Diff of the two buildlogs: -- --- b1/build.log 2024-01-06 11:47:31.812372359 +0000 +++ b2/build.log 2024-01-06 11:50:29.773234504 +0000 @@ -1,6 +1,6 @@ I: pbuilder: network access will be disabled during build -I: Current time: Fri Feb 7 06:08:27 -12 2025 -I: pbuilder-time-stamp: 1738951707 +I: Current time: Sat Feb 8 08:10:35 +14 2025 +I: pbuilder-time-stamp: 1738951835 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/bullseye-reproducible-base.tgz] I: copying local configuration @@ -17,7 +17,7 @@ I: copying [./notary_0.6.1~ds2-6.debian.tar.xz] I: Extracting source gpgv: unknown type of key resource 'trustedkeys.kbx' -gpgv: keyblock resource '/tmp/dpkg-verify-sig.SNrYQuGg/trustedkeys.kbx': General error +gpgv: keyblock resource '/tmp/dpkg-verify-sig.GJ6nrq4h/trustedkeys.kbx': General error gpgv: Signature made Sat Apr 18 01:51:52 2020 gpgv: using RSA key 50BC7CF939D20C272A6B065652B6BBD953968D1B gpgv: Can't check signature: No public key @@ -34,49 +34,80 @@ dpkg-source: info: applying remove-use-of-distributions-old-wrapped-context.patch I: using fakeroot in build. I: Installing the build-deps -I: user script /srv/workspace/pbuilder/25028/tmp/hooks/D02_print_environment starting +I: user script /srv/workspace/pbuilder/3056726/tmp/hooks/D01_modify_environment starting +debug: Running on codethink01-arm64. +I: Changing host+domainname to test build reproducibility +I: Adding a custom variable just for the fun of it... +I: Changing /bin/sh to bash +'/bin/sh' -> '/bin/bash' +lrwxrwxrwx 1 root root 9 Feb 7 18:10 /bin/sh -> /bin/bash +I: Setting pbuilder2's login shell to /bin/bash +I: Setting pbuilder2's GECOS to second user,second room,second work-phone,second home-phone,second other +I: user script /srv/workspace/pbuilder/3056726/tmp/hooks/D01_modify_environment finished +I: user script /srv/workspace/pbuilder/3056726/tmp/hooks/D02_print_environment starting I: set - BUILDDIR='/build/reproducible-path' - BUILDUSERGECOS='first user,first room,first work-phone,first home-phone,first other' - BUILDUSERNAME='pbuilder1' - BUILD_ARCH='arm64' - DEBIAN_FRONTEND='noninteractive' + BASH=/bin/sh + BASHOPTS=checkwinsize:cmdhist:complete_fullquote:extquote:force_fignore:globasciiranges:hostcomplete:interactive_comments:progcomp:promptvars:sourcepath + BASH_ALIASES=() + BASH_ARGC=() + BASH_ARGV=() + BASH_CMDS=() + BASH_LINENO=([0]="12" [1]="0") + BASH_SOURCE=([0]="/tmp/hooks/D02_print_environment" [1]="/tmp/hooks/D02_print_environment") + BASH_VERSINFO=([0]="5" [1]="1" [2]="4" [3]="1" [4]="release" [5]="aarch64-unknown-linux-gnu") + BASH_VERSION='5.1.4(1)-release' + BUILDDIR=/build/reproducible-path + BUILDUSERGECOS='second user,second room,second work-phone,second home-phone,second other' + BUILDUSERNAME=pbuilder2 + BUILD_ARCH=arm64 + DEBIAN_FRONTEND=noninteractive DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all,-fixfilepath parallel=12 ' - DISTRIBUTION='bullseye' - HOME='/root' - HOST_ARCH='arm64' + DIRSTACK=() + DISTRIBUTION=bullseye + EUID=0 + FUNCNAME=([0]="Echo" [1]="main") + GROUPS=() + HOME=/root + HOSTNAME=i-capture-the-hostname + HOSTTYPE=aarch64 + HOST_ARCH=arm64 IFS=' ' - INVOCATION_ID='24be8f07fdf649e9a820982a3a07a3c8' - LANG='C' - LANGUAGE='en_US:en' - LC_ALL='C' - MAIL='/var/mail/root' - OPTIND='1' - PATH='/usr/sbin:/usr/bin:/sbin:/bin:/usr/games' - PBCURRENTCOMMANDLINEOPERATION='build' - PBUILDER_OPERATION='build' - PBUILDER_PKGDATADIR='/usr/share/pbuilder' - PBUILDER_PKGLIBDIR='/usr/lib/pbuilder' - PBUILDER_SYSCONFDIR='/etc' - PPID='25028' - PS1='# ' - PS2='> ' + INVOCATION_ID=5e93c0a7ba714f10b50b224f43e91879 + LANG=C + LANGUAGE=nl_BE:nl + LC_ALL=C + MACHTYPE=aarch64-unknown-linux-gnu + MAIL=/var/mail/root + OPTERR=1 + OPTIND=1 + OSTYPE=linux-gnu + PATH=/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path + PBCURRENTCOMMANDLINEOPERATION=build + PBUILDER_OPERATION=build + PBUILDER_PKGDATADIR=/usr/share/pbuilder + PBUILDER_PKGLIBDIR=/usr/lib/pbuilder + PBUILDER_SYSCONFDIR=/etc + PIPESTATUS=([0]="0") + POSIXLY_CORRECT=y + PPID=3056726 PS4='+ ' - PWD='/' - SHELL='/bin/bash' - SHLVL='2' - SUDO_COMMAND='/usr/bin/timeout -k 18.1h 18h /usr/bin/ionice -c 3 /usr/bin/nice /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.Cl8PMZ9k/pbuilderrc_LLN3 --distribution bullseye --hookdir /etc/pbuilder/first-build-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/bullseye-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.Cl8PMZ9k/b1 --logfile b1/build.log notary_0.6.1~ds2-6.dsc' - SUDO_GID='109' - SUDO_UID='104' - SUDO_USER='jenkins' - TERM='unknown' - TZ='/usr/share/zoneinfo/Etc/GMT+12' - USER='root' - _='/usr/bin/systemd-run' - http_proxy='http://192.168.101.104:3128' + PWD=/ + SHELL=/bin/bash + SHELLOPTS=braceexpand:errexit:hashall:interactive-comments:posix + SHLVL=3 + SUDO_COMMAND='/usr/bin/timeout -k 24.1h 24h /usr/bin/ionice -c 3 /usr/bin/nice -n 11 /usr/bin/unshare --uts -- /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.Cl8PMZ9k/pbuilderrc_W0PM --distribution bullseye --hookdir /etc/pbuilder/rebuild-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/bullseye-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.Cl8PMZ9k/b2 --logfile b2/build.log notary_0.6.1~ds2-6.dsc' + SUDO_GID=109 + SUDO_UID=104 + SUDO_USER=jenkins + TERM=unknown + TZ=/usr/share/zoneinfo/Etc/GMT-14 + UID=0 + USER=root + _='I: set' + http_proxy=http://192.168.101.104:3128 I: uname -a - Linux codethink03-arm64 6.1.0-17-cloud-arm64 #1 SMP Debian 6.1.69-1 (2023-12-30) aarch64 GNU/Linux + Linux i-capture-the-hostname 6.1.0-17-cloud-arm64 #1 SMP Debian 6.1.69-1 (2023-12-30) aarch64 GNU/Linux I: ls -l /bin total 5252 -rwxr-xr-x 1 root root 1282512 Mar 27 2022 bash @@ -136,7 +167,7 @@ -rwxr-xr-x 1 root root 43880 Sep 22 2020 rmdir -rwxr-xr-x 1 root root 19208 Sep 27 2020 run-parts -rwxr-xr-x 1 root root 114016 Dec 22 2018 sed - lrwxrwxrwx 1 root root 4 Jan 8 15:47 sh -> dash + lrwxrwxrwx 1 root root 9 Feb 7 18:10 sh -> /bin/bash -rwxr-xr-x 1 root root 35656 Sep 22 2020 sleep -rwxr-xr-x 1 root root 72640 Sep 22 2020 stty -rwsr-xr-x 1 root root 67776 Jan 20 2022 su @@ -162,7 +193,7 @@ -rwxr-xr-x 1 root root 2206 Apr 10 2022 zless -rwxr-xr-x 1 root root 1842 Apr 10 2022 zmore -rwxr-xr-x 1 root root 4577 Apr 10 2022 znew -I: user script /srv/workspace/pbuilder/25028/tmp/hooks/D02_print_environment finished +I: user script /srv/workspace/pbuilder/3056726/tmp/hooks/D02_print_environment finished -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy @@ -455,7 +486,7 @@ Get: 203 http://deb.debian.org/debian bullseye/main arm64 golang-gopkg-fatih-pool.v2-dev all 0.0~git20171010.010e0b7-3 [5612 B] Get: 204 http://deb.debian.org/debian bullseye/main arm64 golang-gopkg-gorethink-gorethink.v3-dev all 3.0.5-1.1 [113 kB] Get: 205 http://deb.debian.org/debian bullseye/main arm64 openssl arm64 1.1.1w-0+deb11u1 [837 kB] -Fetched 110 MB in 4s (30.9 MB/s) +Fetched 110 MB in 1s (183 MB/s) debconf: delaying package configuration, since apt-utils is not installed Selecting previously unselected package bsdextrautils. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17734 files and directories currently installed.) @@ -1297,7 +1328,11 @@ fakeroot is already the newest version (1.25.3-1.1). 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. I: Building the package -I: Running cd /build/reproducible-path/notary-0.6.1~ds2/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-genchanges -S > ../notary_0.6.1~ds2-6_source.changes +I: user script /srv/workspace/pbuilder/3056726/tmp/hooks/A99_set_merged_usr starting +Not re-configuring usrmerge for bullseye +I: user script /srv/workspace/pbuilder/3056726/tmp/hooks/A99_set_merged_usr finished +hostname: Name or service not known +I: Running cd /build/reproducible-path/notary-0.6.1~ds2/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-genchanges -S > ../notary_0.6.1~ds2-6_source.changes dpkg-buildpackage: info: source package notary dpkg-buildpackage: info: source version 0.6.1~ds2-6 dpkg-buildpackage: info: source distribution unstable @@ -1325,15 +1360,15 @@ sed -i '/command -v cfssljson/i exit 0' ./fixtures/regenerateTestingCerts.sh cd fixtures && ./regenerateTestingCerts.sh Generating RSA private key, 4096 bit long modulus (2 primes) -............................................................................++++ -.............++++ +.................................................................++++ +.........................................++++ e is 65537 (0x010001) Signature ok subject=C = US, ST = CA, L = San Francisco, O = Docker, CN = Notary Testing CA Getting Private key Generating RSA private key, 4096 bit long modulus (2 primes) -.................................................................................................................................................................................................++++ -...........++++ +............................++++ +............................................................................++++ e is 65537 (0x010001) Signature ok subject=C = US, ST = CA, L = San Francisco, O = Docker, CN = Notary Intermediate Testing CA @@ -1362,129 +1397,130 @@ make[1]: Entering directory '/build/reproducible-path/notary-0.6.1~ds2' dh_auto_build -- -tags "pkcs11" cd _build && go install -trimpath -v -p 12 -tags pkcs11 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version +internal/race +internal/cpu internal/unsafeheader -unicode +unicode/utf16 runtime/internal/sys -internal/race -golang.org/x/sys/internal/unsafeheader +math/bits encoding unicode/utf8 -internal/cpu -unicode/utf16 +unicode +golang.org/x/sys/internal/unsafeheader +runtime/internal/atomic +sync/atomic crypto/internal/subtle crypto/subtle -runtime/internal/atomic +runtime/internal/math vendor/golang.org/x/crypto/cryptobyte/asn1 internal/nettrace -sync/atomic -runtime/internal/math -math/bits container/list +internal/bytealg +math vendor/golang.org/x/crypto/internal/subtle +runtime/cgo google.golang.org/grpc/serviceconfig -internal/bytealg github.com/theupdateframework/notary/version -runtime/cgo github.com/lib/pq/oid -math internal/testlog runtime internal/reflectlite sync -math/rand internal/singleflight google.golang.org/grpc/internal/buffer google.golang.org/grpc/internal/grpcsync +math/rand errors sort io -strconv internal/oserror vendor/golang.org/x/net/dns/dnsmessage github.com/hashicorp/hcl/hcl/strconv +strconv syscall github.com/beorn7/perks/quantile hash -strings -crypto/internal/randutil -text/tabwriter bytes +text/tabwriter +crypto/internal/randutil +strings crypto/hmac -hash/fnv hash/crc32 +hash/fnv +golang.org/x/crypto/pbkdf2 +vendor/golang.org/x/crypto/hkdf crypto reflect +crypto/rc4 golang.org/x/crypto/blowfish encoding/base32 -crypto/rc4 -golang.org/x/crypto/pbkdf2 -vendor/golang.org/x/crypto/hkdf vendor/golang.org/x/text/transform golang.org/x/text/transform github.com/dvsekhvalnov/jose2go/padding bufio path -html regexp/syntax -github.com/prometheus/common/internal/bitbucket.org/ww/goautoneg +html google.golang.org/grpc/encoding +github.com/prometheus/common/internal/bitbucket.org/ww/goautoneg +internal/syscall/execenv internal/syscall/unix time -internal/syscall/execenv regexp context -internal/poll -google.golang.org/grpc/backoff google.golang.org/grpc/internal/grpcrand google.golang.org/grpc/keepalive +google.golang.org/grpc/backoff github.com/bugsnag/bugsnag-go/headers -google.golang.org/grpc/internal/backoff +internal/poll github.com/jinzhu/inflection -encoding/binary -internal/fmtsort +google.golang.org/grpc/internal/backoff golang.org/x/net/context google.golang.org/grpc/tap github.com/cenkalti/backoff +internal/fmtsort +encoding/binary os crypto/md5 encoding/base64 crypto/cipher crypto/sha256 -crypto/sha512 -crypto/sha1 -crypto/ed25519/internal/edwards25519 golang.org/x/sys/unix +crypto/ed25519/internal/edwards25519 +crypto/sha1 vendor/golang.org/x/crypto/poly1305 github.com/cespare/xxhash +crypto/sha512 encoding/pem github.com/dvsekhvalnov/jose2go/base64url -crypto/aes -crypto/des -vendor/golang.org/x/crypto/chacha20 github.com/dvsekhvalnov/jose2go/compact -path/filepath -google.golang.org/grpc/internal/envconfig fmt +path/filepath net +google.golang.org/grpc/internal/envconfig github.com/bugsnag/bugsnag-go/device os/signal github.com/theupdateframework/notary +crypto/aes +crypto/des +vendor/golang.org/x/crypto/chacha20 runtime/debug -vendor/golang.org/x/crypto/chacha20poly1305 io/ioutil github.com/spf13/afero/mem os/exec github.com/prometheus/procfs/internal/util -encoding/json -math/big -github.com/docker/go/canonical/json -encoding/hex -mime/quotedprintable +vendor/golang.org/x/crypto/chacha20poly1305 +github.com/bugsnag/panicwrap log +encoding/hex net/url -mime -compress/flate +math/big +mime/quotedprintable vendor/golang.org/x/crypto/curve25519 +github.com/docker/go/canonical/json +compress/flate +encoding/json +mime vendor/golang.org/x/text/unicode/norm vendor/golang.org/x/net/http2/hpack vendor/golang.org/x/text/unicode/bidi @@ -1492,30 +1528,27 @@ github.com/miekg/pkcs11 flag encoding/csv +compress/gzip github.com/fsnotify/fsnotify github.com/hashicorp/hcl/hcl/token vendor/golang.org/x/text/secure/bidirule +golang.org/x/text/unicode/norm +text/template/parse +github.com/spf13/jwalterweatherman github.com/hashicorp/hcl/hcl/ast github.com/hashicorp/hcl/hcl/scanner github.com/hashicorp/hcl/json/token -compress/gzip -golang.org/x/text/unicode/norm +github.com/subosito/gotenv github.com/sirupsen/logrus github.com/theupdateframework/notary/tuf/validation -text/template/parse -github.com/spf13/jwalterweatherman -github.com/hashicorp/hcl/json/scanner vendor/golang.org/x/net/idna -github.com/hashicorp/hcl/hcl/parser -github.com/subosito/gotenv -github.com/hashicorp/hcl/json/parser +github.com/hashicorp/hcl/json/scanner gopkg.in/ini.v1 gopkg.in/yaml.v2 -github.com/hashicorp/hcl/hcl/printer +github.com/hashicorp/hcl/hcl/parser github.com/golang/protobuf/proto -github.com/hashicorp/hcl -golang.org/x/net/internal/timeseries -google.golang.org/grpc/grpclog +github.com/hashicorp/hcl/json/parser +github.com/hashicorp/hcl/hcl/printer crypto/rand crypto/elliptic encoding/asn1 @@ -1523,87 +1556,89 @@ github.com/docker/distribution/uuid crypto/rsa crypto/ed25519 +github.com/hashicorp/hcl github.com/pelletier/go-toml text/template -google.golang.org/grpc/connectivity golang.org/x/crypto/ed25519 -google.golang.org/grpc/internal +golang.org/x/net/internal/timeseries +google.golang.org/grpc/grpclog google.golang.org/grpc/metadata -google.golang.org/grpc/attributes vendor/golang.org/x/crypto/cryptobyte crypto/x509/pkix +google.golang.org/grpc/attributes google.golang.org/grpc/codes -golang.org/x/text/unicode/bidi +google.golang.org/grpc/connectivity google.golang.org/grpc/internal/balancerload +golang.org/x/text/unicode/bidi golang.org/x/net/http2/hpack github.com/pkg/errors -github.com/bugsnag/panicwrap database/sql/driver -github.com/bugsnag/bugsnag-go/errors +google.golang.org/grpc/internal github.com/opencontainers/go-digest -github.com/opencontainers/image-spec/specs-go -golang.org/x/text/secure/bidirule +crypto/ecdsa +github.com/bugsnag/bugsnag-go/errors html/template +github.com/opencontainers/image-spec/specs-go github.com/prometheus/common/model github.com/prometheus/procfs/internal/fs -golang.org/x/term -database/sql +golang.org/x/text/secure/bidirule github.com/docker/distribution/digestset -crypto/ecdsa github.com/opencontainers/image-spec/specs-go/v1 +golang.org/x/term +database/sql golang.org/x/net/idna golang.org/x/crypto/bcrypt -github.com/docker/distribution/reference github.com/lib/pq/scram +github.com/docker/distribution/reference os/user +go/token golang.org/x/crypto/ssh/terminal +github.com/hailocab/go-hostpool +github.com/theupdateframework/notary/passphrase +gopkg.in/gorethink/gorethink.v3/encoding +gopkg.in/gorethink/gorethink.v3/types +go/scanner +internal/profile github.com/golang/protobuf/ptypes/empty +github.com/spf13/cast google.golang.org/grpc/encoding/proto github.com/golang/protobuf/ptypes/any github.com/golang/protobuf/ptypes/duration github.com/golang/protobuf/ptypes/timestamp github.com/matttproud/golang_protobuf_extensions/pbutil -github.com/theupdateframework/notary/passphrase -google.golang.org/genproto/googleapis/rpc/status -go/token -github.com/hailocab/go-hostpool -github.com/spf13/cast +go/ast github.com/prometheus/client_model/go +google.golang.org/genproto/googleapis/rpc/status +gopkg.in/gorethink/gorethink.v3/ql2 github.com/golang/protobuf/ptypes google.golang.org/grpc/binarylog/grpc_binarylog_v1 -gopkg.in/gorethink/gorethink.v3/encoding -gopkg.in/gorethink/gorethink.v3/ql2 -gopkg.in/gorethink/gorethink.v3/types -google.golang.org/grpc/status -go/scanner -internal/profile runtime/pprof -github.com/prometheus/client_golang/prometheus/internal runtime/trace +github.com/prometheus/client_golang/prometheus/internal github.com/dvsekhvalnov/jose2go/arrays github.com/davecgh/go-spew/spew +google.golang.org/grpc/status github.com/pmezard/go-difflib/difflib -github.com/dvsekhvalnov/jose2go/aes -github.com/dvsekhvalnov/jose2go/kdf gopkg.in/yaml.v3 -go/ast testing -crypto/x509 -net/textproto +github.com/dvsekhvalnov/jose2go/aes +github.com/dvsekhvalnov/jose2go/kdf +github.com/jinzhu/gorm vendor/golang.org/x/net/http/httpproxy -github.com/mitchellh/mapstructure -github.com/spf13/pflag -google.golang.org/grpc/credentials/internal google.golang.org/grpc/internal/binarylog +net/textproto +google.golang.org/grpc/credentials/internal +github.com/mitchellh/mapstructure +crypto/x509 google.golang.org/grpc/internal/syscall +github.com/spf13/pflag google.golang.org/grpc/stats google.golang.org/grpc/naming +github.com/gofrs/uuid +github.com/prometheus/procfs mime/multipart vendor/golang.org/x/net/http/httpguts golang.org/x/net/http/httpguts -github.com/gofrs/uuid -github.com/prometheus/procfs -github.com/jinzhu/gorm gopkg.in/fatih/pool.v2 github.com/theupdateframework/notary/tuf/data github.com/dvsekhvalnov/jose2go/keys/ecc @@ -1614,71 +1649,71 @@ github.com/theupdateframework/notary/tuf/utils net/http/httptrace google.golang.org/grpc/credentials -github.com/lib/pq github.com/docker/go-connections/tlsconfig -github.com/go-sql-driver/mysql +github.com/lib/pq github.com/docker/libtrust +github.com/go-sql-driver/mysql gopkg.in/dancannon/gorethink.v3 net/http google.golang.org/grpc/resolver -google.golang.org/grpc/internal/channelz google.golang.org/grpc/peer +google.golang.org/grpc/internal/channelz google.golang.org/grpc/balancer google.golang.org/grpc/internal/resolver/dns google.golang.org/grpc/internal/resolver/passthrough google.golang.org/grpc/balancer/base