Diff of the two buildlogs: -- --- b1/build.log 2020-04-29 15:40:36.486934033 +0000 +++ b2/build.log 2020-04-29 15:42:38.264496653 +0000 @@ -1,6 +1,6 @@ I: pbuilder: network access will be disabled during build -I: Current time: Wed Apr 29 03:31:01 -12 2020 -I: pbuilder-time-stamp: 1588174261 +I: Current time: Wed Jun 2 12:03:37 +14 2021 +I: pbuilder-time-stamp: 1622585017 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/buster-reproducible-base.tgz] I: copying local configuration @@ -18,7 +18,7 @@ I: Extracting source gpgv: unknown type of key resource 'trustedkeys.kbx' gpgv: keyblock resource '/root/.gnupg/trustedkeys.kbx': General error -gpgv: Signature made Wed Apr 3 04:30:39 2019 -12 +gpgv: Signature made Thu Apr 4 06:30:39 2019 +14 gpgv: using RSA key F391760D93F46892AC48AC8738D00F0018BE3E35 gpgv: issuer "zhsj@debian.org" gpgv: Can't check signature: No public key @@ -31,6 +31,18 @@ dpkg-source: info: applying test--nontest.patch I: using fakeroot in build. I: Installing the build-deps +I: user script /srv/workspace/pbuilder/25579/tmp/hooks/D01_modify_environment starting +debug: Running on profitbricks-build16-i386. +I: Changing host+domainname to test build reproducibility +I: Adding a custom variable just for the fun of it... +I: Changing /bin/sh to bash +Removing 'diversion of /bin/sh to /bin/sh.distrib by dash' +Adding 'diversion of /bin/sh to /bin/sh.distrib by bash' +Removing 'diversion of /usr/share/man/man1/sh.1.gz to /usr/share/man/man1/sh.distrib.1.gz by dash' +Adding 'diversion of /usr/share/man/man1/sh.1.gz to /usr/share/man/man1/sh.distrib.1.gz by bash' +I: Setting pbuilder2's login shell to /bin/bash +I: Setting pbuilder2's GECOS to second user,second room,second work-phone,second home-phone,second other +I: user script /srv/workspace/pbuilder/25579/tmp/hooks/D01_modify_environment finished -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy @@ -350,7 +362,7 @@ Get: 228 http://deb.debian.org/debian buster/main i386 golang-gopkg-gorethink-gorethink.v3-dev all 3.0.5-1 [112 kB] Get: 229 http://deb.debian.org/debian buster/main i386 libssl1.1 i386 1.1.1d-0+deb10u2 [1538 kB] Get: 230 http://deb.debian.org/debian buster/main i386 openssl i386 1.1.1d-0+deb10u2 [853 kB] -Fetched 109 MB in 23s (4849 kB/s) +Fetched 109 MB in 2s (45.0 MB/s) debconf: delaying package configuration, since apt-utils is not installed Selecting previously unselected package libbsd0:i386. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19231 files and directories currently installed.) @@ -1293,7 +1305,7 @@ fakeroot is already the newest version (1.23-1). 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. I: Building the package -I: Running cd /build/notary-0.6.1~ds1/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-buildpackage -us -uc -b +I: Running cd /build/notary-0.6.1~ds1/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-buildpackage -us -uc -b dpkg-buildpackage: info: source package notary dpkg-buildpackage: info: source version 0.6.1~ds1-3 dpkg-buildpackage: info: source distribution unstable @@ -1321,15 +1333,15 @@ sed -i '/command -v cfssljson/i exit 0' ./fixtures/regenerateTestingCerts.sh cd fixtures && ./regenerateTestingCerts.sh Generating RSA private key, 4096 bit long modulus (2 primes) -.............................................................................................................................................................++++ -..++++ +..................................................................................................................................................++++ +............................................++++ e is 65537 (0x010001) Signature ok subject=C = US, ST = CA, L = San Francisco, O = Docker, CN = Notary Testing CA Getting Private key Generating RSA private key, 4096 bit long modulus (2 primes) -...........................................................................................................................++++ -.........++++ +......++++ +...................................++++ e is 65537 (0x010001) Signature ok subject=C = US, ST = CA, L = San Francisco, O = Docker, CN = Notary Intermediate Testing CA @@ -1357,642 +1369,642 @@ debian/rules override_dh_auto_build make[1]: Entering directory '/build/notary-0.6.1~ds1' dh_auto_build -- -tags "pkcs11" - cd _build && go install -gcflags=all=\"-trimpath=/build/notary-0.6.1\~ds1/_build/src\" -asmflags=all=\"-trimpath=/build/notary-0.6.1\~ds1/_build/src\" -v -p 10 -tags pkcs11 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version -errors + cd _build && go install -gcflags=all=\"-trimpath=/build/notary-0.6.1\~ds1/_build/src\" -asmflags=all=\"-trimpath=/build/notary-0.6.1\~ds1/_build/src\" -v -p 18 -tags pkcs11 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version internal/race -unicode/utf8 -math/bits -encoding -runtime/internal/sys -unicode -runtime/internal/atomic +errors unicode/utf16 -internal/cpu -sync/atomic -math -vendor/golang_org/x/net/dns/dnsmessage -internal/nettrace +math/bits crypto/internal/subtle +unicode/utf8 +runtime/internal/atomic crypto/subtle +encoding +vendor/golang_org/x/net/dns/dnsmessage +runtime/internal/sys vendor/golang_org/x/crypto/cryptobyte/asn1 -runtime/cgo -internal/testlog container/list google.golang.org/grpc/resolver -github.com/hashicorp/hcl/hcl/strconv -internal/bytealg +sync/atomic +internal/cpu +internal/nettrace +unicode +github.com/lib/pq/oid google.golang.org/grpc/internal github.com/theupdateframework/notary/version -github.com/lib/pq/oid google.golang.org/grpc/resolver/passthrough +internal/testlog +github.com/hashicorp/hcl/hcl/strconv +runtime/cgo +math +internal/bytealg runtime