-- INDEX: 0B(0.00%) |
|
[--] +-- TOTAL: 16.0K |
|
[--] +-- ENGIN : 1 (InnoDB) |
|
[OK] 1 collation for travis database. |
|
[OK] 1 engine for travis database. |
|
[--] Charsets for travis database table column: |
|
[OK] travis table column(s) has same charset defined for all text like column(s). |
|
[--] Collations for travis database table column: |
|
[OK] travis table column(s) has same collation defined for all text like column(s). |
|
|
|
-------- Table Column Metrics ---------------------------------------------------------------------- |
|
[--] Database: travis |
|
[--] +-- TABLE: test |
|
[--] +-- Column test.id: |
|
[--] Current Fieldtype: INT(11) |
|
[--] Optimal Fieldtype: ENUM('4') NOT NULL |
|
[!!] Consider changing type for column id in table travis.test |
|
|
|
-------- Indexes Metrics --------------------------------------------------------------------------- |
|
[--] Worst selectivity indexes: |
|
|
|
-------- Security Recommendations ------------------------------------------------------------------ |
|
[OK] There are no anonymous accounts for any database users |
|
[!!] User '[email protected]' has no password set. |
|
[!!] User 'root@::1' has no password set. |
|
[!!] User 'root@a5ca16b8c093' has no password set. |
|
[!!] User 'root@localhost' has no password set. |
|
[!!] User 'travis@%' has no password set. |
|
[!!] User '[email protected]' has no password set. |
|
[!!] User 'travis@localhost' has no password set. |
|
[!!] User 'travis@%' does not specify hostname restrictions. |
|
[--] There are 612 basic passwords in the list. |
|
|
|
-------- CVE Security Recommendations -------------------------------------------------------------- |
|
[!!] CVE-2016-5584(<= 5.6.33) : "Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier |
|
[!!] CVE-2016-8318(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server |
|
[!!] CVE-2016-8327(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts)." |
|
[!!] CVE-2017-10155(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2017-10227(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2017-10268(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.57 and earlier |
|
[!!] CVE-2017-10276(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: FTS). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2017-10279(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2017-10283(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2017-10286(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2017-10294(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2017-10314(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2017-10378(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier |
|
[!!] CVE-2017-10379(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier |
|
[!!] CVE-2017-10384(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.57 and earlier 5.6.37 and earlier 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2017-15365(<= 5.6.36) : "sql/event_data_objects.cc in MariaDB before 10.1.30 and 10.2.x before 10.2.10 and Percona XtraDB Cluster before 5.6.37-26.21-3 and 5.7.x before 5.7.19-29.22-3 allows remote authenticated users with SQL access to bypass intended access restrictions and replicate data definition language (DDL) statements to cluster nodes by leveraging incorrect ordering of DDL replication and ACL checking." |
|
[!!] CVE-2017-3238(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier |
|
[!!] CVE-2017-3244(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.53 and earlier |
|
[!!] CVE-2017-3257(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.6.34 and earlier5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts)." |
|
[!!] CVE-2017-3258(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.53 and earlier |
|
[!!] CVE-2017-3265(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier |
|
[!!] CVE-2017-3273(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts)." |
|
[!!] CVE-2017-3291(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier |
|
[!!] CVE-2017-3305(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: C API). Supported versions that are affected are 5.5.55 and earlier and 5.6.35 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue allows man-in-the-middle attackers to hijack the authentication of users by leveraging incorrect ordering of security parameter verification in a client |
|
[!!] CVE-2017-3308(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier |
|
[!!] CVE-2017-3309(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier |
|
[!!] CVE-2017-3312(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier |
|
[!!] CVE-2017-3313(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: MyISAM). Supported versions that are affected are 5.5.53 and earlier |
|
[!!] CVE-2017-3317(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Logging). Supported versions that are affected are 5.5.53 and earlier |
|
[!!] CVE-2017-3318(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Error Handling). Supported versions that are affected are 5.5.53 and earlier |
|
[!!] CVE-2017-3329(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Thread Pooling). Supported versions that are affected are 5.5.54 and earlier |