google.golang.org/grpc/balancer/roundrobin github.com/theupdateframework/notary/storage/rethinkdb -github.com/magiconair/properties golang.org/x/net/trace +github.com/magiconair/properties github.com/docker/distribution -github.com/spf13/afero -golang.org/x/net/http2 github.com/docker/distribution/registry/auth +github.com/docker/distribution/registry/api/errcode github.com/bugsnag/bugsnag-go/sessions -net/http/httputil github.com/gorilla/mux -github.com/docker/distribution/registry/api/errcode +golang.org/x/net/http2 +net/http/httputil github.com/theupdateframework/notary/storage +github.com/spf13/afero github.com/docker/distribution/registry/client/auth/challenge github.com/docker/distribution/registry/client/transport +github.com/bugsnag/bugsnag-go expvar github.com/prometheus/common/expfmt -github.com/bugsnag/bugsnag-go github.com/theupdateframework/notary/server/errors -net/http/pprof github.com/docker/distribution/context github.com/docker/distribution/registry/api/v2 +net/http/pprof net/http/httptest github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/server/storage -github.com/theupdateframework/notary/cryptoservice -github.com/theupdateframework/notary/tuf/signed -github.com/docker/distribution/health -github.com/docker/distribution/registry/auth/htpasswd -github.com/docker/distribution/registry/auth/token github.com/Shopify/logrus-bugsnag github.com/stretchr/testify/assert +github.com/docker/distribution/health +github.com/docker/distribution/registry/auth/token +github.com/docker/distribution/registry/auth/htpasswd github.com/spf13/viper -github.com/prometheus/client_golang/prometheus +github.com/theupdateframework/notary/cryptoservice +github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/vendor/github.com/prometheus/client_golang/prometheus +github.com/prometheus/client_golang/prometheus github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/tuf/testutils/keys -github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/utils -google.golang.org/grpc/internal/transport +github.com/theupdateframework/notary/tuf github.com/stretchr/testify/require -github.com/prometheus/client_golang/prometheus/promhttp -github.com/theupdateframework/notary/client +google.golang.org/grpc/internal/transport +github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/server/snapshot -github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/tuf/testutils +github.com/theupdateframework/notary/client +github.com/prometheus/client_golang/prometheus/promhttp +github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/server/handlers -github.com/theupdateframework/notary/tuf/testutils/interfaces -github.com/docker/go-metrics github.com/theupdateframework/notary/server +github.com/docker/go-metrics github.com/docker/distribution/metrics google.golang.org/grpc github.com/docker/distribution/registry/storage/cache @@ -1701,21 +1736,21 @@ cd _build && go test -vet=off -v -p 12 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version ? github.com/theupdateframework/notary [no test files] === RUN Test0Dot1Migration ---- PASS: Test0Dot1Migration (0.04s) +--- PASS: Test0Dot1Migration (0.01s) === RUN Test0Dot3Migration ---- PASS: Test0Dot3Migration (0.01s) +--- PASS: Test0Dot3Migration (0.00s) === RUN Test0Dot1RepoFormat -time="2025-02-07T18:09:28Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: Test0Dot1RepoFormat (0.21s) +time="2025-02-07T18:11:33Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: Test0Dot1RepoFormat (0.17s) === RUN Test0Dot3RepoFormat -time="2025-02-07T18:09:28Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: Test0Dot3RepoFormat (0.12s) +time="2025-02-07T18:11:33Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: Test0Dot3RepoFormat (0.19s) === RUN TestDownloading0Dot1RepoFormat ---- PASS: TestDownloading0Dot1RepoFormat (0.00s) +--- PASS: TestDownloading0Dot1RepoFormat (0.01s) === RUN TestDownloading0Dot3RepoFormat --- PASS: TestDownloading0Dot3RepoFormat (0.01s) === RUN TestInitRepositoryManagedRolesIncludingRoot ---- PASS: TestInitRepositoryManagedRolesIncludingRoot (0.00s) +--- PASS: TestInitRepositoryManagedRolesIncludingRoot (0.01s) === RUN TestInitRepositoryManagedRolesInvalidRole --- PASS: TestInitRepositoryManagedRolesInvalidRole (0.00s) === RUN TestInitRepositoryManagedRolesIncludingTargets @@ -1723,43 +1758,43 @@ === RUN TestInitRepositoryManagedRolesIncludingTimestamp --- PASS: TestInitRepositoryManagedRolesIncludingTimestamp (0.01s) === RUN TestInitRepositoryWithCerts ---- PASS: TestInitRepositoryWithCerts (0.01s) +--- PASS: TestInitRepositoryWithCerts (0.02s) === RUN TestMatchKeyIDsWithPublicKeys ---- PASS: TestMatchKeyIDsWithPublicKeys (0.00s) +--- PASS: TestMatchKeyIDsWithPublicKeys (0.01s) === RUN TestInitRepositoryNeedsRemoteTimestampKey ---- PASS: TestInitRepositoryNeedsRemoteTimestampKey (0.01s) +--- PASS: TestInitRepositoryNeedsRemoteTimestampKey (0.02s) === RUN TestInitRepositoryNeedsRemoteSnapshotKey ---- PASS: TestInitRepositoryNeedsRemoteSnapshotKey (0.00s) +--- PASS: TestInitRepositoryNeedsRemoteSnapshotKey (0.01s) === RUN TestInitRepoServerOnlyManagesTimestampKey ---- PASS: TestInitRepoServerOnlyManagesTimestampKey (0.05s) +--- PASS: TestInitRepoServerOnlyManagesTimestampKey (0.13s) === RUN TestInitRepoServerManagesTimestampAndSnapshotKeys ---- PASS: TestInitRepoServerManagesTimestampAndSnapshotKeys (0.05s) +--- PASS: TestInitRepoServerManagesTimestampAndSnapshotKeys (0.11s) === RUN TestInitRepoAttemptsExceeded ---- PASS: TestInitRepoAttemptsExceeded (0.04s) +--- PASS: TestInitRepoAttemptsExceeded (0.07s) === RUN TestInitRepoPasswordInvalid ---- PASS: TestInitRepoPasswordInvalid (0.00s) +--- PASS: TestInitRepoPasswordInvalid (0.01s) === RUN TestAddTargetToTargetRoleByDefault ---- PASS: TestAddTargetToTargetRoleByDefault (0.02s) +--- PASS: TestAddTargetToTargetRoleByDefault (0.04s) === RUN TestAddTargetToSpecifiedValidRoles ---- PASS: TestAddTargetToSpecifiedValidRoles (0.02s) +--- PASS: TestAddTargetToSpecifiedValidRoles (0.04s) === RUN TestAddTargetToSpecifiedInvalidRoles ---- PASS: TestAddTargetToSpecifiedInvalidRoles (0.02s) +--- PASS: TestAddTargetToSpecifiedInvalidRoles (0.04s) === RUN TestAddTargetWithInvalidTarget ---- PASS: TestAddTargetWithInvalidTarget (0.01s) +--- PASS: TestAddTargetWithInvalidTarget (0.02s) === RUN TestAddTargetErrorWritingChanges ---- PASS: TestAddTargetErrorWritingChanges (0.01s) +--- PASS: TestAddTargetErrorWritingChanges (0.02s) === RUN TestRemoveTargetToTargetRoleByDefault ---- PASS: TestRemoveTargetToTargetRoleByDefault (0.02s) +--- PASS: TestRemoveTargetToTargetRoleByDefault (0.04s) === RUN TestRemoveTargetFromSpecifiedValidRoles ---- PASS: TestRemoveTargetFromSpecifiedValidRoles (0.03s) +--- PASS: TestRemoveTargetFromSpecifiedValidRoles (0.04s) === RUN TestRemoveTargetToSpecifiedInvalidRoles ---- PASS: TestRemoveTargetToSpecifiedInvalidRoles (0.02s) +--- PASS: TestRemoveTargetToSpecifiedInvalidRoles (0.04s) === RUN TestRemoveTargetErrorWritingChanges ---- PASS: TestRemoveTargetErrorWritingChanges (0.01s) +--- PASS: TestRemoveTargetErrorWritingChanges (0.02s) === RUN TestListTarget ---- PASS: TestListTarget (0.44s) +--- PASS: TestListTarget (0.57s) === RUN TestListTargetRestrictsDelegationPaths ---- PASS: TestListTargetRestrictsDelegationPaths (0.09s) +--- PASS: TestListTargetRestrictsDelegationPaths (0.08s) === RUN TestValidateRootKey --- PASS: TestValidateRootKey (0.06s) === RUN TestGetChangelist @@ -1767,54 +1802,54 @@ === RUN TestPublishBareRepo --- PASS: TestPublishBareRepo (0.56s) === RUN TestPublishUninitializedRepo -time="2025-02-07T18:09:30Z" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time" +time="2025-02-07T18:11:35Z" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time" --- PASS: TestPublishUninitializedRepo (0.04s) === RUN TestPublishClientHasSnapshotKey ---- PASS: TestPublishClientHasSnapshotKey (0.44s) +--- PASS: TestPublishClientHasSnapshotKey (0.48s) === RUN TestPublishAfterInitServerHasSnapshotKey ---- PASS: TestPublishAfterInitServerHasSnapshotKey (0.50s) +--- PASS: TestPublishAfterInitServerHasSnapshotKey (0.47s) === RUN TestPublishAfterPullServerHasSnapshotKey ---- PASS: TestPublishAfterPullServerHasSnapshotKey (0.19s) +--- PASS: TestPublishAfterPullServerHasSnapshotKey (0.17s) === RUN TestPublishNoOneHasSnapshotKey ---- PASS: TestPublishNoOneHasSnapshotKey (0.12s) +--- PASS: TestPublishNoOneHasSnapshotKey (0.11s) === RUN TestPublishSnapshotCorrupt ---- PASS: TestPublishSnapshotCorrupt (0.26s) +--- PASS: TestPublishSnapshotCorrupt (0.24s) === RUN TestPublishTargetsCorrupt --- PASS: TestPublishTargetsCorrupt (0.12s) === RUN TestPublishRootCorrupt -time="2025-02-07T18:09:32Z" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')" -time="2025-02-07T18:09:32Z" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')" +time="2025-02-07T18:11:37Z" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')" +time="2025-02-07T18:11:37Z" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')" --- PASS: TestPublishRootCorrupt (0.09s) === RUN TestPublishSnapshotLocalKeysCreatedFirst --- PASS: TestPublishSnapshotLocalKeysCreatedFirst (0.01s) === RUN TestPublishDelegations --- PASS: TestPublishDelegations (0.18s) === RUN TestPublishDelegationsX509 ---- PASS: TestPublishDelegationsX509 (0.20s) +--- PASS: TestPublishDelegationsX509 (0.18s) === RUN TestPublishTargetsDelegationScopeFailIfNoKeys -time="2025-02-07T18:09:32Z" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist" -time="2025-02-07T18:09:32Z" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist" ---- PASS: TestPublishTargetsDelegationScopeFailIfNoKeys (0.16s) +time="2025-02-07T18:11:37Z" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist" +time="2025-02-07T18:11:37Z" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist" +--- PASS: TestPublishTargetsDelegationScopeFailIfNoKeys (0.14s) === RUN TestPublishTargetsDelegationSuccessLocallyHasRoles ---- PASS: TestPublishTargetsDelegationSuccessLocallyHasRoles (0.14s) +--- PASS: TestPublishTargetsDelegationSuccessLocallyHasRoles (0.16s) === RUN TestPublishTargetsDelegationNoTargetsKeyNeeded ---- PASS: TestPublishTargetsDelegationNoTargetsKeyNeeded (0.17s) +--- PASS: TestPublishTargetsDelegationNoTargetsKeyNeeded (0.18s) === RUN TestPublishTargetsDelegationSuccessNeedsToDownloadRoles ---- PASS: TestPublishTargetsDelegationSuccessNeedsToDownloadRoles (0.20s) +--- PASS: TestPublishTargetsDelegationSuccessNeedsToDownloadRoles (0.18s) === RUN TestPublishTargetsDelegationFromTwoRepos ---- PASS: TestPublishTargetsDelegationFromTwoRepos (0.18s) +--- PASS: TestPublishTargetsDelegationFromTwoRepos (0.16s) === RUN TestPublishRemoveDelegationKeyFromDelegationRole -time="2025-02-07T18:09:33Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2025-02-07T18:09:33Z" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: 461e7051fe6479448d9483b6a51fb458849dcdeacff7a63069b781723985cbfd" ---- PASS: TestPublishRemoveDelegationKeyFromDelegationRole (0.12s) +time="2025-02-07T18:11:38Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-07T18:11:38Z" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: c08c9d224ad446520ae9e8ff75873af537f83c734e427fb90b834a0d7371edf1" +--- PASS: TestPublishRemoveDelegationKeyFromDelegationRole (0.11s) === RUN TestPublishRemoveDelegation -time="2025-02-07T18:09:33Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2025-02-07T18:09:33Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2025-02-07T18:09:33Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2025-02-07T18:09:33Z" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: " +time="2025-02-07T18:11:38Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-07T18:11:38Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-07T18:11:38Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-07T18:11:38Z" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: " --- PASS: TestPublishRemoveDelegation (0.11s) === RUN TestPublishSucceedsDespiteDelegationCorrupt ---- PASS: TestPublishSucceedsDespiteDelegationCorrupt (0.11s) +--- PASS: TestPublishSucceedsDespiteDelegationCorrupt (0.13s) === RUN TestRotateKeyInvalidRole --- PASS: TestRotateKeyInvalidRole (0.06s) === RUN TestRemoteRotationError @@ -1822,26 +1857,26 @@ === RUN TestRemoteRotationEndpointError --- PASS: TestRemoteRotationEndpointError (0.04s) === RUN TestRemoteRotationNoRootKey ---- PASS: TestRemoteRotationNoRootKey (0.09s) +--- PASS: TestRemoteRotationNoRootKey (0.07s) === RUN TestRemoteRotationNoInit -time="2025-02-07T18:09:34Z" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time" ---- PASS: TestRemoteRotationNoInit (0.04s) +time="2025-02-07T18:11:39Z" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time" +--- PASS: TestRemoteRotationNoInit (0.05s) === RUN TestRotateBeforePublishFromRemoteKeyToLocalKey --- PASS: TestRotateBeforePublishFromRemoteKeyToLocalKey (0.19s) === RUN TestRotateKeyAfterPublishNoServerManagementChange ---- PASS: TestRotateKeyAfterPublishNoServerManagementChange (0.60s) +--- PASS: TestRotateKeyAfterPublishNoServerManagementChange (0.54s) === RUN TestRotateKeyAfterPublishServerManagementChange ---- PASS: TestRotateKeyAfterPublishServerManagementChange (0.69s) +--- PASS: TestRotateKeyAfterPublishServerManagementChange (0.61s) === RUN TestRotateRootKey ---- PASS: TestRotateRootKey (0.17s) +--- PASS: TestRotateRootKey (0.18s) === RUN TestRotateRootMultiple ---- PASS: TestRotateRootMultiple (0.21s) +--- PASS: TestRotateRootMultiple (0.24s) === RUN TestRotateRootKeyProvided --- PASS: TestRotateRootKeyProvided (0.18s) === RUN TestRotateRootKeyLegacySupport --- PASS: TestRotateRootKeyLegacySupport (0.27s) === RUN TestRemoteServerUnavailableNoLocalCache -time="2025-02-07T18:09:36Z" level=error msg="Could not publish Repository since we could not update: unable to reach trust server at this time: 500." +time="2025-02-07T18:11:41Z" level=error msg="Could not publish Repository since we could not update: unable to reach trust server at this time: 500." --- PASS: TestRemoteServerUnavailableNoLocalCache (0.00s) === RUN TestAddDelegationChangefileValid --- PASS: TestAddDelegationChangefileValid (0.02s) @@ -1852,15 +1887,15 @@ === RUN TestRemoveDelegationChangefileValid --- PASS: TestRemoveDelegationChangefileValid (0.02s) === RUN TestRemoveDelegationChangefileApplicable -time="2025-02-07T18:09:36Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2025-02-07T18:09:36Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-07T18:11:41Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-07T18:11:41Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" --- PASS: TestRemoveDelegationChangefileApplicable (0.02s) === RUN TestClearAllPathsDelegationChangefileApplicable --- PASS: TestClearAllPathsDelegationChangefileApplicable (0.02s) === RUN TestFullAddDelegationChangefileApplicable --- PASS: TestFullAddDelegationChangefileApplicable (0.02s) === RUN TestFullRemoveDelegationChangefileApplicable ---- PASS: TestFullRemoveDelegationChangefileApplicable (0.02s) +--- PASS: TestFullRemoveDelegationChangefileApplicable (0.03s) === RUN TestRemoveDelegationErrorWritingChanges --- PASS: TestRemoveDelegationErrorWritingChanges (0.02s) === RUN TestBootstrapClientBadURL @@ -1870,7 +1905,7 @@ === RUN TestPublishTargetsDelegationCanUseUserKeyWithArbitraryRole --- PASS: TestPublishTargetsDelegationCanUseUserKeyWithArbitraryRole (0.35s) === RUN TestDeleteRepo ---- PASS: TestDeleteRepo (0.05s) +--- PASS: TestDeleteRepo (0.04s) === RUN TestDeleteRemoteRepo --- PASS: TestDeleteRemoteRepo (0.12s) === RUN TestListRoles @@ -1878,26 +1913,26 @@ === RUN TestGetAllTargetInfo --- PASS: TestGetAllTargetInfo (0.14s) === RUN TestUpdateSucceedsEvenIfCannotWriteNewRepo -time="2025-02-07T18:09:37Z" level=error msg="could not save root to cache: Non-writable" +time="2025-02-07T18:11:42Z" level=error msg="could not save root to cache: Non-writable" --- PASS: TestUpdateSucceedsEvenIfCannotWriteNewRepo (0.12s) === RUN TestUpdateSucceedsEvenIfCannotWriteExistingRepo ---- PASS: TestUpdateSucceedsEvenIfCannotWriteExistingRepo (0.53s) +--- PASS: TestUpdateSucceedsEvenIfCannotWriteExistingRepo (0.51s) === RUN TestUpdateInOfflineMode -time="2025-02-07T18:09:38Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" -time="2025-02-07T18:09:38Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +time="2025-02-07T18:11:42Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +time="2025-02-07T18:11:42Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" --- PASS: TestUpdateInOfflineMode (0.04s) === RUN TestUpdateReplacesCorruptOrMissingMetadata -time="2025-02-07T18:09:38Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:38Z" level=error msg="Metadata for root expired" ---- PASS: TestUpdateReplacesCorruptOrMissingMetadata (0.95s) +time="2025-02-07T18:11:43Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:11:43Z" level=error msg="Metadata for root expired" +--- PASS: TestUpdateReplacesCorruptOrMissingMetadata (0.96s) === RUN TestUpdateFailsIfServerRootKeyChangedWithoutMultiSign -time="2025-02-07T18:09:39Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:39Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:11:44Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:11:44Z" level=error msg="Metadata for root expired" --- PASS: TestUpdateFailsIfServerRootKeyChangedWithoutMultiSign (0.09s) === RUN TestUpdateRemoteRootNotExistNoLocalCache --- PASS: TestUpdateRemoteRootNotExistNoLocalCache (0.03s) === RUN TestUpdateRemoteRootNotExistCanUseLocalCache ---- PASS: TestUpdateRemoteRootNotExistCanUseLocalCache (0.08s) +--- PASS: TestUpdateRemoteRootNotExistCanUseLocalCache (0.07s) === RUN TestUpdateRemoteRootNotExistCannotUseLocalCache --- PASS: TestUpdateRemoteRootNotExistCannotUseLocalCache (0.08s) === RUN TestUpdateRemoteRoot50XNoLocalCache @@ -1905,132 +1940,132 @@ === RUN TestUpdateRemoteRoot50XCanUseLocalCache --- PASS: TestUpdateRemoteRoot50XCanUseLocalCache (0.07s) === RUN TestUpdateRemoteRoot50XCannotUseLocalCache ---- PASS: TestUpdateRemoteRoot50XCannotUseLocalCache (0.07s) +--- PASS: TestUpdateRemoteRoot50XCannotUseLocalCache (0.08s) === RUN TestUpdateNonRootRemoteMissingMetadataNoLocalCache --- PASS: TestUpdateNonRootRemoteMissingMetadataNoLocalCache (0.18s) === RUN TestUpdateNonRootRemoteMissingMetadataCanUseLocalCache -time="2025-02-07T18:09:39Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: TestUpdateNonRootRemoteMissingMetadataCanUseLocalCache (0.23s) +time="2025-02-07T18:11:44Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: TestUpdateNonRootRemoteMissingMetadataCanUseLocalCache (0.25s) === RUN