strconv crypto/rc4 golang.org/x/crypto/blowfish sync +math/rand internal/singleflight io reflect -math/rand syscall hash crypto/internal/randutil -strings bytes +text/tabwriter crypto/cipher +strings crypto crypto/hmac -text/tabwriter hash/crc32 golang.org/x/crypto/pbkdf2 -crypto/md5 crypto/sha512 +crypto/md5 crypto/sha256 crypto/sha1 -crypto/aes github.com/dvsekhvalnov/jose2go/padding -golang.org/x/text/transform vendor/golang_org/x/text/transform +golang.org/x/text/transform bufio -google.golang.org/grpc/encoding -path +crypto/aes encoding/base32 +path +google.golang.org/grpc/encoding html -time internal/syscall/unix +time google.golang.org/grpc/keepalive internal/poll -os -github.com/theupdateframework/notary -os/signal -sort encoding/binary -fmt +sort github.com/beorn7/perks/quantile -path/filepath regexp/syntax github.com/prometheus/common/internal/bitbucket.org/ww/goautoneg -runtime/debug +os +vendor/golang_org/x/crypto/poly1305 encoding/base64 crypto/des vendor/golang_org/x/crypto/internal/chacha20 -golang.org/x/crypto/ed25519/internal/edwards25519 -vendor/golang_org/x/crypto/poly1305 vendor/golang_org/x/crypto/curve25519 +golang.org/x/crypto/ed25519/internal/edwards25519 vendor/golang_org/x/crypto/chacha20poly1305 +github.com/dvsekhvalnov/jose2go/base64url +encoding/pem +github.com/dvsekhvalnov/jose2go/compact +github.com/theupdateframework/notary +runtime/debug +os/signal +path/filepath +fmt io/ioutil github.com/spf13/afero/mem -encoding/pem -github.com/dvsekhvalnov/jose2go/base64url -context -github.com/docker/go/canonical/json -encoding/json +github.com/prometheus/procfs/internal/util +regexp log +context encoding/hex -math/big -net/url -net -mime mime/quotedprintable +mime +encoding/json +net/url +math/big compress/flate -vendor/golang_org/x/text/unicode/bidi -vendor/golang_org/x/text/unicode/norm -vendor/golang_org/x/net/http2/hpack -regexp +github.com/docker/go/canonical/json net/http/internal +github.com/hashicorp/hcl/hcl/token +vendor/golang_org/x/net/http2/hpack +encoding/csv github.com/miekg/pkcs11 -vendor/golang_org/x/text/secure/bidirule flag -encoding/csv -compress/gzip -github.com/hashicorp/hcl/hcl/token +vendor/golang_org/x/text/unicode/norm text/template/parse -github.com/spf13/jwalterweatherman +golang.org/x/net/http2/hpack +vendor/golang_org/x/text/unicode/bidi golang.org/x/text/unicode/norm -github.com/theupdateframework/notary/tuf/validation github.com/hashicorp/hcl/hcl/ast github.com/hashicorp/hcl/hcl/scanner -vendor/golang_org/x/net/idna +net github.com/hashicorp/hcl/json/token github.com/pelletier/go-toml +github.com/spf13/jwalterweatherman github.com/hashicorp/hcl/json/scanner github.com/hashicorp/hcl/hcl/parser gopkg.in/yaml.v2 -github.com/hashicorp/hcl/json/parser -github.com/hashicorp/hcl/hcl/printer -github.com/hashicorp/hcl -github.com/golang/protobuf/proto -crypto/rand -github.com/docker/distribution/uuid -encoding/asn1 -crypto/elliptic -crypto/rsa -crypto/dsa -golang.org/x/crypto/ed25519 -text/template golang.org/x/net/context golang.org/x/text/unicode/bidi -golang.org/x/net/http2/hpack golang.org/x/net/internal/timeseries google.golang.org/grpc/grpclog -golang.org/x/text/secure/bidirule +github.com/hashicorp/hcl/json/parser google.golang.org/grpc/codes -crypto/ecdsa -crypto/x509/pkix -google.golang.org/grpc/connectivity -vendor/golang_org/x/crypto/cryptobyte -golang.org/x/net/idna google.golang.org/grpc/metadata +github.com/hashicorp/hcl/hcl/printer +vendor/golang_org/x/text/secure/bidirule google.golang.org/grpc/tap +compress/gzip +google.golang.org/grpc/connectivity github.com/bugsnag/bugsnag-go/errors github.com/pkg/errors os/exec database/sql/driver +github.com/hashicorp/hcl github.com/docker/distribution/digest -golang.org/x/crypto/bcrypt -github.com/bugsnag/panicwrap os/user -github.com/docker/distribution/reference -database/sql -html/template -github.com/prometheus/common/model -github.com/prometheus/procfs/internal/util -github.com/jinzhu/inflection github.com/prometheus/procfs/nfs github.com/prometheus/procfs/xfs +text/template +golang.org/x/text/secure/bidirule +github.com/jinzhu/inflection go/token github.com/cenkalti/backoff +database/sql github.com/hailocab/go-hostpool -go/scanner gopkg.in/gorethink/gorethink.v3/encoding +github.com/bugsnag/panicwrap +github.com/docker/distribution/reference +vendor/golang_org/x/net/idna +github.com/theupdateframework/notary/tuf/validation +github.com/golang/protobuf/proto +golang.org/x/net/idna +github.com/prometheus/common/model gopkg.in/gorethink/gorethink.v3/types +go/scanner runtime/pprof runtime/trace +github.com/davecgh/go-spew/spew +github.com/pmezard/go-difflib/difflib +testing go/ast +crypto/rand +crypto/elliptic +crypto/dsa +encoding/asn1 +github.com/docker/distribution/uuid +golang.org/x/crypto/ed25519 +golang.org/x/crypto/bcrypt +crypto/rsa github.com/dvsekhvalnov/jose2go/arrays -github.com/dvsekhvalnov/jose2go/compact -github.com/spf13/cast -github.com/davecgh/go-spew/spew -github.com/dvsekhvalnov/jose2go/aes github.com/dvsekhvalnov/jose2go/kdf -github.com/pmezard/go-difflib/difflib +github.com/dvsekhvalnov/jose2go/aes +html/template +crypto/ecdsa +crypto/x509/pkix +vendor/golang_org/x/crypto/cryptobyte +github.com/jinzhu/gorm +github.com/spf13/cast github.com/golang/protobuf/ptypes/empty google.golang.org/grpc/encoding/proto -github.com/golang/protobuf/ptypes/any -google.golang.org/grpc/grpclb/grpc_lb_v1/messages github.com/golang/protobuf/ptypes/duration +github.com/golang/protobuf/ptypes/any github.com/golang/protobuf/ptypes/timestamp -google.golang.org/genproto/googleapis/rpc/status +google.golang.org/grpc/grpclb/grpc_lb_v1/messages github.com/prometheus/client_model/go