|
[!!] CVE-2017-3450(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily ""exploitable"" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2017-3452(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.35 and earlier. Easily ""exploitable"" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2017-3453(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier |
|
[!!] CVE-2017-3456(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier |
|
[!!] CVE-2017-3461(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier |
|
[!!] CVE-2017-3462(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier |
|
[!!] CVE-2017-3463(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier |
|
[!!] CVE-2017-3464(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54 and earlier |
|
[!!] CVE-2017-3599(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily ""exploitable"" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue is an integer overflow in sql/auth/sql_authentication.cc which allows remote attackers to cause a denial of service via a crafted authentication packet." |
|
[!!] CVE-2017-3600(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier |
|
[!!] CVE-2017-3633(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Memcached to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update |
|
[!!] CVE-2017-3634(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2017-3636(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update |
|
[!!] CVE-2017-3641(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.56 and earlier |
|
[!!] CVE-2017-3647(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2017-3648(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.56 and earlier |
|
[!!] CVE-2017-3649(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2017-3651(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.56 and earlier |
|
[!!] CVE-2017-3652(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier |
|
[!!] CVE-2017-3653(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier |
|
[!!] CVE-2018-2562(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior |
|
[!!] CVE-2018-2573(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: GIS). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2018-2583(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Stored Procedure). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server |
|
[!!] CVE-2018-2590(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2018-2591(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2018-2612(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation |
|
[!!] CVE-2018-2622(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.58 and prior |
|
[!!] CVE-2018-2640(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior |
|
[!!] CVE-2018-2645(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)." |
|
[!!] CVE-2018-2647(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update |
|
[!!] CVE-2018-2665(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior |
|
[!!] CVE-2018-2668(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior |
|
[!!] CVE-2018-2696(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2018-2703(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2018-2755(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior |
|
[!!] CVE-2018-2758(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2018-2761(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior |
|
[!!] CVE-2018-2766(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2018-2771(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior |
|
[!!] CVE-2018-2773(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior |
|
[!!] CVE-2018-2781(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior |
|
[!!] CVE-2018-2782(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2018-2784(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2018-2787(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update |
|
[!!] CVE-2018-2805(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: GIS Extension). Supported versions that are affected are 5.6.39 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." |
|
[!!] CVE-2018-2813(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior |
|
[!!] CVE-2018-2817(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior |
|
[!!] CVE-2018-2818(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.5.59 and prior |
|
[!!] CVE-2018-2819(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior |
|
[!!] 80 CVE(s) found for your MySQL release. |
|
|
|
-------- Performance Metrics ----------------------------------------------------------------------- |
|
[--] Up for: 51s (119 q [2.333 qps], 42 conn, TX: 47K, RX: 12K) |
|
[--] Reads / Writes: 100% / 0% |
|
[--] Binary logging is disabled |
|
[--] Physical Memory : 59.0G |
|
[--] Max MySQL memory : 352.4M |
|
[--] Other process memory: 66.5M |
|
[--] Total buffers: 192.0M global + 1.1M per thread (151 max threads) |
|
[--] P_S Max memory usage: 0B |
|
[--] Galera GCache Max memory usage: 0B |
|
[OK] Maximum reached memory usage: 193.1M (0.32% of installed RAM) |