TestUpdateNonRootRemoteMissingMetadataCannotUseLocalCache -time="2025-02-07T18:09:40Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: TestUpdateNonRootRemoteMissingMetadataCannotUseLocalCache (0.30s) +time="2025-02-07T18:11:44Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: TestUpdateNonRootRemoteMissingMetadataCannotUseLocalCache (0.32s) === RUN TestUpdateNonRootRemote50XNoLocalCache --- PASS: TestUpdateNonRootRemote50XNoLocalCache (0.18s) === RUN TestUpdateNonRootRemote50XCanUseLocalCache -time="2025-02-07T18:09:40Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: TestUpdateNonRootRemote50XCanUseLocalCache (0.23s) +time="2025-02-07T18:11:45Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: TestUpdateNonRootRemote50XCanUseLocalCache (0.24s) === RUN TestUpdateNonRootRemote50XCannotUseLocalCache -time="2025-02-07T18:09:40Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: TestUpdateNonRootRemote50XCannotUseLocalCache (0.33s) +time="2025-02-07T18:11:45Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: TestUpdateNonRootRemote50XCannotUseLocalCache (0.32s) === RUN TestUpdateRemoteChecksumWrongNoLocalCache --- PASS: TestUpdateRemoteChecksumWrongNoLocalCache (0.23s) === RUN TestUpdateRemoteChecksumWrongCanUseLocalCache ---- PASS: TestUpdateRemoteChecksumWrongCanUseLocalCache (0.25s) +--- PASS: TestUpdateRemoteChecksumWrongCanUseLocalCache (0.33s) === RUN TestUpdateRemoteChecksumWrongCannotUseLocalCache ---- PASS: TestUpdateRemoteChecksumWrongCannotUseLocalCache (0.44s) +--- PASS: TestUpdateRemoteChecksumWrongCannotUseLocalCache (0.43s) === RUN TestUpdateRootRemoteCorruptedNoLocalCache -time="2025-02-07T18:09:42Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:42Z" level=error msg="Metadata for root expired" ---- PASS: TestUpdateRootRemoteCorruptedNoLocalCache (0.71s) +time="2025-02-07T18:11:47Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:11:47Z" level=error msg="Metadata for root expired" +--- PASS: TestUpdateRootRemoteCorruptedNoLocalCache (0.68s) === RUN TestUpdateRootRemoteCorruptedCanUseLocalCache ---- PASS: TestUpdateRootRemoteCorruptedCanUseLocalCache (1.43s) +--- PASS: TestUpdateRootRemoteCorruptedCanUseLocalCache (1.45s) === RUN TestUpdateRootRemoteCorruptedCannotUseLocalCache -time="2025-02-07T18:09:44Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:44Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:11:49Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:11:49Z" level=error msg="Metadata for root expired" --- PASS: TestUpdateRootRemoteCorruptedCannotUseLocalCache (1.69s) === RUN TestUpdateNonRootRemoteCorruptedNoLocalCache -time="2025-02-07T18:09:46Z" level=error msg="Metadata for targets expired" -time="2025-02-07T18:09:46Z" level=error msg="Metadata for targets expired" -time="2025-02-07T18:09:46Z" level=error msg="Metadata for snapshot expired" -time="2025-02-07T18:09:46Z" level=error msg="Metadata for snapshot expired" -time="2025-02-07T18:09:46Z" level=error msg="Metadata for timestamp expired" -time="2025-02-07T18:09:46Z" level=error msg="Metadata for timestamp expired" -time="2025-02-07T18:09:46Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2025-02-07T18:09:46Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2025-02-07T18:09:46Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2025-02-07T18:09:46Z" level=error msg="Metadata for targets/a expired" -time="2025-02-07T18:09:46Z" level=warning msg="Error getting targets/a: targets/a expired at Sat Jan 6 18:09:46 UTC 2024" -time="2025-02-07T18:09:47Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2025-02-07T18:09:47Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2025-02-07T18:09:47Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2025-02-07T18:09:47Z" level=error msg="Metadata for targets/a/b expired" -time="2025-02-07T18:09:47Z" level=warning msg="Error getting targets/a/b: targets/a/b expired at Sat Jan 6 18:09:47 UTC 2024" -time="2025-02-07T18:09:47Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2025-02-07T18:09:47Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2025-02-07T18:09:47Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2025-02-07T18:09:47Z" level=error msg="Metadata for targets/b expired" -time="2025-02-07T18:09:47Z" level=warning msg="Error getting targets/b: targets/b expired at Sat Jan 6 18:09:47 UTC 2024" ---- PASS: TestUpdateNonRootRemoteCorruptedNoLocalCache (1.78s) +time="2025-02-07T18:11:50Z" level=error msg="Metadata for targets expired" +time="2025-02-07T18:11:51Z" level=error msg="Metadata for targets expired" +time="2025-02-07T18:11:51Z" level=error msg="Metadata for snapshot expired" +time="2025-02-07T18:11:51Z" level=error msg="Metadata for snapshot expired" +time="2025-02-07T18:11:51Z" level=error msg="Metadata for timestamp expired" +time="2025-02-07T18:11:51Z" level=error msg="Metadata for timestamp expired" +time="2025-02-07T18:11:51Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-07T18:11:51Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-07T18:11:51Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-07T18:11:51Z" level=error msg="Metadata for targets/a expired" +time="2025-02-07T18:11:51Z" level=warning msg="Error getting targets/a: targets/a expired at Sat Jan 6 18:11:51 UTC 2024" +time="2025-02-07T18:11:52Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2025-02-07T18:11:52Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2025-02-07T18:11:52Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2025-02-07T18:11:52Z" level=error msg="Metadata for targets/a/b expired" +time="2025-02-07T18:11:52Z" level=warning msg="Error getting targets/a/b: targets/a/b expired at Sat Jan 6 18:11:52 UTC 2024" +time="2025-02-07T18:11:52Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2025-02-07T18:11:52Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2025-02-07T18:11:52Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2025-02-07T18:11:52Z" level=error msg="Metadata for targets/b expired" +time="2025-02-07T18:11:52Z" level=warning msg="Error getting targets/b: targets/b expired at Sat Jan 6 18:11:52 UTC 2024" +--- PASS: TestUpdateNonRootRemoteCorruptedNoLocalCache (1.83s) === RUN TestUpdateNonRootRemoteCorruptedCanUseLocalCache -time="2025-02-07T18:09:48Z" level=error msg="Metadata for timestamp expired" -time="2025-02-07T18:09:48Z" level=error msg="Metadata for timestamp expired" ---- PASS: TestUpdateNonRootRemoteCorruptedCanUseLocalCache (2.43s) +time="2025-02-07T18:11:53Z" level=error msg="Metadata for timestamp expired" +time="2025-02-07T18:11:53Z" level=error msg="Metadata for timestamp expired" +--- PASS: TestUpdateNonRootRemoteCorruptedCanUseLocalCache (2.42s) === RUN TestUpdateNonRootRemoteCorruptedCannotUseLocalCache -time="2025-02-07T18:09:50Z" level=error msg="Metadata for targets expired" -time="2025-02-07T18:09:50Z" level=error msg="Metadata for snapshot expired" -time="2025-02-07T18:09:50Z" level=error msg="Metadata for snapshot expired" -time="2025-02-07T18:09:51Z" level=error msg="Metadata for timestamp expired" -time="2025-02-07T18:09:51Z" level=error msg="Metadata for timestamp expired" -time="2025-02-07T18:09:51Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2025-02-07T18:09:51Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2025-02-07T18:09:51Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2025-02-07T18:09:51Z" level=error msg="Metadata for targets/a expired" -time="2025-02-07T18:09:51Z" level=warning msg="Error getting targets/a: targets/a expired at Sat Jan 6 18:09:51 UTC 2024" -time="2025-02-07T18:09:51Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2025-02-07T18:09:51Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2025-02-07T18:09:51Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2025-02-07T18:09:52Z" level=error msg="Metadata for targets/a/b expired" -time="2025-02-07T18:09:52Z" level=warning msg="Error getting targets/a/b: targets/a/b expired at Sat Jan 6 18:09:51 UTC 2024" -time="2025-02-07T18:09:52Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2025-02-07T18:09:52Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2025-02-07T18:09:52Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2025-02-07T18:09:52Z" level=error msg="Metadata for targets/b expired" -time="2025-02-07T18:09:52Z" level=warning msg="Error getting targets/b: targets/b expired at Sat Jan 6 18:09:52 UTC 2024" ---- PASS: TestUpdateNonRootRemoteCorruptedCannotUseLocalCache (2.79s) +time="2025-02-07T18:11:55Z" level=error msg="Metadata for targets expired" +time="2025-02-07T18:11:55Z" level=error msg="Metadata for snapshot expired" +time="2025-02-07T18:11:55Z" level=error msg="Metadata for snapshot expired" +time="2025-02-07T18:11:56Z" level=error msg="Metadata for timestamp expired" +time="2025-02-07T18:11:56Z" level=error msg="Metadata for timestamp expired" +time="2025-02-07T18:11:56Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-07T18:11:56Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-07T18:11:56Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-07T18:11:56Z" level=error msg="Metadata for targets/a expired" +time="2025-02-07T18:11:56Z" level=warning msg="Error getting targets/a: targets/a expired at Sat Jan 6 18:11:56 UTC 2024" +time="2025-02-07T18:11:57Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2025-02-07T18:11:57Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2025-02-07T18:11:57Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2025-02-07T18:11:57Z" level=error msg="Metadata for targets/a/b expired" +time="2025-02-07T18:11:57Z" level=warning msg="Error getting targets/a/b: targets/a/b expired at Sat Jan 6 18:11:57 UTC 2024" +time="2025-02-07T18:11:57Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2025-02-07T18:11:57Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2025-02-07T18:11:57Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2025-02-07T18:11:58Z" level=error msg="Metadata for targets/b expired" +time="2025-02-07T18:11:58Z" level=warning msg="Error getting targets/b: targets/b expired at Sat Jan 6 18:11:58 UTC 2024" +--- PASS: TestUpdateNonRootRemoteCorruptedCannotUseLocalCache (3.33s) === RUN TestUpdateLocalAndRemoteRootCorrupt -time="2025-02-07T18:09:53Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:53Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" -time="2025-02-07T18:09:55Z" level=error msg="Metadata for root expired" ---- PASS: TestUpdateLocalAndRemoteRootCorrupt (3.17s) +time="2025-02-07T18:11:59Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:11:59Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:12:01Z" level=error msg="Metadata for root expired" +--- PASS: TestUpdateLocalAndRemoteRootCorrupt (3.56s) === RUN TestUpdateRemoteKeyRotated -time="2025-02-07T18:09:56Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2025-02-07T18:09:56Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2025-02-07T18:09:56Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" ---- PASS: TestUpdateRemoteKeyRotated (0.30s) +time="2025-02-07T18:12:02Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-07T18:12:02Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2025-02-07T18:12:02Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +--- PASS: TestUpdateRemoteKeyRotated (0.33s) === RUN TestValidateRootRotationWithOldRole ---- PASS: TestValidateRootRotationWithOldRole (0.15s) +--- PASS: TestValidateRootRotationWithOldRole (0.17s) === RUN TestRootRoleInvariant ---- PASS: TestRootRoleInvariant (0.13s) +--- PASS: TestRootRoleInvariant (0.15s) === RUN TestBadIntermediateTransitions --- PASS: TestBadIntermediateTransitions (0.06s) === RUN TestExpiredIntermediateTransitions -time="2025-02-07T18:09:56Z" level=warning msg="root is nearing expiry, you should re-sign the role metadata" +time="2025-02-07T18:12:02Z" level=warning msg="root is nearing expiry, you should re-sign the role metadata" --- PASS: TestExpiredIntermediateTransitions (0.07s) === RUN TestDownloadTargetsLarge ---- PASS: TestDownloadTargetsLarge (3.39s) +--- PASS: TestDownloadTargetsLarge (3.64s) === RUN TestDownloadTargetsDeep --- PASS: TestDownloadTargetsDeep (0.03s) === RUN TestDownloadSnapshotLargeDelegationsMany ---- PASS: TestDownloadSnapshotLargeDelegationsMany (2.61s) +--- PASS: TestDownloadSnapshotLargeDelegationsMany (2.65s) === RUN TestRootOnDiskTrustPinning --- PASS: TestRootOnDiskTrustPinning (0.03s) === RUN TestApplyTargetsChange @@ -2070,14 +2105,14 @@ === RUN TestApplyChangelistTargetsToMultipleRoles --- PASS: TestApplyChangelistTargetsToMultipleRoles (0.00s) === RUN TestApplyChangelistTargetsFailsNonexistentRole -time="2025-02-07T18:10:02Z" level=error msg="couldn't add target to targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist" -time="2025-02-07T18:10:02Z" level=error msg="couldn't remove target from targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist" +time="2025-02-07T18:12:09Z" level=error msg="couldn't add target to targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist" +time="2025-02-07T18:12:09Z" level=error msg="couldn't remove target from targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist" --- PASS: TestApplyChangelistTargetsFailsNonexistentRole (0.00s) === RUN TestChangeTargetMetaFailsInvalidRole -time="2025-02-07T18:10:02Z" level=error msg="couldn't add target to ruhroh: tuf: invalid role ruhroh. does not exist" +time="2025-02-07T18:12:09Z" level=error msg="couldn't add target to ruhroh: tuf: invalid role ruhroh. does not exist" --- PASS: TestChangeTargetMetaFailsInvalidRole (0.00s) === RUN TestChangeTargetMetaFailsIfPrefixError -time="2025-02-07T18:10:02Z" level=error msg="couldn't add target to targets/level1: Could not add all targets" +time="2025-02-07T18:12:09Z" level=error msg="couldn't add target to targets/level1: Could not add all targets" --- PASS: TestChangeTargetMetaFailsIfPrefixError (0.00s) === RUN TestAllNearExpiry --- PASS: TestAllNearExpiry (0.00s) @@ -2086,7 +2121,7 @@ === RUN TestRotateRemoteKeyOffline --- PASS: TestRotateRemoteKeyOffline (0.00s) PASS -ok github.com/theupdateframework/notary/client 34.284s +ok github.com/theupdateframework/notary/client 35.959s === RUN TestTUFDelegation --- PASS: TestTUFDelegation (0.00s) === RUN TestMemChangelist @@ -2098,14 +2133,14 @@ === RUN TestAdd --- PASS: TestAdd (0.00s) === RUN TestErrorConditions -time="2025-02-07T18:09:25Z" level=warning msg="invalid character '\\x05' looking for beginning of value" +time="2025-02-07T18:11:30Z" level=warning msg="invalid character '\\x05' looking for beginning of value" --- PASS: TestErrorConditions (0.00s) === RUN TestListOrder --- PASS: TestListOrder (0.00s) === RUN TestFileChangeIterator --- PASS: TestFileChangeIterator (0.00s) PASS -ok github.com/theupdateframework/notary/client/changelist 0.041s +ok github.com/theupdateframework/notary/client/changelist 0.025s === RUN TestParseConfigError --- PASS: TestParseConfigError (0.00s) === RUN TestSetupGRPCServer @@ -2115,7 +2150,7 @@ === RUN TestSetupNetListener --- PASS: TestSetupNetListener (0.00s) PASS -ok github.com/theupdateframework/notary/cmd/escrow 0.041s +ok github.com/theupdateframework/notary/cmd/escrow 0.022s === RUN TestPurgeDelegationKeys Usage: delegation [command] @@ -2139,9 +2174,9 @@ Use "delegation [command] --help" for more information about a command. Removal of the following keys from all delegations in gun staged for next publish: - abc ---- PASS: TestPurgeDelegationKeys (0.00s) +--- PASS: TestPurgeDelegationKeys (0.01s) === RUN TestAddInvalidDelegationName ---- PASS: TestAddInvalidDelegationName (0.03s) +--- PASS: TestAddInvalidDelegationName (0.04s) === RUN TestAddInvalidDelegationCert --- PASS: TestAddInvalidDelegationCert (0.00s) === RUN TestAddInvalidShortPubkeyCert @@ -2187,75 +2222,75 @@ Use "delegation [command] --help" for more information about a command. --- PASS: TestRemoveInvalidNumArgs (0.00s) === RUN TestInitWithRootKey ---- PASS: TestInitWithRootKey (0.09s) +--- PASS: TestInitWithRootKey (0.06s) === RUN TestInitWithRootCert --- PASS: TestInitWithRootCert (0.07s) === RUN TestClientTUFInteraction ---- PASS: TestClientTUFInteraction (0.15s) +--- PASS: TestClientTUFInteraction (0.16s) === RUN TestClientDeleteTUFInteraction -time="2025-02-07T18:09:28Z" level=error msg="could not reach https://invalid-server: Get \"https://invalid-server/v2/\": dial tcp: lookup invalid-server on [::1]:53: read udp [::1]:33265->[::1]:53: read: connection refused" ---- PASS: TestClientDeleteTUFInteraction (0.12s) +time="2025-02-07T18:11:33Z" level=error msg="could not reach https://invalid-server: Get \"https://invalid-server/v2/\": dial tcp: lookup invalid-server on [::1]:53: read udp [::1]:51620->[::1]:53: read: connection refused" +--- PASS: TestClientDeleteTUFInteraction (0.23s) === RUN TestClientTUFAddByHashInteraction ---- PASS: TestClientTUFAddByHashInteraction (0.20s) +--- PASS: TestClientTUFAddByHashInteraction (0.38s) === RUN TestClientDelegationsInteraction -time="2025-02-07T18:09:29Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2025-02-07T18:09:29Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" ---- PASS: TestClientDelegationsInteraction (0.70s) +time="2025-02-07T18:11:34Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-07T18:11:34Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +--- PASS: TestClientDelegationsInteraction (0.89s) === RUN TestClientDelegationsPublishing ---- PASS: TestClientDelegationsPublishing (1.06s) +--- PASS: TestClientDelegationsPublishing (1.14s) === RUN TestClientKeyGenerationRotation ---- PASS: TestClientKeyGenerationRotation (1.15s) +--- PASS: TestClientKeyGenerationRotation (1.05s) === RUN TestKeyRotation ---- PASS: TestKeyRotation (0.15s) +--- PASS: TestKeyRotation (0.16s) === RUN TestKeyRotationNonRoot ---- PASS: TestKeyRotationNonRoot (0.21s) +--- PASS: TestKeyRotationNonRoot (0.20s) === RUN TestDefaultRootKeyGeneration --- PASS: TestDefaultRootKeyGeneration (0.01s) === RUN TestLogLevelFlags --- PASS: TestLogLevelFlags (0.00s) === RUN TestClientKeyPassphraseChange ---- PASS: TestClientKeyPassphraseChange (0.18s) +--- PASS: TestClientKeyPassphraseChange (0.17s) === RUN TestPurgeSingleKey Removal of the following keys from all delegations in gun staged for next publish: - - 5c51f94026e55998976f80aa5f5170a3caf56875e1efa467788bb0fc23dadba6 ---- PASS: TestPurgeSingleKey (0.18s) + - 14a528390cb55bc21b2a061ace4bf1a115365483428d6617f0887ca0b99ea095 +--- PASS: TestPurgeSingleKey (0.16s) === RUN TestWitness -time="2025-02-07T18:09:32Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" -time="2025-02-07T18:09:32Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" -time="2025-02-07T18:09:33Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" -time="2025-02-07T18:09:33Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" -time="2025-02-07T18:09:33Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2025-02-07T18:09:33Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2025-02-07T18:09:33Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" ---- PASS: TestWitness (0.56s) +time="2025-02-07T18:11:38Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" +time="2025-02-07T18:11:38Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" +time="2025-02-07T18:11:38Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" +time="2025-02-07T18:11:38Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" +time="2025-02-07T18:11:38Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-07T18:11:38Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-07T18:11:38Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" +--- PASS: TestWitness (0.51s) === RUN TestClientTUFInitWithAutoPublish -time="2025-02-07T18:09:33Z" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get \"https://notary-server-on-the-moon:12306/v2/\": dial tcp: lookup notary-server-on-the-moon on [::1]:53: read udp [::1]:45118->[::1]:53: read: connection refused" ---- PASS: TestClientTUFInitWithAutoPublish (0.13s) +time="2025-02-07T18:11:38Z" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get \"https://notary-server-on-the-moon:12306/v2/\": dial tcp: lookup notary-server-on-the-moon on [::1]:53: read udp [::1]:59387->[::1]:53: read: connection refused" +--- PASS: TestClientTUFInitWithAutoPublish (0.12s) === RUN TestClientTUFAddWithAutoPublish -time="2025-02-07T18:09:33Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:47489->[::1]:53: read: connection refused" -time="2025-02-07T18:09:33Z" level=error msg="Could not publish Repository since we could not update: client is offline" -time="2025-02-07T18:09:33Z" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get \"https://notary-server-on-the-moon:12306/v2/\": dial tcp: lookup notary-server-on-the-moon on [::1]:53: read udp [::1]:45070->[::1]:53: read: connection refused" -time="2025-02-07T18:09:33Z" level=error msg="Could not publish Repository since we could not update: client is offline" ---- PASS: TestClientTUFAddWithAutoPublish (0.14s) +time="2025-02-07T18:11:38Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:43431->[::1]:53: read: connection refused" +time="2025-02-07T18:11:38Z" level=error msg="Could not publish Repository since we could not update: client is offline" +time="2025-02-07T18:11:38Z" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get \"https://notary-server-on-the-moon:12306/v2/\": dial tcp: lookup notary-server-on-the-moon on [::1]:53: read udp [::1]:59692->[::1]:53: read: connection refused" +time="2025-02-07T18:11:38Z" level=error msg="Could not publish Repository since we could not update: client is offline" +--- PASS: TestClientTUFAddWithAutoPublish (0.13s) === RUN TestClientTUFRemoveWithAutoPublish ---- PASS: TestClientTUFRemoveWithAutoPublish (0.29s) +--- PASS: TestClientTUFRemoveWithAutoPublish (0.25s) === RUN TestClientDelegationAddWithAutoPublish --- PASS: TestClientDelegationAddWithAutoPublish (0.12s) === RUN TestClientDelegationRemoveWithAutoPublish -time="2025-02-07T18:09:34Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2025-02-07T18:09:34Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" ---- PASS: TestClientDelegationRemoveWithAutoPublish (0.28s) +time="2025-02-07T18:11:39Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-07T18:11:39Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +--- PASS: TestClientDelegationRemoveWithAutoPublish (0.25s) === RUN TestClientTUFAddByHashWithAutoPublish ---- PASS: TestClientTUFAddByHashWithAutoPublish (0.14s) +--- PASS: TestClientTUFAddByHashWithAutoPublish (0.12s) === RUN TestClientKeyImport -time="2025-02-07T18:09:34Z" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header" -time="2025-02-07T18:09:34Z" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to" +time="2025-02-07T18:11:39Z" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header" +time="2025-02-07T18:11:39Z" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to" --- PASS: TestClientKeyImport (0.05s) === RUN TestAddDelImportKeyPublishFlow -time="2025-02-07T18:09:34Z" level=error msg="couldn't add target to targets/releases: could not find necessary signing keys, at least one of these keys must be available: 0570f9fdca00bdaf62f3f79bf84e70748ba2c8bff926f20dd996bac49e6164fc" ---- PASS: TestAddDelImportKeyPublishFlow (0.32s) +time="2025-02-07T18:11:39Z" level=error msg="couldn't add target to targets/releases: could not find necessary signing keys, at least one of these keys must be available: 0570f9fdca00bdaf62f3f79bf84e70748ba2c8bff926f20dd996bac49e6164fc" +--- PASS: TestAddDelImportKeyPublishFlow (0.29s) === RUN TestExportImportFlow ---- PASS: TestExportImportFlow (0.09s) +--- PASS: TestExportImportFlow (0.08s) === RUN TestDelegationKeyImportExport --- PASS: TestDelegationKeyImportExport (0.01s) === RUN TestImportKeysNoYubikey @@ -2275,16 +2310,16 @@ === RUN TestRemoveMultikeysRemoveOnlyChosenKey --- PASS: TestRemoveMultikeysRemoveOnlyChosenKey (0.01s) === RUN TestRotateKeyInvalidRoles -time="2025-02-07T18:09:34Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:59180->[::1]:53: read: connection refused" -time="2025-02-07T18:09:34Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:37514->[::1]:53: read: connection refused" -time="2025-02-07T18:09:34Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:44413->[::1]:53: read: connection refused" -time="2025-02-07T18:09:34Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:56151->[::1]:53: read: connection refused" +time="2025-02-07T18:11:39Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:54074->[::1]:53: read: connection refused" +time="2025-02-07T18:11:39Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:33635->[::1]:53: read: connection refused" +time="2025-02-07T18:11:39Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:45845->[::1]:53: read: connection refused" +time="2025-02-07T18:11:39Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:40907->[::1]:53: read: connection refused" --- PASS: TestRotateKeyInvalidRoles (0.00s) === RUN TestRotateKeyTargetCannotBeServerManaged -time="2025-02-07T18:09:34Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:47930->[::1]:53: read: connection refused" +time="2025-02-07T18:11:39Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:60181->[::1]:53: read: connection refused" --- PASS: TestRotateKeyTargetCannotBeServerManaged (0.00s) === RUN TestRotateKeyTimestampCannotBeLocallyManaged -time="2025-02-07T18:09:34Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:34704->[::1]:53: read: connection refused" +time="2025-02-07T18:11:39Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:37517->[::1]:53: read: connection refused" --- PASS: TestRotateKeyTimestampCannotBeLocallyManaged (0.00s) === RUN TestRotateKeyNoGUN Usage: @@ -2292,13 +2327,13 @@ === RUN TestRotateKeyRemoteServerManagesKey Successfully rotated snapshot key for repository docker.com/notary Successfully rotated timestamp key for repository docker.com/notary ---- PASS: TestRotateKeyRemoteServerManagesKey (0.14s) +--- PASS: TestRotateKeyRemoteServerManagesKey (0.13s) === RUN TestRotateKeyBothKeys Successfully rotated targets key for repository docker.com/notary Successfully rotated snapshot key for repository docker.com/notary ---- PASS: TestRotateKeyBothKeys (0.12s) +--- PASS: TestRotateKeyBothKeys (0.11s) === RUN TestRotateKeyRootIsInteractive ---- PASS: TestRotateKeyRootIsInteractive (0.04s) +--- PASS: TestRotateKeyRootIsInteractive (0.03s) === RUN TestChangeKeyPassphraseInvalidID --- PASS: TestChangeKeyPassphraseInvalidID (0.00s) === RUN TestChangeKeyPassphraseInvalidNumArgs @@ -2317,7 +2352,7 @@ === RUN TestImportKeysNonexistentFile --- PASS: TestImportKeysNonexistentFile (0.00s) === RUN TestKeyGeneration -time="2025-02-07T18:09:35Z" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to" +time="2025-02-07T18:11:40Z" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to" --- PASS: TestKeyGeneration (0.01s) === RUN TestNotaryConfigFileDefault --- PASS: TestNotaryConfigFileDefault (0.00s) @@ -2328,9 +2363,9 @@ === RUN TestRemoteServerCommandLineFlagOverridesConfig --- PASS: TestRemoteServerCommandLineFlagOverridesConfig (0.00s) === RUN TestInvalidAddHashCommands ---- PASS: TestInvalidAddHashCommands (0.01s) +--- PASS: TestInvalidAddHashCommands (0.00s) === RUN TestConfigParsingErrorsPropagatedByCommands ---- PASS: TestConfigParsingErrorsPropagatedByCommands (0.01s) +--- PASS: TestConfigParsingErrorsPropagatedByCommands (0.00s) === RUN TestInsufficientArgumentsReturnsErrorAndPrintsUsage --- PASS: TestInsufficientArgumentsReturnsErrorAndPrintsUsage (0.02s) === RUN TestBareCommandPrintsUsageAndNoError @@ -2338,7 +2373,7 @@ === RUN TestConfigFileTLSCannotBeRelativeToCWD --- PASS: TestConfigFileTLSCannotBeRelativeToCWD (0.01s) === RUN TestConfigFileTLSCanBeRelativeToConfigOrAbsolute ---- PASS: TestConfigFileTLSCanBeRelativeToConfigOrAbsolute (0.08s) +--- PASS: TestConfigFileTLSCanBeRelativeToConfigOrAbsolute (0.07s) === RUN TestConfigFileOverridenByCmdLineFlags --- PASS: TestConfigFileOverridenByCmdLineFlags (0.07s) === RUN TestConfigFileTrustPinning @@ -2366,10 +2401,10 @@ === RUN TestImportRootCert --- PASS: TestImportRootCert (0.00s) === RUN TestTokenAuth -time="2025-02-07T18:09:35Z" level=error msg="could not reach https://localhost:9999: Get \"https://localhost:9999/v2/\": dial tcp 127.0.0.1:9999: connect: connection refused" +time="2025-02-07T18:11:40Z" level=error msg="could not reach https://localhost:9999: Get \"https://localhost:9999/v2/\": dial tcp 127.0.0.1:9999: connect: connection refused" --- PASS: TestTokenAuth (0.00s) === RUN TestAdminTokenAuth -time="2025-02-07T18:09:35Z" level=error msg="could not reach https://localhost:9999: Get \"https://localhost:9999/v2/\": dial tcp 127.0.0.1:9999: connect: connection refused" +time="2025-02-07T18:11:40Z" level=error msg="could not reach https://localhost:9999: Get \"https://localhost:9999/v2/\": dial tcp 127.0.0.1:9999: connect: connection refused" --- PASS: TestAdminTokenAuth (0.00s) === RUN TestTokenAuth200Status --- PASS: TestTokenAuth200Status (0.00s) @@ -2380,18 +2415,18 @@ === RUN TestAdminTokenAuth401Status --- PASS: TestAdminTokenAuth401Status (0.00s) === RUN TestTokenAuthNon200Non401Status -time="2025-02-07T18:09:35Z" level=error msg="could not reach http://127.0.0.1:41611: 404" +time="2025-02-07T18:11:40Z" level=error msg="could not reach http://127.0.0.1:39619: 404" --- PASS: TestTokenAuthNon200Non401Status (0.00s) === RUN TestAdminTokenAuthNon200Non401Status -time="2025-02-07T18:09:35Z" level=error msg="could not reach http://127.0.0.1:42323: 404" +time="2025-02-07T18:11:40Z" level=error msg="could not reach http://127.0.0.1:42681: 404" --- PASS: TestAdminTokenAuthNon200Non401Status (0.00s) === RUN TestConfigureRepo --- PASS: TestConfigureRepo (0.00s) === RUN TestConfigureRepoRW -Enter username: time="2025-02-07T18:09:35Z" level=error msg="error processing username input: EOF" +Enter username: time="2025-02-07T18:11:40Z" level=error msg="error processing username input: EOF" --- PASS: TestConfigureRepoRW (0.00s) === RUN TestConfigureRepoAdmin -Enter username: time="2025-02-07T18:09:35Z" level=error msg="error processing username input: EOF" +Enter username: time="2025-02-07T18:11:40Z" level=error msg="error processing username input: EOF" --- PASS: TestConfigureRepoAdmin (0.00s) === RUN TestStatusUnstageAndReset Successfully reset specified changes for repository gun @@ -2404,11 +2439,11 @@ Pushing changes to gun --- PASS: TestGetTrustPinningErrors (0.00s) === RUN TestPasswordStore -Enter username: time="2025-02-07T18:09:35Z" level=error msg="error processing username input: EOF" +Enter username: time="2025-02-07T18:11:40Z" level=error msg="error processing username input: EOF" --- PASS: TestPasswordStore (0.00s) === RUN TestPasswordStoreWithEnvvar -time="2025-02-07T18:09:35Z" level=error msg="Authentication string with zero-legnth username" -time="2025-02-07T18:09:35Z" level=error msg="Could not base64-decode authentication string" +time="2025-02-07T18:11:40Z" level=error msg="Authentication string with zero-legnth username" +time="2025-02-07T18:11:40Z" level=error msg="Could not base64-decode authentication string" --- PASS: TestPasswordStoreWithEnvvar (0.00s) === RUN TestGetPayload --- PASS: TestGetPayload (0.00s) @@ -2417,7 +2452,7 @@ === RUN TestHomeExpand --- PASS: TestHomeExpand (0.00s) PASS -ok github.com/theupdateframework/notary/cmd/notary 7.102s +ok github.com/theupdateframework/notary/cmd/notary 7.275s === RUN TestBootstrap --- PASS: TestBootstrap (0.00s) === RUN TestGetAddrAndTLSConfigInvalidTLS @@ -2433,42 +2468,42 @@ === RUN TestGetInvalidTrustService --- PASS: TestGetInvalidTrustService (0.00s) === RUN TestGetLocalTrustService -time="2025-02-07T18:09:28Z" level=info msg="Using local signing service, which requires ED25519. Ignoring all other trust_service parameters, including keyAlgorithm" +time="2025-02-07T18:11:33Z" level=info msg="Using local signing service, which requires ED25519. Ignoring all other trust_service parameters, including keyAlgorithm" --- PASS: TestGetLocalTrustService (0.00s) === RUN TestGetTrustServiceInvalidKeyAlgorithm --- PASS: TestGetTrustServiceInvalidKeyAlgorithm (0.00s) === RUN TestGetTrustServiceTLSMissingCertOrKey --- PASS: TestGetTrustServiceTLSMissingCertOrKey (0.00s) === RUN TestGetTrustServiceNoTLSConfig -time="2025-02-07T18:09:28Z" level=info msg="Using remote signing service" +time="2025-02-07T18:11:33Z" level=info msg="Using remote signing service" --- PASS: TestGetTrustServiceNoTLSConfig (0.00s) === RUN TestGetTrustServiceTLSSuccess -time="2025-02-07T18:09:28Z" level=info msg="Using remote signing service" +time="2025-02-07T18:11:33Z" level=info msg="Using remote signing service" --- PASS: TestGetTrustServiceTLSSuccess (0.00s) === RUN TestGetTrustServiceTLSFailure --- PASS: TestGetTrustServiceTLSFailure (0.00s) === RUN TestGetStoreInvalid -time="2025-02-07T18:09:28Z" level=info msg="Using asdf backend" +time="2025-02-07T18:11:33Z" level=info msg="Using asdf backend" --- PASS: TestGetStoreInvalid (0.00s) === RUN TestGetStoreDBStore -time="2025-02-07T18:09:28Z" level=info msg="Using sqlite3 backend" +time="2025-02-07T18:11:33Z" level=info msg="Using sqlite3 backend" --- PASS: TestGetStoreDBStore (0.00s) === RUN TestGetStoreRethinkDBStoreConnectionFails -time="2025-02-07T18:09:28Z" level=info msg="Using rethinkdb backend" +time="2025-02-07T18:11:33Z" level=info msg="Using rethinkdb backend" --- PASS: TestGetStoreRethinkDBStoreConnectionFails (0.00s) === RUN TestGetMemoryStore -time="2025-02-07T18:09:28Z" level=info msg="Using memory backend" +time="2025-02-07T18:11:33Z" level=info msg="Using memory backend" --- PASS: TestGetMemoryStore (0.00s) === RUN TestGetCacheConfig --- PASS: TestGetCacheConfig (0.00s) === RUN TestGetGUNPRefixes --- PASS: TestGetGUNPRefixes (0.00s) === RUN TestSampleConfig -time="2025-02-07T18:09:28Z" level=info msg="Using remote signing service" -time="2025-02-07T18:09:28Z" level=info msg="Using sqlite3 backend" +time="2025-02-07T18:11:33Z" level=info msg="Using remote signing service" +time="2025-02-07T18:11:33Z" level=info msg="Using sqlite3 backend" --- PASS: TestSampleConfig (0.00s) PASS -ok github.com/theupdateframework/notary/cmd/notary-server 0.064s +ok github.com/theupdateframework/notary/cmd/notary-server 0.037s === RUN TestGetAddrAndTLSConfigInvalidTLS --- PASS: TestGetAddrAndTLSConfigInvalidTLS (0.00s) === RUN TestGetAddrAndTLSConfigNoGRPCAddr @@ -2501,17 +2536,17 @@ === RUN TestSampleConfig --- PASS: TestSampleConfig (0.00s) PASS -ok github.com/theupdateframework/notary/cmd/notary-signer 0.075s +ok github.com/theupdateframework/notary/cmd/notary-signer 0.052s === RUN TestGenerateCertificate ---- PASS: TestGenerateCertificate (0.03s) +--- PASS: TestGenerateCertificate (0.02s) === RUN TestCryptoServiceWithNonEmptyGUN ---- PASS: TestCryptoServiceWithNonEmptyGUN (0.60s) +--- PASS: TestCryptoServiceWithNonEmptyGUN (0.36s) === RUN TestCryptoServiceWithEmptyGUN --- PASS: TestCryptoServiceWithEmptyGUN (0.44s) === RUN TestCryptoSignerInterfaceBehavior --- PASS: TestCryptoSignerInterfaceBehavior (0.00s) PASS -ok github.com/theupdateframework/notary/cryptoservice 1.119s +ok github.com/theupdateframework/notary/cryptoservice 0.879s === RUN TestGetPassphraseForUsingDelegationKey --- PASS: TestGetPassphraseForUsingDelegationKey (0.00s) === RUN TestGetPassphraseLimitsShortPassphrases @@ -2527,165 +2562,165 @@ === RUN TestGetPassphrase --- PASS: TestGetPassphrase (0.00s) PASS -ok github.com/theupdateframework/notary/passphrase 0.020s +ok github.com/theupdateframework/notary/passphrase 0.018s ? github.com/theupdateframework/notary/proto [no test files] === RUN TestValidationErrorFormat -time="2025-02-07T18:09:26Z" level=info msg="invalid update: Update sent by the client is invalid.: &{ErrBadHierarchy Metadata hierarchy is incomplete: no snapshot was included in update and server does not hold current snapshot key for repository}" go.version=go1.15.15 http.request.contenttype="multipart/form-data; boundary=1d3d4d13a53e54ed00d4d4433815d7ac7ef01ec5c72f5dc36c9ea0aa0b91" http.request.host="127.0.0.1:43507" http.request.id=4a1a0248-866a-47ae-8d64-1cc640acdee0 http.request.method=POST http.request.remoteaddr="127.0.0.1:54058" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 -time="2025-02-07T18:09:26Z" level=info msg="response completed" go.version=go1.15.15 http.request.contenttype="multipart/form-data; boundary=1d3d4d13a53e54ed00d4d4433815d7ac7ef01ec5c72f5dc36c9ea0aa0b91" http.request.host="127.0.0.1:43507" http.request.id=4a1a0248-866a-47ae-8d64-1cc640acdee0 http.request.method=POST http.request.remoteaddr="127.0.0.1:54058" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration=2.05956ms http.response.status=400 http.response.written=260 ---- PASS: TestValidationErrorFormat (0.06s) +time="2025-02-07T18:11:31Z" level=info msg="invalid update: Update sent by the client is invalid.: &{ErrBadHierarchy Metadata hierarchy is incomplete: no snapshot was included in update and server does not hold current snapshot key for repository}" go.version=go1.15.15 http.request.contenttype="multipart/form-data; boundary=211e5a037ef16c4b93c46455344f41ae4f8aa545638976b77ccb5c479b39" http.request.host="127.0.0.1:45259" http.request.id=1230e4a5-797c-4f3b-b6be-e17dbb55d0e7 