github.com/matttproud/golang_protobuf_extensions/pbutil -github.com/golang/protobuf/ptypes gopkg.in/gorethink/gorethink.v3/ql2 -testing -crypto/x509 -net/textproto -golang.org/x/sys/unix +google.golang.org/genproto/googleapis/rpc/status +github.com/golang/protobuf/ptypes +github.com/prometheus/client_golang/prometheus/internal +google.golang.org/grpc/status vendor/golang_org/x/net/http/httpproxy +net/textproto github.com/mitchellh/mapstructure -github.com/spf13/pflag google.golang.org/grpc/naming +google.golang.org/grpc/stats +crypto/x509 +gopkg.in/fatih/pool.v2 google.golang.org/grpc/resolver/dns +github.com/spf13/pflag +github.com/prometheus/procfs +golang.org/x/sys/unix mime/multipart vendor/golang_org/x/net/http/httpguts golang.org/x/net/http/httpguts -google.golang.org/grpc/stats -google.golang.org/grpc/status -github.com/prometheus/client_golang/prometheus/internal -github.com/jinzhu/gorm -github.com/prometheus/procfs -gopkg.in/fatih/pool.v2 github.com/dvsekhvalnov/jose2go/keys/ecc crypto/tls github.com/dvsekhvalnov/jose2go +github.com/spf13/cobra golang.org/x/crypto/ssh/terminal github.com/fsnotify/fsnotify github.com/sirupsen/logrus github.com/theupdateframework/notary/passphrase -github.com/spf13/cobra github.com/theupdateframework/notary/tuf/data net/http/httptrace google.golang.org/grpc/credentials github.com/docker/go-connections/tlsconfig github.com/docker/libtrust -github.com/go-sql-driver/mysql github.com/lib/pq +github.com/go-sql-driver/mysql gopkg.in/dancannon/gorethink.v3 -google.golang.org/grpc/balancer github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/tuf/utils -google.golang.org/grpc/balancer/base -net/http +google.golang.org/grpc/balancer google.golang.org/grpc/peer +net/http +google.golang.org/grpc/balancer/base google.golang.org/grpc/balancer/roundrobin github.com/theupdateframework/notary/storage/rethinkdb -github.com/spf13/afero -github.com/theupdateframework/notary/storage -github.com/magiconair/properties -net/http/httputil -github.com/bugsnag/bugsnag-go github.com/gorilla/context +github.com/theupdateframework/notary/storage golang.org/x/net/trace +net/http/httputil github.com/docker/distribution/registry/api/errcode -golang.org/x/net/http2 +github.com/spf13/afero +github.com/bugsnag/bugsnag-go +github.com/magiconair/properties github.com/docker/distribution/registry/client/auth/challenge -github.com/gorilla/mux -github.com/docker/distribution/registry/client/transport expvar +github.com/docker/distribution/registry/client/transport +net/http/pprof +net/http/httptest github.com/prometheus/common/expfmt -github.com/theupdateframework/notary/trustmanager +golang.org/x/net/http2 +github.com/gorilla/mux github.com/theupdateframework/notary/server/errors -github.com/theupdateframework/notary/server/storage +github.com/stretchr/testify/assert github.com/Shopify/logrus-bugsnag -net/http/pprof -net/http/httptest +github.com/theupdateframework/notary/trustmanager +github.com/theupdateframework/notary/server/storage github.com/docker/distribution/context -github.com/theupdateframework/notary/cryptoservice github.com/docker/distribution/registry/api/v2 +github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/tuf/signed -github.com/spf13/viper -github.com/stretchr/testify/assert +github.com/prometheus/client_golang/prometheus github.com/docker/distribution/registry/auth +github.com/docker/distribution/health github.com/docker/distribution -github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/trustmanager/yubikey -github.com/docker/distribution/health -github.com/prometheus/client_golang/prometheus +github.com/theupdateframework/notary/trustpinning +github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/signer/keydbstore github.com/docker/distribution/registry/auth/htpasswd github.com/docker/distribution/registry/auth/token +github.com/spf13/viper github.com/theupdateframework/notary/tuf -github.com/theupdateframework/notary/tuf/testutils/keys github.com/docker/distribution/registry/storage/cache github.com/docker/distribution/registry/storage/cache/memory -github.com/theupdateframework/notary/utils github.com/docker/distribution/registry/client github.com/stretchr/testify/require +github.com/docker/distribution/registry/client/auth github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/client -github.com/docker/distribution/registry/client/auth -github.com/theupdateframework/notary/server/timestamp +github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils +github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/server/handlers -google.golang.org/grpc/transport github.com/theupdateframework/notary/server github.com/theupdateframework/notary/cmd/notary +google.golang.org/grpc/transport google.golang.org/grpc github.com/theupdateframework/notary/trustmanager/remoteks -google.golang.org/grpc/health/grpc_health_v1 github.com/theupdateframework/notary/proto +google.golang.org/grpc/health/grpc_health_v1 google.golang.org/grpc/health -github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer +github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cmd/notary-server make[1]: Leaving directory '/build/notary-0.6.1~ds1' dh_auto_test -O--builddirectory=/build/notary-0.6.1\~ds1/_build -O--buildsystem=golang - cd _build && go test -vet=off -v -p 10 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version + cd _build && go test -vet=off -v -p 18 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version ? github.com/theupdateframework/notary [no test files] === RUN Test0Dot1Migration ---- PASS: Test0Dot1Migration (0.12s) +--- PASS: Test0Dot1Migration (0.06s) === RUN Test0Dot3Migration ---- PASS: