Build Tweaks for Onboarding #2366
Build #05902 had test failures
Details
- Failed: 4 (0.00%)
- Passed: 365,854 (98.48%)
- Other: 5,635 (1.52%)
- Total: 371,493
- 29289 of 38576 lines covered (75.93%)
Annotations
Check failure on line 182 in build.proj
azure-pipelines / CI-SqlClient
build.proj#L182
build.proj(182,5): Error MSB3073: The command "C:\x86\dotnet test "src\Microsoft.Data.SqlClient\tests\FunctionalTests\Microsoft.Data.SqlClient.Tests.csproj" -p:Configuration=Release -p:TargetnetcoreVersion=net8.0 --no-build -v n --collect "Code coverage" -p:TestSet=3 --results-directory TestResults -p:TestTargetOS=Windowsnetcoreapp --filter "category!=nonnetcoreapptests&category!=failing&category!=nonwindowstests" "--logger:trx;LogFilePrefix=Functional-Windowsnetcoreapp-3"" exited with code 1.
Check failure on line 3416 in Build log
azure-pipelines / CI-SqlClient
Build log #L3416
Process 'msbuild.exe' exited with code '1'.
azure-pipelines / CI-SqlClient
Microsoft.Data.SqlClient.ManualTesting.Tests.CertificateTest.OpenningConnectionWithGoodCertificateTest
System.Exception : Could not generate certificate.Error out put: Certificate folder path is: C:\Certificates
Directory: C:\
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 2/28/2024 2:33 AM Certificates
Certificate created successfully
Certificate Thumbprint: F5CDDF009195AC1BCC45D6ED959EEFCBE7337169
Directory: C:\Certificates
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 2/28/2024 2:33 AM 855 SQLClientSelfSignedCertificate.cer
PSPath : Microsoft.PowerShell.Security\Certificate::LocalMachine\Root\F5CDDF009195AC1BCC45D6ED959EEFC
BE7337169
PSParentPath : Microsoft.PowerShell.Security\Certificate::LocalMachine\Root
PSChildName : F5CDDF009195AC1BCC45D6ED959EEFCBE7337169
PSIsContainer : False
Archived : False
Extensions : {System.Security.Cryptography.Oid, System.Security.Cryptography.Oid,
System.Security.Cryptography.Oid, System.Security.Cryptography.Oid}
FriendlyName :
IssuerName : System.Security.Cryptography.X509Certificates.X500DistinguishedName
NotAfter : 2/28/2027 2:33:48 AM
NotBefore : 2/28/2024 2:23:49 AM
HasPrivateKey : False
PrivateKey :
PublicKey : System.Security.Cryptography.X509Certificates.PublicKey
RawData : {48, 130, 3, 83...}
SerialNumber : 12458E7508C8D39C44EFC8F44B94F838
SubjectName : System.Security.Cryptography.X509Certificates.X500DistinguishedName
SignatureAlgorithm : System.Security.Cryptography.Oid
Thumbprint : F5CDDF009195AC1BCC45D6ED959EEFCBE7337169
Version : 3
Handle : 3074384182992
Issuer : CN=70fa78bec000000
Subject : CN=70fa78bec000000
EnhancedKeyUsageList : {Server Authentication (1.3.6.1.5.5.7.3.1)}
DnsNameList : {70fa78bec000000, localhost, SQLAliasName}
SendAsTrustedIssuer : False
EnrollmentPolicyEndPoint : Microsoft.CertificateServices.Commands.EnrollmentEndPointProperty
EnrollmentServerEndPoint : Microsoft.CertificateServices.Commands.EnrollmentEndPointProperty
PolicyId :
Raw output
at Microsoft.Data.SqlClient.ManualTesting.Tests.CertificateTest.CreateValidCertificate(String script) in /_/src/Microsoft.Data.SqlClient/tests/ManualTests/SQL/ConnectionTestWithSSLCert/CertificateTest.cs:line 233
at Microsoft.Data.SqlClient.ManualTesting.Tests.CertificateTest..ctor() in /_/src/Microsoft.Data.SqlClient/tests/ManualTests/SQL/ConnectionTestWithSSLCert/CertificateTest.cs:line 81
azure-pipelines / CI-SqlClient
Microsoft.Data.SqlClient.ManualTesting.Tests.TransactionPoolTest.BasicTransactionPoolTest(connectionString: "Data Source=adotest.database.windows.net;Initial C"···)