http.request.method=POST http.request.remoteaddr="127.0.0.1:49274" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 +time="2025-02-07T18:11:31Z" level=info msg="response completed" go.version=go1.15.15 http.request.contenttype="multipart/form-data; boundary=211e5a037ef16c4b93c46455344f41ae4f8aa545638976b77ccb5c479b39" http.request.host="127.0.0.1:45259" http.request.id=1230e4a5-797c-4f3b-b6be-e17dbb55d0e7 http.request.method=POST http.request.remoteaddr="127.0.0.1:49274" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration=8.21052ms http.response.status=400 http.response.written=260 +--- PASS: TestValidationErrorFormat (0.08s) === RUN TestRunBadAddr --- PASS: TestRunBadAddr (0.00s) === RUN TestRunReservedPort --- PASS: TestRunReservedPort (0.00s) === RUN TestRepoPrefixMatches -time="2025-02-07T18:09:26Z" level=info msg="updated docker.io/notary to timestamp version 1, checksum af0641210fa44526ad3b3ca20226234e371c9c7e398b9aa79c6f1a660fd7e560" docker.io/notary=gun go.version=go1.15.15 http.request.contenttype="multipart/form-data; boundary=c110d5a40998347ae73f137473d38ded424187f6f798622eb896488b8063" http.request.host="127.0.0.1:44263" http.request.id=6f51940a-09d0-4b49-afcb-53887cf7141f http.request.method=POST http.request.remoteaddr="127.0.0.1:57748" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 -time="2025-02-07T18:09:26Z" level=info msg="response completed" go.version=go1.15.15 http.request.contenttype="multipart/form-data; boundary=c110d5a40998347ae73f137473d38ded424187f6f798622eb896488b8063" http.request.host="127.0.0.1:44263" http.request.id=6f51940a-09d0-4b49-afcb-53887cf7141f http.request.method=POST http.request.remoteaddr="127.0.0.1:57748" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration=2.29672ms http.response.status=0 http.response.written=0 -time="2025-02-07T18:09:26Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:44263" http.request.id=08af538b-8e19-4b1c-8e5c-c652e3dbb36d http.request.method=GET http.request.remoteaddr="127.0.0.1:57748" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.json http.request.useragent=Go-http-client/1.1 http.response.duration="322.08µs" http.response.status=200 http.response.written=683 -time="2025-02-07T18:09:26Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:44263" http.request.id=af78d3af-ab75-43c9-87c9-e19ee60c2b85 http.request.method=GET http.request.remoteaddr="127.0.0.1:57748" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.9182a844b5961822f6a3141b9a586421ba223bce729ce1eb88811165261b2460.json http.request.useragent=Go-http-client/1.1 http.response.duration="23.36µs" http.response.status=200 http.response.written=683 -time="2025-02-07T18:09:26Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:44263" http.request.id=3684bdc9-fda0-4fb2-b015-6a47ab14c696 http.request.method=GET http.request.remoteaddr="127.0.0.1:57748" http.request.uri=/v2/docker.io/notary/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="286.48µs" http.response.status=200 http.response.written=181 -time="2025-02-07T18:09:26Z" level=info msg="trust data deleted for docker.io/notary" docker.io/notary=gun go.version=go1.15.15 http.request.host="127.0.0.1:44263" http.request.id=d88557e8-9348-4b55-8c7e-cd8354da6547 http.request.method=DELETE http.request.remoteaddr="127.0.0.1:57748" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 -time="2025-02-07T18:09:26Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:44263" http.request.id=d88557e8-9348-4b55-8c7e-cd8354da6547 http.request.method=DELETE http.request.remoteaddr="127.0.0.1:57748" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration="38.44µs" http.response.status=0 http.response.written=0 ---- PASS: TestRepoPrefixMatches (0.03s) +time="2025-02-07T18:11:31Z" level=info msg="updated docker.io/notary to timestamp version 1, checksum 8093b473fdc9e9d5236b330e43dc59416465b5a209509739d6665c2e014b8f69" docker.io/notary=gun go.version=go1.15.15 http.request.contenttype="multipart/form-data; boundary=4668f668c580aeb0caa038a7d94c1d127e1e98e3283bc1b85de5711585de" http.request.host="127.0.0.1:33597" http.request.id=be3d7fa7-78a0-403a-83b4-345b7e48ba2e http.request.method=POST http.request.remoteaddr="127.0.0.1:52134" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 +time="2025-02-07T18:11:31Z" level=info msg="response completed" go.version=go1.15.15 http.request.contenttype="multipart/form-data; boundary=4668f668c580aeb0caa038a7d94c1d127e1e98e3283bc1b85de5711585de" http.request.host="127.0.0.1:33597" http.request.id=be3d7fa7-78a0-403a-83b4-345b7e48ba2e http.request.method=POST http.request.remoteaddr="127.0.0.1:52134" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration=2.33228ms http.response.status=0 http.response.written=0 +time="2025-02-07T18:11:31Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:33597" http.request.id=580b3452-c7f9-4213-833d-c3896c784b0d http.request.method=GET http.request.remoteaddr="127.0.0.1:52134" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.json http.request.useragent=Go-http-client/1.1 http.response.duration="333.28µs" http.response.status=200 http.response.written=683 +time="2025-02-07T18:11:31Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:33597" http.request.id=a88074ab-c334-469f-92cd-9c2a3969b1a0 http.request.method=GET http.request.remoteaddr="127.0.0.1:52134" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.bb95fe054a50650bcbe1b75e6ff7416e6dab0b02bd4c1b1d3ba3f85ac90c9f33.json http.request.useragent=Go-http-client/1.1 http.response.duration="26.36µs" http.response.status=200 http.response.written=683 +time="2025-02-07T18:11:31Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:33597" http.request.id=d71aeea2-3ea5-418d-be49-874689339b4c http.request.method=GET http.request.remoteaddr="127.0.0.1:52134" http.request.uri=/v2/docker.io/notary/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration=4.37952ms http.response.status=200 http.response.written=181 +time="2025-02-07T18:11:31Z" level=info msg="trust data deleted for docker.io/notary" docker.io/notary=gun go.version=go1.15.15 http.request.host="127.0.0.1:33597" http.request.id=1406829b-3ea5-4335-9101-22a0551cb027 http.request.method=DELETE http.request.remoteaddr="127.0.0.1:52134" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 +time="2025-02-07T18:11:31Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:33597" http.request.id=1406829b-3ea5-4335-9101-22a0551cb027 http.request.method=DELETE http.request.remoteaddr="127.0.0.1:52134" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration="41.6µs" http.response.status=0 http.response.written=0 +--- PASS: TestRepoPrefixMatches (0.02s) === RUN TestRepoPrefixDoesNotMatch --- PASS: TestRepoPrefixDoesNotMatch (0.03s) === RUN TestMetricsEndpoint ---- PASS: TestMetricsEndpoint (0.04s) +--- PASS: TestMetricsEndpoint (0.03s) === RUN TestGetKeysEndpoint -time="2025-02-07T18:09:26Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:34355" http.request.id=15169169-018f-40e4-88bc-b92435d220f8 http.request.method=GET http.request.remoteaddr="127.0.0.1:32856" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="245.96µs" http.response.status=200 http.response.written=103 -time="2025-02-07T18:09:26Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:34355" http.request.id=4d93bef2-358b-4c53-bada-2cbdfac89573 http.request.method=GET http.request.remoteaddr="127.0.0.1:32862" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="190.72µs" http.response.status=200 http.response.written=103 -time="2025-02-07T18:09:26Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.15.15 http.request.host="127.0.0.1:34355" http.request.id=7897f7e0-7c1b-47c4-8567-444dc932139c http.request.method=GET http.request.remoteaddr="127.0.0.1:32878" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 -time="2025-02-07T18:09:26Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:34355" http.request.id=7897f7e0-7c1b-47c4-8567-444dc932139c http.request.method=GET http.request.remoteaddr="127.0.0.1:32878" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="104.6µs" http.response.status=404 http.response.written=104 -time="2025-02-07T18:09:26Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.15.15 http.request.host="127.0.0.1:34355" http.request.id=d6af2df8-2239-48bc-820c-19ec124b36fb http.request.method=GET http.request.remoteaddr="127.0.0.1:32890" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 -time="2025-02-07T18:09:26Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:34355" http.request.id=d6af2df8-2239-48bc-820c-19ec124b36fb http.request.method=GET http.request.remoteaddr="127.0.0.1:32890" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="60.08µs" http.response.status=404 http.response.written=104 -time="2025-02-07T18:09:26Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.15.15 http.request.host="127.0.0.1:34355" http.request.id=38b3ee08-336b-42da-941e-1fd589a61fbc http.request.method=GET http.request.remoteaddr="127.0.0.1:32904" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 -time="2025-02-07T18:09:26Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:34355" http.request.id=38b3ee08-336b-42da-941e-1fd589a61fbc http.request.method=GET http.request.remoteaddr="127.0.0.1:32904" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="58.36µs" http.response.status=404 http.response.written=104 +time="2025-02-07T18:11:31Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.15.15 http.request.host="127.0.0.1:42205" http.request.id=0f816257-1111-4b93-96b6-336b55c9b8bd http.request.method=GET http.request.remoteaddr="127.0.0.1:36688" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 +time="2025-02-07T18:11:31Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:42205" http.request.id=0f816257-1111-4b93-96b6-336b55c9b8bd http.request.method=GET http.request.remoteaddr="127.0.0.1:36688" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="132.96µs" http.response.status=404 http.response.written=104 +time="2025-02-07T18:11:31Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.15.15 http.request.host="127.0.0.1:42205" http.request.id=dfc6efa1-a786-4afb-9be0-da3661f437b6 http.request.method=GET http.request.remoteaddr="127.0.0.1:36698" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 +time="2025-02-07T18:11:31Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:42205" http.request.id=dfc6efa1-a786-4afb-9be0-da3661f437b6 http.request.method=GET http.request.remoteaddr="127.0.0.1:36698" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="80.72µs" http.response.status=404 http.response.written=104 +time="2025-02-07T18:11:31Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.15.15 http.request.host="127.0.0.1:42205" http.request.id=71d10321-3f98-451e-9664-e3afd8a5bc98 http.request.method=GET http.request.remoteaddr="127.0.0.1:36710" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 +time="2025-02-07T18:11:31Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:42205" http.request.id=71d10321-3f98-451e-9664-e3afd8a5bc98 http.request.method=GET http.request.remoteaddr="127.0.0.1:36710" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="68.36µs" http.response.status=404 http.response.written=104 +time="2025-02-07T18:11:31Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:42205" http.request.id=a7938046-beff-4692-bce5-9329c1d9ec03 http.request.method=GET http.request.remoteaddr="127.0.0.1:36726" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="206.72µs" http.response.status=200 http.response.written=103 +time="2025-02-07T18:11:31Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:42205" http.request.id=b856e6a1-47de-4095-bf4c-a72b368b5e3f http.request.method=GET http.request.remoteaddr="127.0.0.1:36730" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="201.84µs" http.response.status=200 http.response.written=103 --- PASS: TestGetKeysEndpoint (0.02s) === RUN TestGetRoleByHash -time="2025-02-07T18:09:26Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:36785" http.request.id=a358686b-4fad-44ce-a114-e0b15e9435a4 http.request.method=GET http.request.remoteaddr="127.0.0.1:35656" http.request.uri=/v2/gun/_trust/tuf/timestamp.fc3afe2b1c32ab77cf14cb190ac93d355d2ea1f8df77461cb494f144eb43c77b.json http.request.useragent=Go-http-client/1.1 http.response.duration="57.16µs" http.response.status=200 http.response.written=115 +time="2025-02-07T18:11:31Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:45449" http.request.id=abb22f8e-d1c1-4bad-86bd-55c3ecc1079f http.request.method=GET http.request.remoteaddr="127.0.0.1:32972" http.request.uri=/v2/gun/_trust/tuf/timestamp.1b5747e94e9ed6cf5dbc02ef1a32083be8bbf31888ed35536e8d459fbb41bfee.json http.request.useragent=Go-http-client/1.1 http.response.duration="53.56µs" http.response.status=200 http.response.written=115 --- PASS: TestGetRoleByHash (0.00s) === RUN TestGetRoleByVersion -time="2025-02-07T18:09:27Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:43663" http.request.id=2046b597-174a-456f-bf67-dc4c1dcb617a http.request.method=GET http.request.remoteaddr="127.0.0.1:41226" http.request.uri=/v2/gun/_trust/tuf/1.timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration="70.16µs" http.response.status=200 http.response.written=115 ---- PASS: TestGetRoleByVersion (0.02s) +time="2025-02-07T18:11:31Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:46015" http.request.id=0a1bfc71-f50d-416a-a910-b541864d6adf http.request.method=GET http.request.remoteaddr="127.0.0.1:49030" http.request.uri=/v2/gun/_trust/tuf/1.timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration="49.24µs" http.response.status=200 http.response.written=115 +--- PASS: TestGetRoleByVersion (0.00s) === RUN TestGetCurrentRole -time="2025-02-07T18:09:27Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:37023" http.request.id=5d67d559-23e7-482b-adbb-7c85860db2da http.request.method=GET http.request.remoteaddr="127.0.0.1:59446" http.request.uri=/v2/gun/_trust/tuf/timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration="465.76µs" http.response.status=200 http.response.written=495 ---- PASS: TestGetCurrentRole (0.02s) +time="2025-02-07T18:11:31Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:45433" http.request.id=78875f20-a054-440f-87ed-f9644b9fa912 http.request.method=GET http.request.remoteaddr="127.0.0.1:41776" http.request.uri=/v2/gun/_trust/tuf/timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration="315.24µs" http.response.status=200 http.response.written=495 +--- PASS: TestGetCurrentRole (0.00s) === RUN TestRotateKeyEndpoint -time="2025-02-07T18:09:27Z" level=info msg="response completed" go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:42787" http.request.id=7c24cb57-6efa-48a1-86b7-d19cb010bed6 http.request.method=POST http.request.remoteaddr="127.0.0.1:51400" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="195.24µs" http.response.status=200 http.response.written=103 -time="2025-02-07T18:09:27Z" level=info msg="response completed" go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:42787" http.request.id=3cee11f9-2820-4428-b7ba-55cddcdbf5e0 http.request.method=POST http.request.remoteaddr="127.0.0.1:51412" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="159µs" http.response.status=200 http.response.written=103 -time="2025-02-07T18:09:27Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:42787" http.request.id=a9a32cde-201a-449b-b476-547ec6a50e8a http.request.method=POST http.request.remoteaddr="127.0.0.1:51416" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 -time="2025-02-07T18:09:27Z" level=info msg="response completed" go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:42787" http.request.id=a9a32cde-201a-449b-b476-547ec6a50e8a http.request.method=POST http.request.remoteaddr="127.0.0.1:51416" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="73.88µs" http.response.status=404 http.response.written=104 -time="2025-02-07T18:09:27Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:42787" http.request.id=bcdb3ff4-3322-4f4b-9c67-cff6bbeda0a5 http.request.method=POST http.request.remoteaddr="127.0.0.1:51420" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 -time="2025-02-07T18:09:27Z" level=info msg="response completed" go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:42787" http.request.id=bcdb3ff4-3322-4f4b-9c67-cff6bbeda0a5 http.request.method=POST http.request.remoteaddr="127.0.0.1:51420" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="54.44µs" http.response.status=404 http.response.written=104 -time="2025-02-07T18:09:27Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:42787" http.request.id=1c6ff0ab-72c7-4c0c-97fa-633c4aa843d4 http.request.method=POST http.request.remoteaddr="127.0.0.1:51434" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1 -time="2025-02-07T18:09:27Z" level=info msg="response completed" go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:42787" http.request.id=1c6ff0ab-72c7-4c0c-97fa-633c4aa843d4 http.request.method=POST http.request.remoteaddr="127.0.0.1:51434" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="89.32µs" http.response.status=404 http.response.written=104 -time="2025-02-07T18:09:27Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:42787" http.request.id=4e6cec9b-ad68-48b7-b852-9352de1c546b http.request.method=POST http.request.remoteaddr="127.0.0.1:51448" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 -time="2025-02-07T18:09:27Z" level=info msg="response completed" go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:42787" http.request.id=4e6cec9b-ad68-48b7-b852-9352de1c546b http.request.method=POST http.request.remoteaddr="127.0.0.1:51448" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="143µs" http.response.status=404 http.response.written=104 ---- PASS: TestRotateKeyEndpoint (0.01s) +time="2025-02-07T18:11:32Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:34211" http.request.id=96e64b86-de59-4fde-aac7-0b9026660c77 http.request.method=POST http.request.remoteaddr="127.0.0.1:48280" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 +time="2025-02-07T18:11:32Z" level=info msg="response completed" go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:34211" http.request.id=96e64b86-de59-4fde-aac7-0b9026660c77 http.request.method=POST http.request.remoteaddr="127.0.0.1:48280" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="90.28µs" http.response.status=404 http.response.written=104 +time="2025-02-07T18:11:32Z" level=info msg="response completed" go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:34211" http.request.id=b0ac8417-d186-4f1d-bceb-e11f8fb62af8 