Test0Dot3Migration (0.16s) +--- PASS: Test0Dot3Migration (0.05s) === RUN Test0Dot1RepoFormat -time="2020-04-29T15:37:25Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: Test0Dot1RepoFormat (1.05s) +time="2021-06-01T22:04:31Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: Test0Dot1RepoFormat (0.37s) === RUN Test0Dot3RepoFormat -time="2020-04-29T15:37:26Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: Test0Dot3RepoFormat (1.51s) +time="2021-06-01T22:04:31Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: Test0Dot3RepoFormat (0.41s) === RUN TestDownloading0Dot1RepoFormat ---- PASS: TestDownloading0Dot1RepoFormat (0.03s) +--- PASS: TestDownloading0Dot1RepoFormat (0.01s) === RUN TestDownloading0Dot3RepoFormat ---- PASS: TestDownloading0Dot3RepoFormat (0.05s) +--- PASS: TestDownloading0Dot3RepoFormat (0.01s) === RUN TestInitRepositoryManagedRolesIncludingRoot --- PASS: TestInitRepositoryManagedRolesIncludingRoot (0.01s) === RUN TestInitRepositoryManagedRolesInvalidRole ---- PASS: TestInitRepositoryManagedRolesInvalidRole (0.02s) +--- PASS: TestInitRepositoryManagedRolesInvalidRole (0.01s) === RUN TestInitRepositoryManagedRolesIncludingTargets --- PASS: TestInitRepositoryManagedRolesIncludingTargets (0.01s) === RUN TestInitRepositoryManagedRolesIncludingTimestamp ---- PASS: TestInitRepositoryManagedRolesIncludingTimestamp (0.10s) +--- PASS: TestInitRepositoryManagedRolesIncludingTimestamp (0.03s) === RUN TestInitRepositoryWithCerts ---- PASS: TestInitRepositoryWithCerts (0.10s) +--- PASS: TestInitRepositoryWithCerts (0.05s) === RUN TestMatchKeyIDsWithPublicKeys ---- PASS: TestMatchKeyIDsWithPublicKeys (0.05s) +--- PASS: TestMatchKeyIDsWithPublicKeys (0.01s) === RUN TestInitRepositoryNeedsRemoteTimestampKey ---- PASS: TestInitRepositoryNeedsRemoteTimestampKey (0.06s) +--- PASS: TestInitRepositoryNeedsRemoteTimestampKey (0.02s) === RUN TestInitRepositoryNeedsRemoteSnapshotKey ---- PASS: TestInitRepositoryNeedsRemoteSnapshotKey (0.05s) +--- PASS: TestInitRepositoryNeedsRemoteSnapshotKey (0.01s) === RUN TestInitRepoServerOnlyManagesTimestampKey ---- PASS: TestInitRepoServerOnlyManagesTimestampKey (0.50s) +--- PASS: TestInitRepoServerOnlyManagesTimestampKey (0.19s) === RUN TestInitRepoServerManagesTimestampAndSnapshotKeys ---- PASS: TestInitRepoServerManagesTimestampAndSnapshotKeys (0.33s) +--- PASS: TestInitRepoServerManagesTimestampAndSnapshotKeys (0.13s) === RUN TestInitRepoAttemptsExceeded ---- PASS: TestInitRepoAttemptsExceeded (0.18s) +--- PASS: TestInitRepoAttemptsExceeded (0.14s) === RUN TestInitRepoPasswordInvalid ---- PASS: TestInitRepoPasswordInvalid (0.04s) +--- PASS: TestInitRepoPasswordInvalid (0.02s) === RUN TestAddTargetToTargetRoleByDefault ---- PASS: TestAddTargetToTargetRoleByDefault (0.24s) +--- PASS: TestAddTargetToTargetRoleByDefault (0.07s) === RUN TestAddTargetToSpecifiedValidRoles ---- PASS: TestAddTargetToSpecifiedValidRoles (0.21s) +--- PASS: TestAddTargetToSpecifiedValidRoles (0.06s) === RUN TestAddTargetToSpecifiedInvalidRoles ---- PASS: TestAddTargetToSpecifiedInvalidRoles (0.20s) +--- PASS: TestAddTargetToSpecifiedInvalidRoles (0.06s) === RUN TestAddTargetWithInvalidTarget ---- PASS: TestAddTargetWithInvalidTarget (0.09s) +--- PASS: TestAddTargetWithInvalidTarget (0.03s) === RUN TestAddTargetErrorWritingChanges ---- PASS: TestAddTargetErrorWritingChanges (0.12s) +--- PASS: TestAddTargetErrorWritingChanges (0.03s) === RUN TestRemoveTargetToTargetRoleByDefault ---- PASS: TestRemoveTargetToTargetRoleByDefault (0.22s) +--- PASS: TestRemoveTargetToTargetRoleByDefault (0.05s) === RUN TestRemoveTargetFromSpecifiedValidRoles ---- PASS: TestRemoveTargetFromSpecifiedValidRoles (0.16s) +--- PASS: TestRemoveTargetFromSpecifiedValidRoles (0.06s) === RUN TestRemoveTargetToSpecifiedInvalidRoles ---- PASS: TestRemoveTargetToSpecifiedInvalidRoles (0.15s) +--- PASS: TestRemoveTargetToSpecifiedInvalidRoles (0.05s) === RUN TestRemoveTargetErrorWritingChanges ---- PASS: TestRemoveTargetErrorWritingChanges (0.13s) +--- PASS: TestRemoveTargetErrorWritingChanges (0.03s) === RUN TestListTarget ---- PASS: TestListTarget (2.06s) +--- PASS: TestListTarget (0.72s) === RUN TestListTargetRestrictsDelegationPaths ---- PASS: TestListTargetRestrictsDelegationPaths (0.40s) +--- PASS: TestListTargetRestrictsDelegationPaths (0.13s) === RUN TestValidateRootKey ---- PASS: TestValidateRootKey (0.17s) +--- PASS: TestValidateRootKey (0.07s) === RUN TestGetChangelist ---- PASS: TestGetChangelist (0.15s) +--- PASS: TestGetChangelist (0.07s) === RUN TestPublishBareRepo ---- PASS: TestPublishBareRepo (1.46s) +--- PASS: TestPublishBareRepo (0.61s) === RUN TestPublishUninitializedRepo -time="2020-04-29T15:37:35Z" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time" ---- PASS: TestPublishUninitializedRepo (0.10s) +time="2021-06-01T22:04:34Z" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time" +--- PASS: TestPublishUninitializedRepo (0.05s) === RUN TestPublishClientHasSnapshotKey ---- PASS: TestPublishClientHasSnapshotKey (1.55s) +--- PASS: TestPublishClientHasSnapshotKey (0.59s) === RUN TestPublishAfterInitServerHasSnapshotKey ---- PASS: TestPublishAfterInitServerHasSnapshotKey (1.39s) +--- PASS: TestPublishAfterInitServerHasSnapshotKey (0.54s) === RUN TestPublishAfterPullServerHasSnapshotKey ---- PASS: TestPublishAfterPullServerHasSnapshotKey (0.52s) +--- PASS: TestPublishAfterPullServerHasSnapshotKey (0.20s) === RUN TestPublishNoOneHasSnapshotKey ---- PASS: TestPublishNoOneHasSnapshotKey (0.26s) +--- PASS: TestPublishNoOneHasSnapshotKey (0.13s) === RUN TestPublishSnapshotCorrupt ---- PASS: TestPublishSnapshotCorrupt (0.70s) +--- PASS: TestPublishSnapshotCorrupt (0.33s) === RUN TestPublishTargetsCorrupt ---- PASS: TestPublishTargetsCorrupt (0.40s) +--- PASS: TestPublishTargetsCorrupt (0.17s) === RUN TestPublishRootCorrupt -time="2020-04-29T15:37:40Z" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')" -time="2020-04-29T15:37:40Z" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')" ---- PASS: TestPublishRootCorrupt (0.33s) +time="2021-06-01T22:04:37Z" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')" +time="2021-06-01T22:04:37Z" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')" +--- PASS: TestPublishRootCorrupt (0.13s) === RUN TestPublishSnapshotLocalKeysCreatedFirst --- PASS: TestPublishSnapshotLocalKeysCreatedFirst (0.01s) === RUN TestPublishDelegations ---- PASS: TestPublishDelegations (0.60s) +--- PASS: TestPublishDelegations (0.24s) === RUN TestPublishDelegationsX509 ---- PASS: TestPublishDelegationsX509 (0.57s) +--- PASS: TestPublishDelegationsX509 (0.23s) === RUN TestPublishTargetsDelegationScopeFailIfNoKeys -time="2020-04-29T15:37:41Z" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist" -time="2020-04-29T15:37:42Z" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist" ---- PASS: TestPublishTargetsDelegationScopeFailIfNoKeys (0.54s) +time="2021-06-01T22:04:37Z" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist" +time="2021-06-01T22:04:37Z" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist" +--- PASS: TestPublishTargetsDelegationScopeFailIfNoKeys (0.19s) === RUN TestPublishTargetsDelegationSuccessLocallyHasRoles ---- PASS: TestPublishTargetsDelegationSuccessLocallyHasRoles (0.46s) +--- PASS: TestPublishTargetsDelegationSuccessLocallyHasRoles (0.20s) === RUN TestPublishTargetsDelegationNoTargetsKeyNeeded ---- PASS: TestPublishTargetsDelegationNoTargetsKeyNeeded (0.58s) +--- PASS: TestPublishTargetsDelegationNoTargetsKeyNeeded (0.28s) === RUN TestPublishTargetsDelegationSuccessNeedsToDownloadRoles ---- PASS: TestPublishTargetsDelegationSuccessNeedsToDownloadRoles (0.54s) +--- PASS: TestPublishTargetsDelegationSuccessNeedsToDownloadRoles (0.23s) === RUN TestPublishTargetsDelegationFromTwoRepos ---- PASS: TestPublishTargetsDelegationFromTwoRepos (0.55s) +--- PASS: TestPublishTargetsDelegationFromTwoRepos (0.20s) === RUN TestPublishRemoveDelegationKeyFromDelegationRole -time="2020-04-29T15:37:44Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2020-04-29T15:37:44Z" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: be1f5793f649de30ef84ba6c8de00abe3c1ace2146ab8dc0048afac742e361ab" ---- PASS: TestPublishRemoveDelegationKeyFromDelegationRole (0.38s) +time="2021-06-01T22:04:38Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2021-06-01T22:04:38Z" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: 599565b5b2e93fdefc0fc56788ab5fda564f89e2a1b935fe439f002f4ac1e809" +--- PASS: TestPublishRemoveDelegationKeyFromDelegationRole (0.15s) === RUN TestPublishRemoveDelegation -time="2020-04-29T15:37:44Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2020-04-29T15:37:44Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2020-04-29T15:37:45Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2020-04-29T15:37:45Z" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: " ---- PASS: TestPublishRemoveDelegation (0.31s) +time="2021-06-01T22:04:38Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2021-06-01T22:04:38Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2021-06-01T22:04:38Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2021-06-01T22:04:38Z" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: " +--- PASS: TestPublishRemoveDelegation (0.15s) === RUN TestPublishSucceedsDespiteDelegationCorrupt ---- PASS: TestPublishSucceedsDespiteDelegationCorrupt (0.42s) +--- PASS: TestPublishSucceedsDespiteDelegationCorrupt (0.18s) === RUN TestRotateKeyInvalidRole ---- PASS: TestRotateKeyInvalidRole (0.19s) +--- PASS: TestRotateKeyInvalidRole (0.09s) === RUN TestRemoteRotationError ---- PASS: TestRemoteRotationError (0.05s) +--- PASS: TestRemoteRotationError (0.02s) === RUN TestRemoteRotationEndpointError ---- PASS: TestRemoteRotationEndpointError (0.14s) +--- PASS: TestRemoteRotationEndpointError (0.06s) === RUN TestRemoteRotationNoRootKey ---- PASS: TestRemoteRotationNoRootKey (0.20s) +--- PASS: TestRemoteRotationNoRootKey (0.11s) === RUN TestRemoteRotationNoInit -time="2020-04-29T15:37:46Z" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time" ---- PASS: TestRemoteRotationNoInit (0.13s) +time="2021-06-01T22:04:39Z" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time" +--- PASS: TestRemoteRotationNoInit (0.05s) === RUN TestRotateBeforePublishFromRemoteKeyToLocalKey ---- PASS: TestRotateBeforePublishFromRemoteKeyToLocalKey (0.65s) +--- PASS: TestRotateBeforePublishFromRemoteKeyToLocalKey (0.26s) === RUN TestRotateKeyAfterPublishNoServerManagementChange ---- PASS: TestRotateKeyAfterPublishNoServerManagementChange (1.80s) +--- PASS: TestRotateKeyAfterPublishNoServerManagementChange (0.72s) === RUN TestRotateKeyAfterPublishServerManagementChange ---- PASS: TestRotateKeyAfterPublishServerManagementChange (1.92s) +--- PASS: TestRotateKeyAfterPublishServerManagementChange (0.76s) === RUN TestRotateRootKey ---- PASS: TestRotateRootKey (0.62s) +--- PASS: TestRotateRootKey (0.22s) === RUN TestRotateRootMultiple ---- PASS: TestRotateRootMultiple (0.84s) +--- PASS: TestRotateRootMultiple (0.30s) === RUN TestRotateRootKeyProvided ---- PASS: TestRotateRootKeyProvided (0.72s) +--- PASS: TestRotateRootKeyProvided (0.23s) === RUN TestRotateRootKeyLegacySupport ---- PASS: TestRotateRootKeyLegacySupport (0.85s) +--- PASS: TestRotateRootKeyLegacySupport (0.33s) === RUN