Test failed
azure-pipelines / CI-SqlClient
Microsoft.Data.SqlClient.Tests.SqlConnectionBasicTests.TransientFaultTest(errorCode: 42108)
Connection Timeout Expired. The timeout period elapsed during the post-login phase. The connection could have timed out while waiting for server to complete the login process and respond; Or it could have timed out while attempting to create multiple active connections. The duration spent while attempting to connect to this server was - [Pre-Login] initialization=2; handshake=22; [Login] initialization=0; authentication=1; [Post-Login] complete=14055;
Raw output
at Microsoft.Data.SqlClient.Tests.SqlConnectionBasicTests.TransientFaultTest(UInt32 errorCode) in /_/src/Microsoft.Data.SqlClient/tests/FunctionalTests/SqlConnectionBasicTests.cs:line 103
at System.RuntimeMethodHandle.InvokeMethod(Object target, Void** arguments, Signature sig, Boolean isConstructor)
at System.Reflection.MethodBaseInvoker.InvokeDirectByRefWithFewArgs(Object obj, Span`1 copyOfArgs, BindingFlags invokeAttr)
azure-pipelines / CI-SqlClient
Microsoft.Data.SqlClient.ManualTesting.Tests.CertificateTest.OpenningConnectionWithGoodCertificateTest
System.Exception : Could not generate certificate.Error out put: Certificate folder path is: C:\Certificates
Directory: C:\
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 2/28/2024 5:27 PM Certificates
Certificate created successfully
Certificate Thumbprint: F114A7CD077531E2E050BCE8A9D7805C9DA2E566
Directory: C:\Certificates
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 2/28/2024 5:27 PM 855 SQLClientSelfSignedCertificate.cer
PSPath : Microsoft.PowerShell.Security\Certificate::LocalMachine\Root\F114A7CD077531E2E050BCE8A9D7805
C9DA2E566
PSParentPath : Microsoft.PowerShell.Security\Certificate::LocalMachine\Root
PSChildName : F114A7CD077531E2E050BCE8A9D7805C9DA2E566
PSIsContainer : False
Archived : False
Extensions : {System.Security.Cryptography.Oid, System.Security.Cryptography.Oid,
System.Security.Cryptography.Oid, System.Security.Cryptography.Oid}
FriendlyName :
IssuerName : System.Security.Cryptography.X509Certificates.X500DistinguishedName
NotAfter : 2/28/2027 5:27:39 PM
NotBefore : 2/28/2024 5:17:39 PM
HasPrivateKey : False
PrivateKey :
PublicKey : System.Security.Cryptography.X509Certificates.PublicKey
RawData : {48, 130, 3, 83...}
SerialNumber : 68B6B040B2E56B8B4BFF5E798507E81E
SubjectName : System.Security.Cryptography.X509Certificates.X500DistinguishedName
SignatureAlgorithm : System.Security.Cryptography.Oid
Thumbprint : F114A7CD077531E2E050BCE8A9D7805C9DA2E566
Version : 3
Handle : 2117831214800
Issuer : CN=c2dd567bc000000
Subject : CN=c2dd567bc000000
EnhancedKeyUsageList : {Server Authentication (1.3.6.1.5.5.7.3.1)}
DnsNameList : {c2dd567bc000000, localhost, SQLAliasName}
SendAsTrustedIssuer : False
EnrollmentPolicyEndPoint : Microsoft.CertificateServices.Commands.EnrollmentEndPointProperty
EnrollmentServerEndPoint : Microsoft.CertificateServices.Commands.EnrollmentEndPointProperty
PolicyId :
Raw output
at Microsoft.Data.SqlClient.ManualTesting.Tests.CertificateTest.CreateValidCertificate(String script) in /_/src/Microsoft.Data.SqlClient/tests/ManualTests/SQL/ConnectionTestWithSSLCert/CertificateTest.cs:line 233
at Microsoft.Data.SqlClient.ManualTesting.Tests.CertificateTest..ctor() in /_/src/Microsoft.Data.SqlClient/tests/ManualTests/SQL/ConnectionTestWithSSLCert/CertificateTest.cs:line 81