http.request.method=POST http.request.remoteaddr="127.0.0.1:48296" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="165.44µs" http.response.status=200 http.response.written=103 +time="2025-02-07T18:11:32Z" level=info msg="response completed" go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:34211" http.request.id=00270fcd-b44b-4345-85f0-382a57626005 http.request.method=POST http.request.remoteaddr="127.0.0.1:48298" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="171.8µs" http.response.status=200 http.response.written=103 +time="2025-02-07T18:11:32Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:34211" http.request.id=a4b4ee44-29b6-4160-8ace-9f9697a0db6d http.request.method=POST http.request.remoteaddr="127.0.0.1:48312" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 +time="2025-02-07T18:11:32Z" level=info msg="response completed" go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:34211" http.request.id=a4b4ee44-29b6-4160-8ace-9f9697a0db6d http.request.method=POST http.request.remoteaddr="127.0.0.1:48312" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="58.96µs" http.response.status=404 http.response.written=104 +time="2025-02-07T18:11:32Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:34211" http.request.id=10ba63f9-6862-44ef-9f87-458d55c8f6b5 http.request.method=POST http.request.remoteaddr="127.0.0.1:48328" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 +time="2025-02-07T18:11:32Z" level=info msg="response completed" go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:34211" http.request.id=10ba63f9-6862-44ef-9f87-458d55c8f6b5 http.request.method=POST http.request.remoteaddr="127.0.0.1:48328" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="46.32µs" http.response.status=404 http.response.written=104 +time="2025-02-07T18:11:32Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:34211" http.request.id=98559bae-c474-4ce3-b1b9-253e49f7c106 http.request.method=POST http.request.remoteaddr="127.0.0.1:48340" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1 +time="2025-02-07T18:11:32Z" level=info msg="response completed" go.version=go1.15.15 http.request.contenttype=text/plain http.request.host="127.0.0.1:34211" http.request.id=98559bae-c474-4ce3-b1b9-253e49f7c106 http.request.method=POST http.request.remoteaddr="127.0.0.1:48340" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="47.44µs" http.response.status=404 http.response.written=104 +--- PASS: TestRotateKeyEndpoint (0.02s) PASS -ok github.com/theupdateframework/notary/server 0.329s +ok github.com/theupdateframework/notary/server 0.234s ? github.com/theupdateframework/notary/server/errors [no test files] === RUN Test_changefeed --- PASS: Test_changefeed (0.00s) === RUN Test_checkChangefeedInputs -time="2025-02-07T18:09:26Z" level=error msg="500 GET unable to retrieve storage" -time="2025-02-07T18:09:26Z" level=error msg="400 GET invalid pageSize: not_a_number" +time="2025-02-07T18:11:31Z" level=error msg="500 GET unable to retrieve storage" +time="2025-02-07T18:11:31Z" level=error msg="400 GET invalid pageSize: not_a_number" --- PASS: Test_checkChangefeedInputs (0.00s) === RUN TestMainHandlerGet -time="2025-02-07T18:09:26Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:33507" http.request.id=51111a3c-e61a-45f4-8b50-26c467463701 http.request.method=GET http.request.remoteaddr="127.0.0.1:46626" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.duration="52.2µs" http.response.status=200 http.response.written=2 +time="2025-02-07T18:11:31Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:45985" http.request.id=b2074b56-2a95-416d-839d-613d71a4655f http.request.method=GET http.request.remoteaddr="127.0.0.1:37420" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.duration="42.16µs" http.response.status=200 http.response.written=2 --- PASS: TestMainHandlerGet (0.00s) === RUN TestMainHandlerNotGet -time="2025-02-07T18:09:26Z" level=info msg="generic not found: You have requested a resource that does not exist.: " go.version=go1.15.15 http.request.host="127.0.0.1:40217" http.request.id=b5ce4688-67c8-400e-8755-9951c043d422 http.request.method=HEAD http.request.remoteaddr="127.0.0.1:37410" http.request.uri=/ http.request.useragent=Go-http-client/1.1 -time="2025-02-07T18:09:26Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:40217" http.request.id=b5ce4688-67c8-400e-8755-9951c043d422 http.request.method=HEAD http.request.remoteaddr="127.0.0.1:37410" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="154.12µs" http.response.status=404 http.response.written=105 +time="2025-02-07T18:11:31Z" level=info msg="generic not found: You have requested a resource that does not exist.: " go.version=go1.15.15 http.request.host="127.0.0.1:43463" http.request.id=ef0a1ce1-a967-42a8-8c1b-97a78f27d270 http.request.method=HEAD http.request.remoteaddr="127.0.0.1:44480" http.request.uri=/ http.request.useragent=Go-http-client/1.1 +time="2025-02-07T18:11:31Z" level=info msg="response completed" go.version=go1.15.15 http.request.host="127.0.0.1:43463" http.request.id=ef0a1ce1-a967-42a8-8c1b-97a78f27d270 http.request.method=HEAD http.request.remoteaddr="127.0.0.1:44480" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="136.92µs" http.response.status=404 http.response.written=105 --- PASS: TestMainHandlerNotGet (0.00s) === RUN TestKeyHandlersInvalidConfiguration -time="2025-02-07T18:09:26Z" level=error msg="500 GET storage not configured" go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=error msg="500 GET storage not configured" go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=error msg="500 GET crypto service not configured" go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=error msg="500 GET crypto service not configured" go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=error msg="500 GET key algorithm not configured" go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=error msg="500 GET key algorithm not configured" go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=error msg="500 POST key algorithm not configured" go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=error msg="500 POST key algorithm not configured" go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=error msg="500 POST storage not configured" go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=error msg="500 POST storage not configured" go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=error msg="500 POST crypto service not configured" go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=error msg="500 POST crypto service not configured" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=error msg="500 GET storage not configured" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=error msg="500 GET storage not configured" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=error msg="500 GET crypto service not configured" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=error msg="500 GET crypto service not configured" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=error msg="500 GET key algorithm not configured" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=error msg="500 GET key algorithm not configured" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=error msg="500 POST storage not configured" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=error msg="500 POST storage not configured" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=error msg="500 POST crypto service not configured" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=error msg="500 POST crypto service not configured" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=error msg="500 POST key algorithm not configured" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=error msg="500 POST key algorithm not configured" go.version=go1.15.15 gun=gun --- PASS: TestKeyHandlersInvalidConfiguration (0.00s) === RUN TestKeyHandlersNoRoleOrRepo -time="2025-02-07T18:09:26Z" level=info msg="400 GET no gun in request" =gun go.version=go1.15.15 -time="2025-02-07T18:09:26Z" level=info msg="400 GET no gun in request" =gun go.version=go1.15.15 -time="2025-02-07T18:09:26Z" level=info msg="400 GET no role in request" go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=info msg="400 GET no role in request" go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=info msg="400 POST no gun in request" =gun go.version=go1.15.15 -time="2025-02-07T18:09:26Z" level=info msg="400 POST no gun in request" =gun go.version=go1.15.15 -time="2025-02-07T18:09:26Z" level=info msg="400 POST no role in request" go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=info msg="400 POST no role in request" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=info msg="400 GET no gun in request" =gun go.version=go1.15.15 +time="2025-02-07T18:11:31Z" level=info msg="400 GET no gun in request" =gun go.version=go1.15.15 +time="2025-02-07T18:11:31Z" level=info msg="400 GET no role in request" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=info msg="400 GET no role in request" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=info msg="400 POST no gun in request" =gun go.version=go1.15.15 +time="2025-02-07T18:11:31Z" level=info msg="400 POST no gun in request" =gun go.version=go1.15.15 +time="2025-02-07T18:11:31Z" level=info msg="400 POST no role in request" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=info msg="400 POST no role in request" go.version=go1.15.15 gun=gun --- PASS: TestKeyHandlersNoRoleOrRepo (0.00s) === RUN TestKeyHandlersInvalidRole -time="2025-02-07T18:09:26Z" level=info msg="400 GET root key: " go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=info msg="400 GET targets key: " go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=info msg="400 GET targets/a key: " go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=info msg="400 GET invalidrole key: " go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=info msg="400 POST root key: " go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=info msg="400 POST targets key: " go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=info msg="400 POST targets/a key: " go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=info msg="400 POST invalidrole key: " go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=info msg="400 GET root key: " go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=info msg="400 GET targets key: " go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=info msg="400 GET targets/a key: " go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=info msg="400 GET invalidrole key: " go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=info msg="400 POST root key: " go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=info msg="400 POST targets key: " go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=info msg="400 POST targets/a key: " go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=info msg="400 POST invalidrole key: " go.version=go1.15.15 gun=gun --- PASS: TestKeyHandlersInvalidRole (0.00s) === RUN TestGetKeyHandlerCreatesOnce --- PASS: TestGetKeyHandlerCreatesOnce (0.00s) === RUN TestKeyHandlersInvalidKeyAlgo -time="2025-02-07T18:09:26Z" level=error msg="500 GET timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=error msg="500 GET snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=error msg="500 POST timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.15.15 gun=gun -time="2025-02-07T18:09:26Z" level=error msg="500 POST snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=error msg="500 GET timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=error msg="500 GET snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=error msg="500 POST timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=error msg="500 POST snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.15.15 gun=gun --- PASS: TestKeyHandlersInvalidKeyAlgo (0.00s) === RUN TestRotateKeyHandlerSuccessfulRotation --- PASS: TestRotateKeyHandlerSuccessfulRotation (0.00s) === RUN TestGetHandlerRoot -time="2025-02-07T18:09:26Z" level=info msg="404 GET root role" go.version=go1.15.15 gun=gun ---- PASS: TestGetHandlerRoot (0.04s) +time="2025-02-07T18:11:31Z" level=info msg="404 GET root role" go.version=go1.15.15 gun=gun +--- PASS: TestGetHandlerRoot (0.03s) === RUN TestGetHandlerTimestamp --- PASS: TestGetHandlerTimestamp (0.00s) === RUN TestGetHandlerSnapshot ---- PASS: TestGetHandlerSnapshot (0.01s) +--- PASS: TestGetHandlerSnapshot (0.00s) === RUN TestGetHandler404 -time="2025-02-07T18:09:26Z" level=info msg="404 GET root role" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=info msg="404 GET root role" go.version=go1.15.15 gun=gun --- PASS: TestGetHandler404 (0.00s) === RUN TestGetHandlerNilData -time="2025-02-07T18:09:26Z" level=info msg="404 GET root role" go.version=go1.15.15 gun=gun +time="2025-02-07T18:11:31Z" level=info msg="404 GET root role" go.version=go1.15.15 gun=gun --- PASS: TestGetHandlerNilData (0.00s) === RUN TestGetHandlerNoStorage -time="2025-02-07T18:09:26Z" level=error msg="500 GET: no storage exists" =gun go.version=go1.15.15 +time="2025-02-07T18:11:31Z" level=error msg="500 GET: no storage exists" =gun go.version=go1.15.15 --- PASS: TestGetHandlerNoStorage (0.00s) === RUN TestAtomicUpdateValidationFailurePropagated --- PASS: TestAtomicUpdateValidationFailurePropagated (0.01s) === RUN TestAtomicUpdateNonValidationFailureNotPropagated -time="2025-02-07T18:09:26Z" level=info msg="400 POST error validating update" go.version=go1.15.15 testGUN=gun +time="2025-02-07T18:11:31Z" level=info msg="400 POST error validating update" go.version=go1.15.15 testGUN=gun --- PASS: TestAtomicUpdateNonValidationFailureNotPropagated (0.00s) === RUN TestAtomicUpdateVersionErrorPropagated -time="2025-02-07T18:09:26Z" level=info msg="400 POST old version error" go.version=go1.15.15 testGUN=gun +time="2025-02-07T18:11:31Z" level=info msg="400 POST old version error" go.version=go1.15.15 testGUN=gun --- PASS: TestAtomicUpdateVersionErrorPropagated (0.01s) === RUN TestGetMaybeServerSignedNoCrypto --- PASS: TestGetMaybeServerSignedNoCrypto (0.00s) === RUN TestGetMaybeServerSignedNoKey --- PASS: TestGetMaybeServerSignedNoKey (0.00s) === RUN TestValidateEmptyNew ---- PASS: TestValidateEmptyNew (0.05s) +--- PASS: TestValidateEmptyNew (0.01s) === RUN TestValidateRootCanContainOnlyx509KeysWithRightGun --- PASS: TestValidateRootCanContainOnlyx509KeysWithRightGun (0.01s) === RUN TestValidatePrevTimestamp --- PASS: TestValidatePrevTimestamp (0.01s) === RUN TestValidatePreviousTimestampCorrupt -time="2025-02-07T18:09:26Z" level=error msg="Failed to unmarshal existing timestamp for GUN docker.com/notary" ---- PASS: TestValidatePreviousTimestampCorrupt (0.01s) +time="2025-02-07T18:11:31Z" level=error msg="Failed to unmarshal existing timestamp for GUN docker.com/notary" +--- PASS: TestValidatePreviousTimestampCorrupt (0.02s) === RUN TestValidateGetCurrentTimestampBroken --- PASS: TestValidateGetCurrentTimestampBroken (0.02s) === RUN TestValidateNoNewRoot ---- PASS: TestValidateNoNewRoot (0.02s) +--- PASS: TestValidateNoNewRoot (0.01s) === RUN TestValidateNoNewTargets ---- PASS: TestValidateNoNewTargets (0.02s) +--- PASS: TestValidateNoNewTargets (0.01s) === RUN TestValidateOnlySnapshot ---- PASS: TestValidateOnlySnapshot (0.02s) +--- PASS: TestValidateOnlySnapshot (0.01s) === RUN TestValidateOldRoot --- PASS: TestValidateOldRoot (0.01s) === RUN TestValidateOldRootCorrupt @@ -2695,60 +2730,60 @@ === RUN TestValidateRootGetCurrentRootBroken --- PASS: TestValidateRootGetCurrentRootBroken (0.00s) === RUN TestValidateRootRotationWithOldSigs ---- PASS: TestValidateRootRotationWithOldSigs (0.04s) +--- PASS: TestValidateRootRotationWithOldSigs (0.02s) === RUN TestValidateRootRotationMultipleKeysThreshold1 --- PASS: TestValidateRootRotationMultipleKeysThreshold1 (0.01s) === RUN TestRootRotationNotSignedWithOldKeysForOldRole --- PASS: TestRootRotationNotSignedWithOldKeysForOldRole (0.02s) === RUN TestRootRotationVersionIncrement ---- PASS: TestRootRotationVersionIncrement (0.02s) +--- PASS: TestRootRotationVersionIncrement (0.01s) === RUN TestValidateNoRoot --- PASS: TestValidateNoRoot (0.00s) === RUN TestValidateSnapshotMissingNoSnapshotKey --- PASS: TestValidateSnapshotMissingNoSnapshotKey (0.01s) === RUN TestValidateSnapshotGenerateNoPrev ---- PASS: TestValidateSnapshotGenerateNoPrev (0.02s) +--- PASS: TestValidateSnapshotGenerateNoPrev (0.01s) === RUN TestValidateSnapshotGenerateWithPrev ---- PASS: TestValidateSnapshotGenerateWithPrev (0.03s) +--- PASS: TestValidateSnapshotGenerateWithPrev (0.01s) === RUN TestValidateSnapshotGeneratePrevCorrupt -time="2025-02-07T18:09:26Z" level=error msg="Failed to unmarshal existing snapshot for GUN docker.com/notary" +time="2025-02-07T18:11:32Z" level=error msg="Failed to unmarshal existing snapshot for GUN docker.com/notary" --- PASS: TestValidateSnapshotGeneratePrevCorrupt (0.01s) === RUN TestValidateSnapshotGenerateStoreGetCurrentSnapshotBroken --- PASS: TestValidateSnapshotGenerateStoreGetCurrentSnapshotBroken (0.01s) === RUN TestValidateSnapshotGenerateNoTargets --- PASS: TestValidateSnapshotGenerateNoTargets (0.01s) === RUN TestValidateSnapshotGenerate ---- PASS: TestValidateSnapshotGenerate (0.02s) +--- PASS: TestValidateSnapshotGenerate (0.01s) === RUN TestValidateRootNoTimestampKey --- PASS: TestValidateRootNoTimestampKey (0.00s) === RUN TestValidateRootInvalidTimestampKey ---- PASS: TestValidateRootInvalidTimestampKey (0.01s) +--- PASS: TestValidateRootInvalidTimestampKey (0.00s) === RUN TestValidateRootInvalidTimestampThreshold ---- PASS: TestValidateRootInvalidTimestampThreshold (0.02s) +--- PASS: TestValidateRootInvalidTimestampThreshold (0.03s) === RUN TestValidateRootInvalidZeroThreshold ---- PASS: TestValidateRootInvalidZeroThreshold (0.05s) +--- PASS: TestValidateRootInvalidZeroThreshold (0.02s) === RUN TestValidateRootRoleMissing ---- PASS: TestValidateRootRoleMissing (0.01s) +--- PASS: TestValidateRootRoleMissing (0.00s) === RUN TestValidateTargetsRoleMissing ---- PASS: TestValidateTargetsRoleMissing (0.01s) +--- PASS: TestValidateTargetsRoleMissing (0.00s) === RUN TestValidateSnapshotRoleMissing ---- PASS: TestValidateSnapshotRoleMissing (0.01s) +--- PASS: TestValidateSnapshotRoleMissing (0.00s) === RUN TestValidateRootSigMissing ---- PASS: TestValidateRootSigMissing (0.01s) +--- PASS: TestValidateRootSigMissing (0.00s) === RUN TestValidateTargetsSigMissing -time="2025-02-07T18:09:27Z" level=error msg="ErrBadTargets: tuf: data has no