TestRemoteServerUnavailableNoLocalCache -time="2020-04-29T15:37:53Z" level=error msg="Could not publish Repository since we could not update: unable to reach trust server at this time: 500." +time="2021-06-01T22:04:42Z" level=error msg="Could not publish Repository since we could not update: unable to reach trust server at this time: 500." --- PASS: TestRemoteServerUnavailableNoLocalCache (0.00s) === RUN TestAddDelegationChangefileValid ---- PASS: TestAddDelegationChangefileValid (0.07s) +--- PASS: TestAddDelegationChangefileValid (0.03s) === RUN TestAddDelegationChangefileApplicable ---- PASS: TestAddDelegationChangefileApplicable (0.06s) +--- PASS: TestAddDelegationChangefileApplicable (0.03s) === RUN TestAddDelegationErrorWritingChanges ---- PASS: TestAddDelegationErrorWritingChanges (0.04s) +--- PASS: TestAddDelegationErrorWritingChanges (0.03s) === RUN TestRemoveDelegationChangefileValid ---- PASS: TestRemoveDelegationChangefileValid (0.05s) +--- PASS: TestRemoveDelegationChangefileValid (0.03s) === RUN TestRemoveDelegationChangefileApplicable -time="2020-04-29T15:37:53Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2020-04-29T15:37:53Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" ---- PASS: TestRemoveDelegationChangefileApplicable (0.13s) +time="2021-06-01T22:04:42Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2021-06-01T22:04:42Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +--- PASS: TestRemoveDelegationChangefileApplicable (0.03s) === RUN TestClearAllPathsDelegationChangefileApplicable ---- PASS: TestClearAllPathsDelegationChangefileApplicable (0.08s) +--- PASS: TestClearAllPathsDelegationChangefileApplicable (0.03s) === RUN TestFullAddDelegationChangefileApplicable ---- PASS: TestFullAddDelegationChangefileApplicable (0.08s) +--- PASS: TestFullAddDelegationChangefileApplicable (0.03s) === RUN TestFullRemoveDelegationChangefileApplicable ---- PASS: TestFullRemoveDelegationChangefileApplicable (0.10s) +--- PASS: TestFullRemoveDelegationChangefileApplicable (0.03s) === RUN TestRemoveDelegationErrorWritingChanges ---- PASS: TestRemoveDelegationErrorWritingChanges (0.09s) +--- PASS: TestRemoveDelegationErrorWritingChanges (0.03s) === RUN TestBootstrapClientBadURL --- PASS: TestBootstrapClientBadURL (0.00s) === RUN TestClientInvalidURL --- PASS: TestClientInvalidURL (0.00s) === RUN TestPublishTargetsDelegationCanUseUserKeyWithArbitraryRole ---- PASS: TestPublishTargetsDelegationCanUseUserKeyWithArbitraryRole (1.22s) +--- PASS: TestPublishTargetsDelegationCanUseUserKeyWithArbitraryRole (0.42s) === RUN TestDeleteRepo ---- PASS: TestDeleteRepo (0.13s) +--- PASS: TestDeleteRepo (0.05s) === RUN TestDeleteRemoteRepo ---- PASS: TestDeleteRemoteRepo (0.37s) +--- PASS: TestDeleteRemoteRepo (0.15s) === RUN TestListRoles ---- PASS: TestListRoles (0.88s) +--- PASS: TestListRoles (0.30s) === RUN TestGetAllTargetInfo ---- PASS: TestGetAllTargetInfo (0.50s) +--- PASS: TestGetAllTargetInfo (0.18s) === RUN TestUpdateSucceedsEvenIfCannotWriteNewRepo -time="2020-04-29T15:37:57Z" level=error msg="could not save root to cache: Non-writable" ---- PASS: TestUpdateSucceedsEvenIfCannotWriteNewRepo (0.47s) +time="2021-06-01T22:04:43Z" level=error msg="could not save root to cache: Non-writable" +--- PASS: TestUpdateSucceedsEvenIfCannotWriteNewRepo (0.14s) === RUN TestUpdateSucceedsEvenIfCannotWriteExistingRepo ---- PASS: TestUpdateSucceedsEvenIfCannotWriteExistingRepo (1.89s) +--- PASS: TestUpdateSucceedsEvenIfCannotWriteExistingRepo (0.65s) === RUN TestUpdateInOfflineMode -time="2020-04-29T15:37:59Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" -time="2020-04-29T15:37:59Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: TestUpdateInOfflineMode (0.14s) +time="2021-06-01T22:04:44Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +time="2021-06-01T22:04:44Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: TestUpdateInOfflineMode (0.07s) === RUN TestUpdateReplacesCorruptOrMissingMetadata -time="2020-04-29T15:38:02Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:38:02Z" level=error msg="Metadata for root expired" ---- PASS: TestUpdateReplacesCorruptOrMissingMetadata (3.50s) +time="2021-06-01T22:04:45Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:04:45Z" level=error msg="Metadata for root expired" +--- PASS: TestUpdateReplacesCorruptOrMissingMetadata (1.26s) === RUN TestUpdateFailsIfServerRootKeyChangedWithoutMultiSign -time="2020-04-29T15:38:03Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:38:03Z" level=error msg="Metadata for root expired" ---- PASS: TestUpdateFailsIfServerRootKeyChangedWithoutMultiSign (0.47s) +time="2021-06-01T22:04:45Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:04:45Z" level=error msg="Metadata for root expired" +--- PASS: TestUpdateFailsIfServerRootKeyChangedWithoutMultiSign (0.11s) === RUN TestUpdateRemoteRootNotExistNoLocalCache ---- PASS: TestUpdateRemoteRootNotExistNoLocalCache (0.13s) +--- PASS: TestUpdateRemoteRootNotExistNoLocalCache (0.06s) === RUN TestUpdateRemoteRootNotExistCanUseLocalCache ---- PASS: TestUpdateRemoteRootNotExistCanUseLocalCache (0.32s) +--- PASS: TestUpdateRemoteRootNotExistCanUseLocalCache (0.12s) === RUN TestUpdateRemoteRootNotExistCannotUseLocalCache ---- PASS: TestUpdateRemoteRootNotExistCannotUseLocalCache (0.30s) +--- PASS: TestUpdateRemoteRootNotExistCannotUseLocalCache (0.13s) === RUN TestUpdateRemoteRoot50XNoLocalCache ---- PASS: TestUpdateRemoteRoot50XNoLocalCache (0.13s) +--- PASS: TestUpdateRemoteRoot50XNoLocalCache (0.06s) === RUN TestUpdateRemoteRoot50XCanUseLocalCache ---- PASS: TestUpdateRemoteRoot50XCanUseLocalCache (0.28s) +--- PASS: TestUpdateRemoteRoot50XCanUseLocalCache (0.11s) === RUN TestUpdateRemoteRoot50XCannotUseLocalCache ---- PASS: TestUpdateRemoteRoot50XCannotUseLocalCache (0.35s) +--- PASS: TestUpdateRemoteRoot50XCannotUseLocalCache (0.12s) === RUN TestUpdateNonRootRemoteMissingMetadataNoLocalCache ---- PASS: TestUpdateNonRootRemoteMissingMetadataNoLocalCache (0.82s) +--- PASS: TestUpdateNonRootRemoteMissingMetadataNoLocalCache (0.29s) === RUN TestUpdateNonRootRemoteMissingMetadataCanUseLocalCache -time="2020-04-29T15:38:06Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: TestUpdateNonRootRemoteMissingMetadataCanUseLocalCache (1.05s) +time="2021-06-01T22:04:46Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: TestUpdateNonRootRemoteMissingMetadataCanUseLocalCache (0.38s) === RUN TestUpdateNonRootRemoteMissingMetadataCannotUseLocalCache -time="2020-04-29T15:38:07Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: TestUpdateNonRootRemoteMissingMetadataCannotUseLocalCache (1.35s) +time="2021-06-01T22:04:47Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: TestUpdateNonRootRemoteMissingMetadataCannotUseLocalCache (0.47s) === RUN TestUpdateNonRootRemote50XNoLocalCache ---- PASS: TestUpdateNonRootRemote50XNoLocalCache (0.73s) +--- PASS: TestUpdateNonRootRemote50XNoLocalCache (0.30s) === RUN TestUpdateNonRootRemote50XCanUseLocalCache -time="2020-04-29T15:38:09Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: TestUpdateNonRootRemote50XCanUseLocalCache (0.90s) +time="2021-06-01T22:04:48Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: TestUpdateNonRootRemote50XCanUseLocalCache (0.39s) === RUN TestUpdateNonRootRemote50XCannotUseLocalCache -time="2020-04-29T15:38:10Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: TestUpdateNonRootRemote50XCannotUseLocalCache (1.28s) +time="2021-06-01T22:04:48Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: TestUpdateNonRootRemote50XCannotUseLocalCache (0.47s) === RUN TestUpdateRemoteChecksumWrongNoLocalCache ---- PASS: TestUpdateRemoteChecksumWrongNoLocalCache (1.00s) +--- PASS: TestUpdateRemoteChecksumWrongNoLocalCache (0.37s) === RUN TestUpdateRemoteChecksumWrongCanUseLocalCache ---- PASS: TestUpdateRemoteChecksumWrongCanUseLocalCache (1.30s) +--- PASS: TestUpdateRemoteChecksumWrongCanUseLocalCache (0.50s) === RUN TestUpdateRemoteChecksumWrongCannotUseLocalCache ---- PASS: TestUpdateRemoteChecksumWrongCannotUseLocalCache (1.55s) +--- PASS: TestUpdateRemoteChecksumWrongCannotUseLocalCache (0.62s) === RUN TestUpdateRootRemoteCorruptedNoLocalCache -time="2020-04-29T15:38:16Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:38:16Z" level=error msg="Metadata for root expired" ---- PASS: TestUpdateRootRemoteCorruptedNoLocalCache (2.61s) +time="2021-06-01T22:04:50Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:04:50Z" level=error msg="Metadata for root expired" +--- PASS: TestUpdateRootRemoteCorruptedNoLocalCache (1.21s) === RUN TestUpdateRootRemoteCorruptedCanUseLocalCache ---- PASS: TestUpdateRootRemoteCorruptedCanUseLocalCache (5.77s) +--- PASS: TestUpdateRootRemoteCorruptedCanUseLocalCache (2.21s) === RUN TestUpdateRootRemoteCorruptedCannotUseLocalCache -time="2020-04-29T15:38:26Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:38:26Z" level=error msg="Metadata for root expired" ---- PASS: TestUpdateRootRemoteCorruptedCannotUseLocalCache (6.10s) +time="2021-06-01T22:04:54Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:04:55Z" level=error msg="Metadata for root expired" +--- PASS: TestUpdateRootRemoteCorruptedCannotUseLocalCache (2.47s) === RUN TestUpdateNonRootRemoteCorruptedNoLocalCache -time="2020-04-29T15:38:30Z" level=error msg="Metadata for targets expired" -time="2020-04-29T15:38:30Z" level=error msg="Metadata for targets expired" -time="2020-04-29T15:38:31Z" level=error msg="Metadata for snapshot expired" -time="2020-04-29T15:38:32Z" level=error msg="Metadata for snapshot expired" -time="2020-04-29T15:38:32Z" level=error msg="Metadata for timestamp expired" -time="2020-04-29T15:38:32Z" level=error msg="Metadata for timestamp expired" -time="2020-04-29T15:38:33Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2020-04-29T15:38:33Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2020-04-29T15:38:34Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2020-04-29T15:38:34Z" level=error msg="Metadata for targets/a expired" -time="2020-04-29T15:38:34Z" level=warning msg="Error getting targets/a: targets/a expired at Thu Mar 28 15:38:34 UTC 2019" -time="2020-04-29T15:38:34Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2020-04-29T15:38:35Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2020-04-29T15:38:35Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2020-04-29T15:38:35Z" level=error msg="Metadata for targets/a/b expired" -time="2020-04-29T15:38:35Z" level=warning msg="Error getting targets/a/b: targets/a/b expired at Thu Mar 28 15:38:35 UTC 2019" -time="2020-04-29T15:38:36Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2020-04-29T15:38:36Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2020-04-29T15:38:36Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2020-04-29T15:38:36Z" level=error msg="Metadata for targets/b expired" -time="2020-04-29T15:38:36Z" level=warning msg="Error getting targets/b: targets/b expired at Thu Mar 28 15:38:36 UTC 2019" ---- PASS: TestUpdateNonRootRemoteCorruptedNoLocalCache (7.47s) +time="2021-06-01T22:04:56Z" level=error msg="Metadata for targets expired" +time="2021-06-01T22:04:56Z" level=error msg="Metadata for targets expired" +time="2021-06-01T22:04:57Z" level=error msg="Metadata for snapshot expired" +time="2021-06-01T22:04:57Z" level=error msg="Metadata for snapshot