|
[OK] Maximum possible memory usage: 352.4M (0.58% of installed RAM) |
|
[OK] Overall possible memory usage with other process is compatible with memory available |
|
[OK] Slow queries: 0% (0/119) |
|
[OK] Highest usage of available connections: 0% (1/151) |
|
[OK] Aborted connections: 0.00% (0/42) |
|
[!!] name resolution is active : a reverse name resolution is made for each new connection and can reduce performance |
|
[!!] Query cache may be disabled by default due to mutex contention. |
|
[!!] Query cache efficiency: 0.0% (0 cached / 73 selects) |
|
[OK] Query cache prunes per day: 0 |
|
[OK] No Sort requiring temporary tables |
|
[OK] No joins without indexes |
|
[OK] Temporary tables created on disk: 19% (60 on disk / 311 total) |
|
[OK] Thread cache hit rate: 97% (1 created / 42 connections) |
|
[OK] Table cache hit rate: 92% (81 open / 88 opened) |
|
[OK] Open file limit used: 0% (46/1M) |
|
[OK] Table locks acquired immediately: 100% (95 immediate / 95 locks) |
|
|
|
-------- Performance schema ------------------------------------------------------------------------ |
|
[--] Performance schema is disabled. |
|
[--] Memory used by P_S: 0B |
|
[--] Sys schema isn't installed. |
|
|
|
-------- ThreadPool Metrics ------------------------------------------------------------------------ |
|
[--] ThreadPool stat is disabled. |
|
|
|
-------- MyISAM Metrics ---------------------------------------------------------------------------- |
|
[!!] Key buffer used: 18.2% (3M used / 16M cache) |
|
[OK] Key buffer size / total MyISAM indexes: 16.0M/104.0K |
|
|
|
-------- InnoDB Metrics ---------------------------------------------------------------------------- |
|
[--] InnoDB is enabled. |
|
[--] InnoDB Thread Concurrency: 0 |
|
[OK] InnoDB File per table is activated |
|
[OK] InnoDB buffer pool / data size: 128.0M/16.0K |
|
[!!] Ratio InnoDB log file size / InnoDB Buffer pool size (75 %): 48.0M * 2/128.0M should be equal 25% |
|
[!!] InnoDB buffer pool <= 1G and Innodb_buffer_pool_instances(!=1). |
|
[--] InnoDB Buffer Pool Chunk Size not used or defined in your version |
|
[!!] InnoDB Read buffer efficiency: 83.27% (901 hits/ 1082 total) |
|
[!!] InnoDB Write Log efficiency: 0% (1 hits/ 0 total) |
|
[OK] InnoDB log waits: 0.00% (0 waits / 1 writes) |
|
|
|
-------- AriaDB Metrics ---------------------------------------------------------------------------- |
|
[--] AriaDB is disabled. |
|
|
|
-------- TokuDB Metrics ---------------------------------------------------------------------------- |
|
[--] TokuDB is disabled. |
|
|
|
-------- XtraDB Metrics ---------------------------------------------------------------------------- |
|
[--] XtraDB is disabled. |
|
|
|
-------- RocksDB Metrics --------------------------------------------------------------------------- |
|
[--] RocksDB is disabled. |
|
|
|
-------- Spider Metrics ---------------------------------------------------------------------------- |
|
[--] Spider is disabled. |
|
|
|
-------- Connect Metrics --------------------------------------------------------------------------- |
|
[--] Connect is disabled. |
|
|
|
-------- Galera Metrics ---------------------------------------------------------------------------- |
|
[--] Galera is disabled. |
|
|
|
-------- Replication Metrics ----------------------------------------------------------------------- |
|
[--] Galera Synchronous replication: NO |
|
[--] No replication slave(s) for this server. |
|
[--] Binlog format: STATEMENT |
|
[--] XA support enabled: ON |
|
[--] Semi synchronous replication Master: Not Activated |
|
[--] Semi synchronous replication Slave: Not Activated |
|
[--] This is a standalone server |
|
|
|
-------- Recommendations --------------------------------------------------------------------------- |
|
General recommendations: |
|
ALTER TABLE travis.test MODIFY id ENUM('4') NOT NULL; |
|
Set up a Password for user with the following SQL statement ( SET PASSWORD FOR 'user'@'SpecificDNSorIp' = PASSWORD('secure_password'); ) |
|
Restrict Host for user@% to user@SpecificDNSorIp |
|
80 CVE(s) found for your MySQL release. Consider upgrading your version ! |
|
MySQL was started within the last 24 hours - recommendations may be inaccurate |
|
Configure your accounts with ip or subnets only, then update your configuration with skip-name-resolve=1 |
|
Performance schema should be activated for better diagnostics |
|
Consider installing Sys schema from https://github.com/mysql/mysql-sys |
|
Before changing innodb_log_file_size and/or innodb_log_files_in_group read this: http://bit.ly/2wgkDvS |
|
Variables to adjust: |
|
query_cache_size (=0) |
|
query_cache_type (=0) |
|
query_cache_limit (> 1M, or use smaller result sets) |
|
performance_schema = ON enable PFS |
|
innodb_log_file_size should be (=16M) if possible, so InnoDB total log files size equals to 25% of buffer pool size. |
|
innodb_buffer_pool_instances (=1) |
|
travis_time:end:153a884a:start=1528205135598893592,finish=1528205141058617924,duration=5459724332 |
|
The command "./mysqltuner.pl --idxstat --dbstat" exited with 0. |
|
Done. Your build exited with 1. |
|
|