signatures" ---- PASS: TestValidateTargetsSigMissing (0.00s) +time="2025-02-07T18:11:32Z" level=error msg="ErrBadTargets: tuf: data has no signatures" +--- PASS: TestValidateTargetsSigMissing (0.01s) === RUN TestValidateSnapshotSigMissing ---- PASS: TestValidateSnapshotSigMissing (0.02s) +--- PASS: TestValidateSnapshotSigMissing (0.01s) === RUN TestValidateRootCorrupt --- PASS: TestValidateRootCorrupt (0.00s) === RUN TestValidateTargetsCorrupt -time="2025-02-07T18:09:27Z" level=error msg="ErrBadTargets: invalid character '\\u0084' looking for beginning of value" ---- PASS: TestValidateTargetsCorrupt (0.01s) +time="2025-02-07T18:11:32Z" level=error msg="ErrBadTargets: invalid character '\\u0084' looking for beginning of value" +--- PASS: TestValidateTargetsCorrupt (0.00s) === RUN TestValidateSnapshotCorrupt ---- PASS: TestValidateSnapshotCorrupt (0.02s) +--- PASS: TestValidateSnapshotCorrupt (0.00s) === RUN TestValidateRootModifiedSize ---- PASS: TestValidateRootModifiedSize (0.02s) +--- PASS: TestValidateRootModifiedSize (0.00s) === RUN TestValidateTargetsModifiedSize --- PASS: TestValidateTargetsModifiedSize (0.01s) === RUN TestValidateRootModifiedHash @@ -2762,18 +2797,18 @@ === RUN TestLoadTargetsLoadsNothingIfNoUpdates --- PASS: TestLoadTargetsLoadsNothingIfNoUpdates (0.00s) === RUN TestValidateTargetsRequiresStoredParent -time="2025-02-07T18:09:27Z" level=error msg="ErrBadTargets: targets must be loaded first" +time="2025-02-07T18:11:32Z" level=error msg="ErrBadTargets: targets must be loaded first" --- PASS: TestValidateTargetsRequiresStoredParent (0.01s) === RUN TestValidateTargetsParentInUpdate -time="2025-02-07T18:09:27Z" level=error msg="ErrBadTargets: invalid character 'I' looking for beginning of value" ---- PASS: TestValidateTargetsParentInUpdate (0.01s) +time="2025-02-07T18:11:32Z" level=error msg="ErrBadTargets: invalid character 'I' looking for beginning of value" +--- PASS: TestValidateTargetsParentInUpdate (0.00s) === RUN TestValidateTargetsRoleNotInParent -time="2025-02-07T18:09:27Z" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist" -time="2025-02-07T18:09:27Z" level=error msg="ErrBadTargets: targets has already been loaded" -time="2025-02-07T18:09:27Z" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist" +time="2025-02-07T18:11:32Z" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist" +time="2025-02-07T18:11:32Z" level=error msg="ErrBadTargets: targets has already been loaded" +time="2025-02-07T18:11:32Z" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist" --- PASS: TestValidateTargetsRoleNotInParent (0.01s) PASS -ok github.com/theupdateframework/notary/server/handlers 0.752s +ok github.com/theupdateframework/notary/server/handlers 0.493s === RUN TestSnapshotExpired --- PASS: TestSnapshotExpired (0.00s) === RUN TestSnapshotNotExpired @@ -2781,28 +2816,28 @@ === RUN TestGetSnapshotKeyCreate --- PASS: TestGetSnapshotKeyCreate (0.00s) === RUN TestGetSnapshotKeyCreateWithFailingStore -time="2025-02-07T18:09:25Z" level=error msg="Error when retrieving root role for GUN gun: failing store failed" +time="2025-02-07T18:11:31Z" level=error msg="Error when retrieving root role for GUN gun: failing store failed" --- PASS: TestGetSnapshotKeyCreateWithFailingStore (0.00s) === RUN TestGetSnapshotKeyCreateWithCorruptedStore -time="2025-02-07T18:09:25Z" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve snapshot key ID" +time="2025-02-07T18:11:31Z" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve snapshot key ID" --- PASS: TestGetSnapshotKeyCreateWithCorruptedStore (0.00s) === RUN TestGetSnapshotKeyCreateWithInvalidAlgo --- PASS: TestGetSnapshotKeyCreateWithInvalidAlgo (0.00s) === RUN TestGetSnapshotKeyExistingMetadata --- PASS: TestGetSnapshotKeyExistingMetadata (0.04s) === RUN TestGetSnapshotNoPreviousSnapshot -time="2025-02-07T18:09:25Z" level=error msg="Failed to unmarshal existing snapshot for GUN gun" ---- PASS: TestGetSnapshotNoPreviousSnapshot (0.01s) +time="2025-02-07T18:11:31Z" level=error msg="Failed to unmarshal existing snapshot for GUN gun" +--- PASS: TestGetSnapshotNoPreviousSnapshot (0.00s) === RUN TestGetSnapshotReturnsPreviousSnapshotIfUnexpired --- PASS: TestGetSnapshotReturnsPreviousSnapshotIfUnexpired (0.00s) === RUN TestGetSnapshotOldSnapshotExpired ---- PASS: TestGetSnapshotOldSnapshotExpired (0.01s) +--- PASS: TestGetSnapshotOldSnapshotExpired (0.00s) === RUN TestCannotMakeNewSnapshotIfNoRoot --- PASS: TestCannotMakeNewSnapshotIfNoRoot (0.00s) === RUN TestCreateSnapshotNoKeyInCrypto ---- PASS: TestCreateSnapshotNoKeyInCrypto (0.01s) +--- PASS: TestCreateSnapshotNoKeyInCrypto (0.00s) PASS -ok github.com/theupdateframework/notary/server/snapshot 0.113s +ok github.com/theupdateframework/notary/server/snapshot 0.094s === RUN TestMemoryUpdateCurrentEmpty --- PASS: TestMemoryUpdateCurrentEmpty (0.00s) === RUN TestMemoryUpdateCurrentVersionCheckOldVersionExists @@ -2828,17 +2863,17 @@ === RUN TestRDBTUFFileJSONUnmarshallingFailure --- PASS: TestRDBTUFFileJSONUnmarshallingFailure (0.00s) === RUN TestSQLUpdateCurrentEmpty ---- PASS: TestSQLUpdateCurrentEmpty (0.02s) +--- PASS: TestSQLUpdateCurrentEmpty (0.01s) === RUN TestSQLUpdateCurrentVersionCheckOldVersionExists --- PASS: TestSQLUpdateCurrentVersionCheckOldVersionExists (0.00s) === RUN TestSQLUpdateCurrentVersionCheckOldVersionNotExist ---- PASS: TestSQLUpdateCurrentVersionCheckOldVersionNotExist (0.02s) +--- PASS: TestSQLUpdateCurrentVersionCheckOldVersionNotExist (0.00s) === RUN TestSQLUpdateManyNoConflicts ---- PASS: TestSQLUpdateManyNoConflicts (0.02s) +--- PASS: TestSQLUpdateManyNoConflicts (0.01s) === RUN TestSQLUpdateManyConflictRollback ---- PASS: TestSQLUpdateManyConflictRollback (0.03s) +--- PASS: TestSQLUpdateManyConflictRollback (0.01s) === RUN TestSQLDelete ---- PASS: TestSQLDelete (0.04s) +--- PASS: TestSQLDelete (0.01s) === RUN TestSQLDBCheckHealthTableMissing --- PASS: TestSQLDBCheckHealthTableMissing (0.00s) === RUN TestSQLDBCheckHealthDBConnectionFail @@ -2848,15 +2883,15 @@ === RUN TestSQLDBGetChecksum --- PASS: TestSQLDBGetChecksum (0.00s) === RUN TestSQLDBGetChecksumNotFound ---- PASS: TestSQLDBGetChecksumNotFound (0.02s) +--- PASS: TestSQLDBGetChecksumNotFound (0.00s) === RUN TestSQLTUFMetaStoreGetCurrent ---- PASS: TestSQLTUFMetaStoreGetCurrent (0.07s) +--- PASS: TestSQLTUFMetaStoreGetCurrent (0.05s) === RUN TestSQLGetChanges --- PASS: TestSQLGetChanges (0.02s) === RUN TestSQLDBGetVersion ---- PASS: TestSQLDBGetVersion (0.01s) +--- PASS: TestSQLDBGetVersion (0.00s) PASS -ok github.com/theupdateframework/notary/server/storage 0.325s +ok github.com/theupdateframework/notary/server/storage 0.177s === RUN TestTimestampExpired --- PASS: TestTimestampExpired (0.00s) === RUN TestTimestampNotExpired @@ -2864,31 +2899,31 @@ === RUN TestGetTimestampKey --- PASS: TestGetTimestampKey (0.00s) === RUN TestGetTimestampNoPreviousTimestamp -time="2025-02-07T18:09:26Z" level=error msg="Failed to unmarshal existing timestamp" ---- PASS: TestGetTimestampNoPreviousTimestamp (0.05s) +time="2025-02-07T18:11:31Z" level=error msg="Failed to unmarshal existing timestamp" +--- PASS: TestGetTimestampNoPreviousTimestamp (0.02s) === RUN TestGetTimestampReturnsPreviousTimestampIfUnexpired --- PASS: TestGetTimestampReturnsPreviousTimestampIfUnexpired (0.00s) === RUN TestGetTimestampOldTimestampExpired ---- PASS: TestGetTimestampOldTimestampExpired (0.01s) +--- PASS: TestGetTimestampOldTimestampExpired (0.00s) === RUN TestCannotMakeNewTimestampIfNoRootOrSnapshot -time="2025-02-07T18:09:26Z" level=error msg="Failed to create a new timestamp" -time="2025-02-07T18:09:26Z" level=error msg="Failed to create a new timestamp" ---- PASS: TestCannotMakeNewTimestampIfNoRootOrSnapshot (0.01s) +time="2025-02-07T18:11:31Z" level=error msg="Failed to create a new timestamp" +time="2025-02-07T18:11:31Z" level=error msg="Failed to create a new timestamp" +--- PASS: TestCannotMakeNewTimestampIfNoRootOrSnapshot (0.00s) === RUN TestCreateTimestampNoKeyInCrypto -time="2025-02-07T18:09:26Z" level=error msg="Failed to create a new timestamp" ---- PASS: TestCreateTimestampNoKeyInCrypto (0.02s) +time="2025-02-07T18:11:31Z" level=error msg="Failed to create a new timestamp" +--- PASS: TestCreateTimestampNoKeyInCrypto (0.00s) === RUN TestGetTimestampKeyCreateWithFailingStore -time="2025-02-07T18:09:26Z" level=error msg="Error when retrieving root role for GUN gun: failing store failed" +time="2025-02-07T18:11:31Z" level=error msg="Error when retrieving root role for GUN gun: failing store failed" --- PASS: TestGetTimestampKeyCreateWithFailingStore (0.00s) === RUN TestGetTimestampKeyCreateWithCorruptedStore -time="2025-02-07T18:09:26Z" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve timestamp key ID" +time="2025-02-07T18:11:31Z" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve timestamp key ID" --- PASS: TestGetTimestampKeyCreateWithCorruptedStore (0.00s) === RUN TestGetTimestampKeyCreateWithInvalidAlgo --- PASS: TestGetTimestampKeyCreateWithInvalidAlgo (0.00s) === RUN TestGetTimestampKeyExistingMetadata --- PASS: TestGetTimestampKeyExistingMetadata (0.00s) PASS -ok github.com/theupdateframework/notary/server/timestamp 0.143s +ok github.com/theupdateframework/notary/server/timestamp 0.077s === RUN TestHealthCheckKMUnhealthy --- PASS: TestHealthCheckKMUnhealthy (0.00s) === RUN TestHealthCheckSignerUnhealthy @@ -2898,11 +2933,11 @@ === RUN TestHealthCheckSignerTimeout --- PASS: TestHealthCheckSignerTimeout (0.00s) === RUN TestHealthCheckKMHealthy ---- PASS: TestHealthCheckKMHealthy (0.00s) +--- PASS: TestHealthCheckKMHealthy (0.01s) === RUN TestHealthCheckSignerHealthy ---- PASS: TestHealthCheckSignerHealthy (0.03s) +--- PASS: TestHealthCheckSignerHealthy (0.00s) === RUN TestHealthCheckKMConnectionDied ---- PASS: TestHealthCheckKMConnectionDied (0.01s) +--- PASS: TestHealthCheckKMConnectionDied (0.00s) === RUN TestHealthCheckSignerConnectionDied --- PASS: TestHealthCheckSignerConnectionDied (0.00s) === RUN TestHealthCheckForOverallStatus @@ -2910,21 +2945,21 @@ === RUN TestHealthCheckNonexistentService --- PASS: TestHealthCheckNonexistentService (0.00s) === RUN TestGetPrivateKeyAndSignWithExistingKey -time="2025-02-07T18:09:27Z" level=info msg="Sign: Signed message! with KeyID 6b0695a9b7c7533777a25ab98b75998ca7a9d0327678b91190478cf63c1d5243" go.version=go1.15.15 ---- PASS: TestGetPrivateKeyAndSignWithExistingKey (0.04s) +time="2025-02-07T18:11:32Z" level=info msg="Sign: Signed message! with KeyID a45e0c93ed3081bdb8063bac8953a8699d9ca3fc257a9935ff03a1f4c753b270" go.version=go1.15.15 +--- PASS: TestGetPrivateKeyAndSignWithExistingKey (0.02s) === RUN TestCannotSignWithKeyThatDoesntExist -time="2025-02-07T18:09:27Z" level=error msg="Sign: key e6e2a9cbc95818113b8b01c645c76517a2ba70ce3219a7d95ee486931e7989ce not found" go.version=go1.15.15 +time="2025-02-07T18:11:32Z" level=error msg="Sign: key 501b79c75b501cd259a25d2de0eef8cd2072b70eb0572fe3b53ffce58bef2855 not found" go.version=go1.15.15 --- PASS: TestCannotSignWithKeyThatDoesntExist (0.00s) === RUN TestCryptoSignerInterfaceBehavior -time="2025-02-07T18:09:27Z" level=error msg="GetKeyInfo: key nonexistent not found" go.version=go1.15.15 -time="2025-02-07T18:09:27Z" level=error msg="GetKeyInfo: key nonexistent not found" go.version=go1.15.15 -time="2025-02-07T18:09:27Z" level=info msg="CreateKey: Created KeyID 93ffe0431d5b8f81079ad60f2cd7a88e7e000dc3f1a896ffa77899a01c2c8f72" go.version=go1.15.15 -time="2025-02-07T18:09:27Z" level=info msg="CreateKey: Created KeyID f1cb0503c50024c5065b2f49160cf4c7cbcdcfa34607e7e5a805addc713fc665" go.version=go1.15.15 -time="2025-02-07T18:09:27Z" level=error msg="GetKeyInfo: key 93ffe0431d5b8f81079ad60f2cd7a88e7e000dc3f1a896ffa77899a01c2c8f72 not found" go.version=go1.15.15 -time="2025-02-07T18:09:27Z" level=error msg="GetKeyInfo: key f1cb0503c50024c5065b2f49160cf4c7cbcdcfa34607e7e5a805addc713fc665 not found" go.version=go1.15.15 +time="2025-02-07T18:11:32Z" level=error msg="GetKeyInfo: key nonexistent not found" go.version=go1.15.15 +time="2025-02-07T18:11:32Z" level=error msg="GetKeyInfo: key nonexistent not found" go.version=go1.15.15 +time="2025-02-07T18:11:32Z" level=info msg="CreateKey: Created KeyID ef98e0dc7ce0736028b8e51467b41e65540ffd56b89d651a9d9587176cab6ae9" go.version=go1.15.15 +time="2025-02-07T18:11:32Z" level=info msg="CreateKey: Created KeyID e340136283203b46d4abecb152c6488ebfe11e4a8affa41d6d209004439294da" go.version=go1.15.15 +time="2025-02-07T18:11:32Z" level=error msg="GetKeyInfo: key ef98e0dc7ce0736028b8e51467b41e65540ffd56b89d651a9d9587176cab6ae9 not found" go.version=go1.15.15 +time="2025-02-07T18:11:32Z" level=error msg="GetKeyInfo: key e340136283203b46d4abecb152c6488ebfe11e4a8affa41d6d209004439294da not found" go.version=go1.15.15 --- PASS: TestCryptoSignerInterfaceBehavior (0.01s) PASS -ok github.com/theupdateframework/notary/signer 0.140s +ok github.com/theupdateframework/notary/signer 0.061s ? github.com/theupdateframework/notary/signer/api [no test files] ? github.com/theupdateframework/notary/signer/client [no test files] === RUN TestGetSuccessPopulatesCache @@ -2941,30 +2976,30 @@ `nodb` is not officially supported, running under compatibility mode. --- PASS: TestNewSQLKeyDBStorePropagatesDBError (0.00s) === RUN TestSQLDBHealthCheckMissingTable ---- PASS: TestSQLDBHealthCheckMissingTable (0.01s) +--- PASS: TestSQLDBHealthCheckMissingTable (0.00s) === RUN TestSQLDBHealthCheckNoConnection --- PASS: TestSQLDBHealthCheckNoConnection (0.00s) === RUN TestSQLKeyCanOnlyBeAddedOnce (/build/reproducible-path/notary-0.6.1~ds2/_build/src/github.com/theupdateframework/notary/signer/keydbstore/sql_keydbstore.go:98) -[2025-02-07 18:09:26]  UNIQUE constraint failed: private_keys.key_id  ---- PASS: TestSQLKeyCanOnlyBeAddedOnce (0.03s) +[2025-02-07 18:11:31]  UNIQUE constraint failed: private_keys.key_id  +--- PASS: TestSQLKeyCanOnlyBeAddedOnce (0.02s) === RUN TestSQLCreateDelete ---- PASS: TestSQLCreateDelete (0.05s) +--- PASS: TestSQLCreateDelete (0.04s) === RUN TestSQLKeyRotation --- PASS: TestSQLKeyRotation (0.06s) === RUN TestSQLSigningMarksKeyActive -time="2025-02-07T18:09:26Z" level=error msg="Key 4fe426410ff96b8ebb94663af7ddde3e8fcdd40794e00e0b64425fdecec99ce5 was just used to sign hash successful, db closed, error when trying to mark key as active: sql: database is closed" +time="2025-02-07T18:11:31Z" level=error msg="Key b808e66ac69e9fbea169e2b0e0ea05f10c75febc9eb845c0fa9abde552c48048 was just used to sign hash successful, db closed, error when trying to mark key as active: sql: database is closed" --- PASS: TestSQLSigningMarksKeyActive (0.06s) === RUN TestSQLCreateKey (/build/reproducible-path/notary-0.6.1~ds2/_build/src/github.com/theupdateframework/notary/signer/keydbstore/sql_keydbstore.go:197) -[2025-02-07 18:09:26]  sql: database is closed  ---- PASS: TestSQLCreateKey (0.09s) +[2025-02-07 18:11:31]  sql: database is closed  +--- PASS: TestSQLCreateKey (0.05s) === RUN TestSQLUnimplementedInterfaceBehavior ---- PASS: TestSQLUnimplementedInterfaceBehavior (0.02s) +--- PASS: TestSQLUnimplementedInterfaceBehavior (0.01s) PASS -ok github.com/theupdateframework/notary/signer/keydbstore 0.376s +ok github.com/theupdateframework/notary/signer/keydbstore 0.285s === RUN TestSet --- PASS: TestSet (0.00s) === RUN TestSetWithNoParentDirectory @@ -3004,11 +3039,11 @@ === RUN TestSetSingleAndSetMultiMeta --- PASS: TestSetSingleAndSetMultiMeta (0.00s) === RUN Test404Error ---- PASS: Test404Error (0.00s) +--- PASS: Test404Error (0.01s) === RUN Test50XErrors ---- PASS: Test50XErrors (0.00s) +--- PASS: Test50XErrors (0.01s) === RUN Test400Error ---- PASS: Test400Error (0.03s) +--- PASS: Test400Error (0.00s) === RUN TestTranslateErrorsParse400Errors --- PASS: TestTranslateErrorsParse400Errors (0.00s) === RUN TestTranslateErrorsWhenCannotParse400 @@ -3016,13 +3051,13 @@ === RUN TestTranslateErrorsLimitsErrorSize --- PASS: TestTranslateErrorsLimitsErrorSize (0.00s) === RUN TestHTTPStoreRemoveAll ---- PASS: TestHTTPStoreRemoveAll (0.00s) +--- PASS: TestHTTPStoreRemoveAll (0.01s) === RUN TestHTTPStoreRotateKey --- PASS: TestHTTPStoreRotateKey (0.00s) === RUN TestHTTPStoreGetKey --- PASS: TestHTTPStoreGetKey (0.00s) === RUN TestHTTPStoreGetRotateKeySizeLimited ---- PASS: TestHTTPStoreGetRotateKeySizeLimited (0.04s) +--- PASS: TestHTTPStoreGetRotateKeySizeLimited (0.02s) === RUN TestHTTPOffline --- PASS: TestHTTPOffline (0.00s) === RUN TestErrServerUnavailable @@ -3041,7 +3076,7 @@ === RUN TestMemoryStoreMetadata --- PASS: TestMemoryStoreMetadata (0.00s) PASS -ok github.com/theupdateframework/notary/storage 0.119s +ok github.com/theupdateframework/notary/storage 0.087s ? github.com/theupdateframework/notary/storage/rethinkdb [no test files] === RUN TestExportKeys --- PASS: TestExportKeys (0.00s) @@ -3064,10 +3099,10 @@ === RUN TestImportKeys2InOneFile --- PASS: TestImportKeys2InOneFile (0.00s) === RUN TestImportKeys2InOneFileNoPath ---- PASS: TestImportKeys2InOneFileNoPath (0.01s) +--- PASS: TestImportKeys2InOneFileNoPath (0.00s) === RUN TestEncryptedKeyImportFail -time="2025-02-07T18:09:25Z" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header" ---- PASS: TestEncryptedKeyImportFail (0.03s) +time="2025-02-07T18:11:31Z" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header" +--- PASS: TestEncryptedKeyImportFail (0.02s) === RUN TestEncryptedKeyImportSuccess --- PASS: TestEncryptedKeyImportSuccess (0.00s) === RUN TestEncryption @@ -3075,7 +3110,7 @@ === RUN TestAddKey --- PASS: TestAddKey (0.01s) === RUN TestKeyStoreInternalState ---- PASS: TestKeyStoreInternalState (0.01s) +--- PASS: TestKeyStoreInternalState (0.00s) === RUN TestGet --- PASS: TestGet (0.00s) === RUN TestGetLegacyKey @@ -3083,99 +3118,99 @@ === RUN TestListKeys --- PASS: TestListKeys (0.01s) === RUN TestAddGetKeyMemStore ---- PASS: TestAddGetKeyMemStore (0.01s) +--- PASS: TestAddGetKeyMemStore (0.00s) === RUN TestAddGetKeyInfoMemStore --- PASS: TestAddGetKeyInfoMemStore (0.01s) === RUN TestGetDecryptedWithTamperedCipherText -time="2025-02-07T18:09:25Z" level=error msg="PEM block is empty" +time="2025-02-07T18:11:31Z" level=error msg="PEM block is empty" --- PASS: TestGetDecryptedWithTamperedCipherText (0.00s) === RUN TestGetDecryptedWithInvalidPassphrase ---- PASS: TestGetDecryptedWithInvalidPassphrase (0.02s) +--- PASS: TestGetDecryptedWithInvalidPassphrase (0.01s) === RUN TestGetDecryptedWithConsistentlyInvalidPassphrase ---- PASS: TestGetDecryptedWithConsistentlyInvalidPassphrase (0.03s) +--- PASS: TestGetDecryptedWithConsistentlyInvalidPassphrase (0.02s) === RUN TestRemoveKey --- PASS: TestRemoveKey (0.01s) === RUN TestKeysAreCached ---- PASS: TestKeysAreCached (0.01s) +--- PASS: TestKeysAreCached (0.00s) PASS -ok github.com/theupdateframework/notary/trustmanager 0.229s +ok github.com/theupdateframework/notary/trustmanager 0.156s === RUN TestRemoteStore -time="2025-02-07T18:09:27Z" level=info msg="listing files from localhost:9888" -time="2025-02-07T18:09:27Z" level=info msg="listing files from localhost:9888" +time="2025-02-07T18:11:32Z" level=info msg="listing files from localhost:9888" +time="2025-02-07T18:11:32Z" level=info msg="listing files from localhost:9888" --- PASS: TestRemoteStore (0.07s) === RUN TestErrors -time="2025-02-07T18:09:27Z" level=error msg="failed to store: test error" ---- PASS: TestErrors (0.08s) +time="2025-02-07T18:11:32Z" level=error msg="failed to store: test error" +--- PASS: TestErrors (0.05s) === RUN TestNewGRPCStorage --- PASS: TestNewGRPCStorage (0.00s) === RUN TestGRPCStorage --- PASS: TestGRPCStorage (0.00s) PASS -ok github.com/theupdateframework/notary/trustmanager/remoteks 0.206s +ok github.com/theupdateframework/notary/trustmanager/remoteks 0.142s ? github.com/theupdateframework/notary/trustmanager/yubikey [no test files] === RUN TestWildcardMatch --- PASS: TestWildcardMatch (0.00s) === RUN TestValidateRoot -2025/02/07 18:09:27 [INFO] generate received request -2025/02/07 18:09:27 [INFO] received CSR -2025/02/07 18:09:27 [INFO] generating key: ecdsa-256 -2025/02/07 18:09:27 [INFO] encoded CSR -2025/02/07 18:09:27 [INFO] signed certificate with serial number 659312369986711901712371996117373517376621631788 -2025/02/07 18:09:27 [INFO] received CSR -2025/02/07 18:09:27 [INFO] generating key: ecdsa-256 -2025/02/07 18:09:27 [INFO] encoded CSR -2025/02/07 18:09:27 [INFO] signed certificate with serial number 226095710944918647690685934631982082153902345354 -2025/02/07 18:09:27 [INFO] received CSR -2025/02/07 18:09:27 [INFO] generating key: ecdsa-256 -2025/02/07 18:09:27 [INFO] encoded CSR -2025/02/07 18:09:27 [INFO] signed certificate with serial number 312268517232033834336496084191378660877452556578 ---- PASS: TestValidateRoot (0.05s) +2025/02/07 18:11:32 [INFO] generate received request +2025/02/07 18:11:32 [INFO] received CSR +2025/02/07 18:11:32 [INFO] generating key: ecdsa-256 +2025/02/07 18:11:32 [INFO] encoded CSR +2025/02/07 18:11:32 [INFO] signed certificate with serial number 498047589223534339163590162677257792671906872316 +2025/02/07 18:11:32 [INFO] received CSR +2025/02/07 18:11:32 [INFO] generating key: ecdsa-256 +2025/02/07 18:11:32 [INFO] encoded CSR +2025/02/07 18:11:32 [INFO] signed certificate with serial number 230422124799555934285459923275562641145517869734 +2025/02/07 18:11:32 [INFO] received CSR +2025/02/07 18:11:32 [INFO] generating key: ecdsa-256 +2025/02/07 18:11:32 [INFO] encoded CSR +2025/02/07 18:11:32 [INFO] signed certificate with serial number 401886995901165355675786356120829711194639775694 +--- PASS: TestValidateRoot (0.03s) === RUN TestValidateRootWithoutTOFUS --- PASS: TestValidateRootWithoutTOFUS (0.00s) === RUN TestValidateRootWithPinnedCert ---- PASS: TestValidateRootWithPinnedCert (0.01s) +--- PASS: TestValidateRootWithPinnedCert (0.00s) === RUN TestValidateRootWithPinnedCertAndIntermediates --- PASS: TestValidateRootWithPinnedCertAndIntermediates (0.01s) === RUN TestValidateRootFailuresWithPinnedCert ---- PASS: TestValidateRootFailuresWithPinnedCert (0.00s) +--- PASS: TestValidateRootFailuresWithPinnedCert (0.01s) === RUN TestValidateRootWithPinnedCA ---- PASS: TestValidateRootWithPinnedCA (0.06s) +--- PASS: TestValidateRootWithPinnedCA (0.05s) === RUN TestValidateSuccessfulRootRotation ---- PASS: TestValidateSuccessfulRootRotation (0.10s) +--- PASS: TestValidateSuccessfulRootRotation (0.03s) === RUN TestValidateRootRotationMissingOrigSig ---- PASS: TestValidateRootRotationMissingOrigSig (0.06s) +--- PASS: TestValidateRootRotationMissingOrigSig (0.02s) === RUN TestValidateRootRotationMissingNewSig ---- PASS: TestValidateRootRotationMissingNewSig (0.06s) +--- PASS: TestValidateRootRotationMissingNewSig (0.02s) === RUN TestValidateRootRotationTrustPinning ---- PASS: TestValidateRootRotationTrustPinning (0.07s) +--- PASS: TestValidateRootRotationTrustPinning (0.03s) === RUN TestValidateRootRotationTrustPinningInvalidCA ---- PASS: TestValidateRootRotationTrustPinningInvalidCA (0.04s) +--- PASS: TestValidateRootRotationTrustPinningInvalidCA (0.02s) === RUN TestParsePEMPublicKey -time="2025-02-07T18:09:27Z" level=warning msg="certificate with CN notary is near expiry" +time="2025-02-07T18:11:32Z" level=warning msg="certificate with CN notary is near expiry" --- PASS: TestParsePEMPublicKey (0.00s) === RUN TestCheckingCertExpiry -time="2025-02-07T18:09:27Z" level=warning msg="certificate with CN notary is near expiry" ---- PASS: TestCheckingCertExpiry (0.01s) +time="2025-02-07T18:11:32Z" level=warning msg="certificate with CN notary is near expiry" +--- PASS: TestCheckingCertExpiry (0.00s) === RUN TestValidateRootWithExpiredIntermediate ---- PASS: TestValidateRootWithExpiredIntermediate (0.01s) +--- PASS: TestValidateRootWithExpiredIntermediate (0.00s) === RUN TestCheckingWildcardCert ---- PASS: TestCheckingWildcardCert (0.01s) +--- PASS: TestCheckingWildcardCert (0.00s) === RUN TestWildcardMatching --- PASS: TestWildcardMatching (0.00s) PASS -ok github.com/theupdateframework/notary/trustpinning 0.514s +ok github.com/theupdateframework/notary/trustpinning 0.263s === RUN TestInitSnapshotNoTargets --- PASS: TestInitSnapshotNoTargets (0.00s) === RUN TestInitRepo ---- PASS: TestInitRepo (0.01s) +--- PASS: TestInitRepo (0.00s) === RUN TestUpdateDelegations --- PASS: TestUpdateDelegations (0.00s) === RUN TestPurgeDelegationsKeyFromTop -time="2025-02-07T18:09:27Z" level=warning msg="role targets/sybil has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2025-02-07T18:09:27Z" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-07T18:11:32Z" level=warning msg="role targets/sybil has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-07T18:11:32Z" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it" --- PASS: TestPurgeDelegationsKeyFromTop (0.00s) === RUN TestPurgeDelegationsKeyFromDeep -time="2025-02-07T18:09:27Z" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-07T18:11:32Z" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it" --- PASS: TestPurgeDelegationsKeyFromDeep (0.00s) === RUN TestPurgeDelegationsKeyBadWildRole --- PASS: TestPurgeDelegationsKeyBadWildRole (0.00s) @@ -3188,7 +3223,7 @@ === RUN TestUpdateDelegationsRoleThatIsMissingDelegationKey --- PASS: TestUpdateDelegationsRoleThatIsMissingDelegationKey (0.00s) === RUN TestUpdateDelegationsNotEnoughKeys -time="2025-02-07T18:09:27Z" level=warning msg="role targets/role has fewer keys than its threshold of 2; it will not be usable until keys are added to it" +time="2025-02-07T18:11:32Z" level=warning msg="role targets/role has fewer keys than its threshold of 2; it will not be usable until keys are added to it" --- PASS: TestUpdateDelegationsNotEnoughKeys (0.00s) === RUN TestUpdateDelegationsAddKeyToRole --- PASS: TestUpdateDelegationsAddKeyToRole (0.00s) @@ -3231,7 +3266,7 @@ === RUN TestAddBaseKeysToRoot --- PASS: TestAddBaseKeysToRoot (0.00s) === RUN TestRemoveBaseKeysFromRoot ---- PASS: TestRemoveBaseKeysFromRoot (0.01s) +--- PASS: TestRemoveBaseKeysFromRoot (0.00s) === RUN TestReplaceBaseKeysInRoot --- PASS: TestReplaceBaseKeysInRoot (0.01s) === RUN TestGetAllRoles @@ -3255,13 +3290,13 @@ === RUN TestGetDelegationRoleKeyMissing --- PASS: TestGetDelegationRoleKeyMissing (0.00s) === RUN TestSignRootOldKeyCertExists ---- PASS: TestSignRootOldKeyCertExists (0.04s) +--- PASS: TestSignRootOldKeyCertExists (0.03s) === RUN TestSignRootOldKeyCertMissing --- PASS: TestSignRootOldKeyCertMissing (0.01s) === RUN TestRootKeyRotation ---- PASS: TestRootKeyRotation (0.07s) +--- PASS: TestRootKeyRotation (0.04s) === RUN TestBuilderLoadsValidRolesOnly ---- PASS: TestBuilderLoadsValidRolesOnly (0.01s) +--- PASS: TestBuilderLoadsValidRolesOnly (0.00s) === RUN TestBuilderOnlyAcceptsRootFirstWhenLoading --- PASS: TestBuilderOnlyAcceptsRootFirstWhenLoading (0.00s) === RUN TestBuilderOnlyAcceptsDelegationsAfterParent @@ -3273,15 +3308,15 @@ === RUN TestBuilderLoadInvalidDelegationsOldVersion --- PASS: TestBuilderLoadInvalidDelegationsOldVersion (0.00s) === RUN TestBuilderAcceptRoleOnce ---- PASS: TestBuilderAcceptRoleOnce (0.01s) +--- PASS: TestBuilderAcceptRoleOnce (0.00s) === RUN TestBuilderStopsAcceptingOrProducingDataOnceDone ---- PASS: TestBuilderStopsAcceptingOrProducingDataOnceDone (0.01s) +--- PASS: TestBuilderStopsAcceptingOrProducingDataOnceDone (0.00s) === RUN TestGenerateSnapshotInvalidOperations ---- PASS: TestGenerateSnapshotInvalidOperations (0.05s) +--- PASS: TestGenerateSnapshotInvalidOperations (0.02s) === RUN TestGenerateTimestampInvalidOperations ---- PASS: TestGenerateTimestampInvalidOperations (0.04s) +--- PASS: TestGenerateTimestampInvalidOperations (0.02s) === RUN TestGetConsistentInfo ---- PASS: TestGetConsistentInfo (0.00s) +--- PASS: TestGetConsistentInfo (0.01s) === RUN TestTimestampPreAndPostChecksumming --- PASS: TestTimestampPreAndPostChecksumming (0.01s) === RUN TestSnapshotLoadedFirstChecksumsOthers @@ -3289,7 +3324,7 @@ === RUN TestSnapshotLoadedAfterChecksumsOthersRetroactively --- PASS: TestSnapshotLoadedAfterChecksumsOthersRetroactively (0.02s) PASS -ok github.com/theupdateframework/notary/tuf 0.412s +ok github.com/theupdateframework/notary/tuf 0.258s === RUN TestMergeStrSlicesExclusive --- PASS: TestMergeStrSlicesExclusive (0.00s) === RUN TestMergeStrSlicesOverlap @@ -3339,7 +3374,7 @@ === RUN TestRootFromSignedValidatesRoleData --- PASS: TestRootFromSignedValidatesRoleData (0.00s) === RUN TestRootFromSignedValidatesRoleType ---- PASS: TestRootFromSignedValidatesRoleType (0.01s) +--- PASS: TestRootFromSignedValidatesRoleType (0.00s) === RUN TestRootFromSignedValidatesVersion --- PASS: TestRootFromSignedValidatesVersion (0.00s) === RUN TestSnapshotToSignedMarshalsSignedPortionWithCanonicalJSON @@ -3423,7 +3458,7 @@ === RUN TestFileMetaEquals --- PASS: TestFileMetaEquals (0.00s) PASS -ok github.com/theupdateframework/notary/tuf/data 0.048s +ok github.com/theupdateframework/notary/tuf/data 0.024s === RUN TestListKeys --- PASS: TestListKeys (0.00s) === RUN TestGetKeys @@ -3439,29 +3474,29 @@ === RUN TestSignWithX509 --- PASS: TestSignWithX509 (0.00s) === RUN TestSignRemovesValidSigByInvalidKey ---- PASS: TestSignRemovesValidSigByInvalidKey (0.01s) +--- PASS: TestSignRemovesValidSigByInvalidKey (0.00s) === RUN TestSignRemovesInvalidSig --- PASS: TestSignRemovesInvalidSig (0.00s) === RUN TestSignMinSignatures --- PASS: TestSignMinSignatures (0.00s) === RUN TestSignFailingKeys ---- PASS: TestSignFailingKeys (0.03s) +--- PASS: TestSignFailingKeys (0.02s) === RUN TestErrInsufficientSignaturesMessaging --- PASS: TestErrInsufficientSignaturesMessaging (0.00s) === RUN TestRSAPSSVerifier ---- PASS: TestRSAPSSVerifier (0.01s) +--- PASS: TestRSAPSSVerifier (0.00s) === RUN TestRSAPSSx509Verifier --- PASS: TestRSAPSSx509Verifier (0.00s) === RUN TestRSAPSSVerifierWithInvalidKeyType --- PASS: TestRSAPSSVerifierWithInvalidKeyType (0.00s) === RUN TestRSAPSSVerifierWithInvalidKeyLength ---- PASS: TestRSAPSSVerifierWithInvalidKeyLength (0.06s) +--- PASS: TestRSAPSSVerifierWithInvalidKeyLength (0.14s) === RUN TestRSAPSSVerifierWithInvalidKey --- PASS: TestRSAPSSVerifierWithInvalidKey (0.00s) === RUN TestRSAPSSVerifierWithInvalidSignature ---- PASS: TestRSAPSSVerifierWithInvalidSignature (0.01s) +--- PASS: TestRSAPSSVerifierWithInvalidSignature (0.00s) === RUN TestRSAPKCS1v15Verifier ---- PASS: TestRSAPKCS1v15Verifier (0.00s) +--- PASS: TestRSAPKCS1v15Verifier (0.01s) === RUN TestRSAPKCS1v15x509Verifier --- PASS: TestRSAPKCS1v15x509Verifier (0.00s) === RUN TestRSAPKCS1v15VerifierWithInvalidKeyType @@ -3469,12 +3504,12 @@ === RUN TestRSAPKCS1v15VerifierWithInvalidKey --- PASS: TestRSAPKCS1v15VerifierWithInvalidKey (0.00s) === RUN TestRSAPKCS1v15VerifierWithInvalidSignature -time="2025-02-07T18:09:28Z" level=error msg="Failed verification: crypto/rsa: verification error" +time="2025-02-07T18:11:32Z" level=error msg="Failed verification: crypto/rsa: verification error" --- PASS: TestRSAPKCS1v15VerifierWithInvalidSignature (0.00s) === RUN TestECDSAVerifier --- PASS: TestECDSAVerifier (0.00s) === RUN TestECDSAVerifierOtherCurves ---- PASS: TestECDSAVerifierOtherCurves (0.26s) +--- PASS: TestECDSAVerifierOtherCurves (0.13s) === RUN TestECDSAx509Verifier --- PASS: TestECDSAx509Verifier (0.00s) === RUN TestECDSAVerifierWithInvalidKeyType @@ -3512,16 +3547,16 @@ === RUN TestVerifyVersion --- PASS: TestVerifyVersion (0.00s) === RUN TestVerifyExpiry -time="2025-02-07T18:09:28Z" level=error msg="Metadata for root expired" +time="2025-02-07T18:11:32Z" level=error msg="Metadata for root expired" --- PASS: TestVerifyExpiry (0.00s) === RUN TestVerifyPublicKeyMatchesPrivateKeyHappyCase --- PASS: TestVerifyPublicKeyMatchesPrivateKeyHappyCase (0.00s) === RUN TestVerifyPublicKeyMatchesPrivateKeyFails --- PASS: TestVerifyPublicKeyMatchesPrivateKeyFails (0.00s) PASS -ok github.com/theupdateframework/notary/tuf/signed 0.424s +ok github.com/theupdateframework/notary/tuf/signed 0.355s === RUN TestNewSwizzler ---- PASS: TestNewSwizzler (0.03s) +--- PASS: TestNewSwizzler (0.02s) === RUN TestSwizzlerSetInvalidJSON --- PASS: TestSwizzlerSetInvalidJSON (0.00s) === RUN TestSwizzlerAddExtraSpace @@ -3535,9 +3570,9 @@ === RUN TestSwizzlerInvalidateMetadataSignatures --- PASS: TestSwizzlerInvalidateMetadataSignatures (0.00s) === RUN TestSwizzlerRemoveMetadata ---- PASS: TestSwizzlerRemoveMetadata (0.01s) +--- PASS: TestSwizzlerRemoveMetadata (0.00s) === RUN TestSwizzlerSignMetadataWithInvalidKey ---- PASS: TestSwizzlerSignMetadataWithInvalidKey (0.01s) +--- PASS: TestSwizzlerSignMetadataWithInvalidKey (0.00s) === RUN TestSwizzlerOffsetMetadataVersion --- PASS: TestSwizzlerOffsetMetadataVersion (0.01s) === RUN TestSwizzlerExpireMetadata @@ -3555,27 +3590,27 @@ === RUN TestSwizzlerUpdateTimestamp --- PASS: TestSwizzlerUpdateTimestamp (0.01s) === RUN TestMissingSigningKey ---- PASS: TestMissingSigningKey (0.01s) +--- PASS: TestMissingSigningKey (0.00s) === RUN TestSwizzlerMutateRoot --- PASS: TestSwizzlerMutateRoot (0.00s) === RUN TestSwizzlerMutateTimestamp ---- PASS: TestSwizzlerMutateTimestamp (0.01s) +--- PASS: TestSwizzlerMutateTimestamp (0.00s) === RUN TestSwizzlerMutateSnapshot --- PASS: TestSwizzlerMutateSnapshot (0.00s) === RUN TestSwizzlerMutateTargets ---- PASS: TestSwizzlerMutateTargets (0.01s) +--- PASS: TestSwizzlerMutateTargets (0.00s) === RUN TestSwizzlerRotateKeyBaseRole --- PASS: TestSwizzlerRotateKeyBaseRole (0.01s) === RUN TestSwizzlerRotateKeyDelegationRole --- PASS: TestSwizzlerRotateKeyDelegationRole (0.00s) PASS -ok github.com/theupdateframework/notary/tuf/testutils 0.230s +ok github.com/theupdateframework/notary/tuf/testutils 0.154s ? github.com/theupdateframework/notary/tuf/testutils/interfaces [no test files] ? github.com/theupdateframework/notary/tuf/testutils/keys [no test files] === RUN TestConvertTUFKeyToPKCS8 --- PASS: TestConvertTUFKeyToPKCS8 (0.02s) === RUN TestParsePKCS8ToTufKey ---- PASS: TestParsePKCS8ToTufKey (0.11s) +--- PASS: TestParsePKCS8ToTufKey (0.13s) === RUN TestPEMtoPEM --- PASS: TestPEMtoPEM (0.00s) === RUN TestRoleListLen @@ -3615,7 +3650,7 @@ === RUN TestNewCertificate --- PASS: TestNewCertificate (0.00s) === RUN TestKeyOperations ---- PASS: TestKeyOperations (0.01s) +--- PASS: TestKeyOperations (0.02s) === RUN TestRSAX509PublickeyID --- PASS: TestRSAX509PublickeyID (0.00s) === RUN TestECDSAX509PublickeyID @@ -3631,9 +3666,9 @@ === RUN TestValidateCertificateWithInvalidExpiry --- PASS: TestValidateCertificateWithInvalidExpiry (0.00s) === RUN TestValidateCertificateWithShortKey ---- PASS: TestValidateCertificateWithShortKey (0.08s) +--- PASS: TestValidateCertificateWithShortKey (0.04s) PASS -ok github.com/theupdateframework/notary/tuf/utils 0.244s +ok github.com/theupdateframework/notary/tuf/utils 0.219s === RUN TestNewSerializableErrorNonValidationError --- PASS: TestNewSerializableErrorNonValidationError (0.00s) === RUN TestNewSerializableErrorValidationError @@ -3649,7 +3684,7 @@ === RUN TestUnmarshalInvalidJSON --- PASS: TestUnmarshalInvalidJSON (0.00s) PASS -ok github.com/theupdateframework/notary/tuf/validation 0.017s +ok github.com/theupdateframework/notary/tuf/validation 0.006s === RUN TestSetSignalTrap --- PASS: TestSetSignalTrap (0.00s) === RUN TestLogLevelSignalHandle @@ -3749,7 +3784,7 @@ === RUN TestDoAuthWildcardImage --- PASS: TestDoAuthWildcardImage (0.00s) PASS -ok github.com/theupdateframework/notary/utils 0.021s +ok github.com/theupdateframework/notary/utils 0.022s ? github.com/theupdateframework/notary/version [no test files] create-stamp debian/debhelper-build-stamp fakeroot debian/rules binary @@ -3794,9 +3829,9 @@ dh_gencontrol -O--builddirectory=/build/reproducible-path/notary-0.6.1\~ds2/_build -O--buildsystem=golang dh_md5sums -O--builddirectory=/build/reproducible-path/notary-0.6.1\~ds2/_build -O--buildsystem=golang dh_builddeb -O--builddirectory=/build/reproducible-path/notary-0.6.1\~ds2/_build -O--buildsystem=golang -dpkg-deb: building package 'notary-dbgsym' in '../notary-dbgsym_0.6.1~ds2-6_arm64.deb'. dpkg-deb: building package 'notary' in '../notary_0.6.1~ds2-6_arm64.deb'. dpkg-deb: building package 'golang-github-docker-notary-dev' in '../golang-github-docker-notary-dev_0.6.1~ds2-6_all.deb'. +dpkg-deb: building package 'notary-dbgsym' in '../notary-dbgsym_0.6.1~ds2-6_arm64.deb'. dpkg-genbuildinfo --build=binary dpkg-genchanges --build=binary >../notary_0.6.1~ds2-6_arm64.changes dpkg-genchanges: info: binary-only upload (no source code included) @@ -3804,12 +3839,14 @@ dpkg-buildpackage: info: binary-only upload (no source included) dpkg-genchanges: info: not including original source code in upload I: copying local configuration +I: user script /srv/workspace/pbuilder/3056726/tmp/hooks/B01_cleanup starting +I: user script /srv/workspace/pbuilder/3056726/tmp/hooks/B01_cleanup finished I: unmounting dev/ptmx filesystem I: unmounting dev/pts filesystem I: unmounting dev/shm filesystem I: unmounting proc filesystem I: unmounting sys filesystem I: cleaning the build env -I: removing directory /srv/workspace/pbuilder/25028 and its subdirectories -I: Current time: Fri Feb 7 06:10:30 -12 2025 -I: pbuilder-time-stamp: 1738951830 +I: removing directory /srv/workspace/pbuilder/3056726 and its subdirectories +I: Current time: Sat Feb 8 08:13:28 +14 2025 +I: pbuilder-time-stamp: 1738952008