expired" +time="2021-06-01T22:04:57Z" level=error msg="Metadata for timestamp expired" +time="2021-06-01T22:04:57Z" level=error msg="Metadata for timestamp expired" +time="2021-06-01T22:04:57Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2021-06-01T22:04:57Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2021-06-01T22:04:57Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2021-06-01T22:04:57Z" level=error msg="Metadata for targets/a expired" +time="2021-06-01T22:04:57Z" level=warning msg="Error getting targets/a: targets/a expired at Thu Apr 30 22:04:57 UTC 2020" +time="2021-06-01T22:04:58Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2021-06-01T22:04:58Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2021-06-01T22:04:58Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2021-06-01T22:04:58Z" level=error msg="Metadata for targets/a/b expired" +time="2021-06-01T22:04:58Z" level=warning msg="Error getting targets/a/b: targets/a/b expired at Thu Apr 30 22:04:58 UTC 2020" +time="2021-06-01T22:04:58Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2021-06-01T22:04:58Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2021-06-01T22:04:58Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2021-06-01T22:04:58Z" level=error msg="Metadata for targets/b expired" +time="2021-06-01T22:04:58Z" level=warning msg="Error getting targets/b: targets/b expired at Thu Apr 30 22:04:58 UTC 2020" +--- PASS: TestUpdateNonRootRemoteCorruptedNoLocalCache (3.02s) === RUN TestUpdateNonRootRemoteCorruptedCanUseLocalCache -time="2020-04-29T15:38:41Z" level=error msg="Metadata for timestamp expired" -time="2020-04-29T15:38:41Z" level=error msg="Metadata for timestamp expired" ---- PASS: TestUpdateNonRootRemoteCorruptedCanUseLocalCache (9.74s) +time="2021-06-01T22:05:00Z" level=error msg="Metadata for timestamp expired" +time="2021-06-01T22:05:00Z" level=error msg="Metadata for timestamp expired" +--- PASS: TestUpdateNonRootRemoteCorruptedCanUseLocalCache (3.73s) === RUN TestUpdateNonRootRemoteCorruptedCannotUseLocalCache -time="2020-04-29T15:38:49Z" level=error msg="Metadata for targets expired" -time="2020-04-29T15:38:50Z" level=error msg="Metadata for snapshot expired" -time="2020-04-29T15:38:50Z" level=error msg="Metadata for snapshot expired" -time="2020-04-29T15:38:52Z" level=error msg="Metadata for timestamp expired" -time="2020-04-29T15:38:52Z" level=error msg="Metadata for timestamp expired" -time="2020-04-29T15:38:53Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2020-04-29T15:38:54Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2020-04-29T15:38:54Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2020-04-29T15:38:54Z" level=error msg="Metadata for targets/a expired" -time="2020-04-29T15:38:54Z" level=warning msg="Error getting targets/a: targets/a expired at Thu Mar 28 15:38:54 UTC 2019" -time="2020-04-29T15:38:55Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2020-04-29T15:38:56Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2020-04-29T15:38:56Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2020-04-29T15:38:56Z" level=error msg="Metadata for targets/a/b expired" -time="2020-04-29T15:38:56Z" level=warning msg="Error getting targets/a/b: targets/a/b expired at Thu Mar 28 15:38:56 UTC 2019" -time="2020-04-29T15:38:57Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2020-04-29T15:38:58Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2020-04-29T15:38:58Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2020-04-29T15:38:58Z" level=error msg="Metadata for targets/b expired" -time="2020-04-29T15:38:58Z" level=warning msg="Error getting targets/b: targets/b expired at Thu Mar 28 15:38:58 UTC 2019" ---- PASS: TestUpdateNonRootRemoteCorruptedCannotUseLocalCache (12.71s) +time="2021-06-01T22:05:03Z" level=error msg="Metadata for targets expired" +time="2021-06-01T22:05:04Z" level=error msg="Metadata for snapshot expired" +time="2021-06-01T22:05:04Z" level=error msg="Metadata for snapshot expired" +time="2021-06-01T22:05:04Z" level=error msg="Metadata for timestamp expired" +time="2021-06-01T22:05:04Z" level=error msg="Metadata for timestamp expired" +time="2021-06-01T22:05:05Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2021-06-01T22:05:05Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2021-06-01T22:05:05Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2021-06-01T22:05:05Z" level=error msg="Metadata for targets/a expired" +time="2021-06-01T22:05:05Z" level=warning msg="Error getting targets/a: targets/a expired at Thu Apr 30 22:05:05 UTC 2020" +time="2021-06-01T22:05:06Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2021-06-01T22:05:06Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2021-06-01T22:05:06Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2021-06-01T22:05:06Z" level=error msg="Metadata for targets/a/b expired" +time="2021-06-01T22:05:06Z" level=warning msg="Error getting targets/a/b: targets/a/b expired at Thu Apr 30 22:05:06 UTC 2020" +time="2021-06-01T22:05:07Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2021-06-01T22:05:07Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2021-06-01T22:05:07Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2021-06-01T22:05:07Z" level=error msg="Metadata for targets/b expired" +time="2021-06-01T22:05:07Z" level=warning msg="Error getting targets/b: targets/b expired at Thu Apr 30 22:05:07 UTC 2020" +--- PASS: TestUpdateNonRootRemoteCorruptedCannotUseLocalCache (4.80s) === RUN TestUpdateLocalAndRemoteRootCorrupt -time="2020-04-29T15:39:04Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:05Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:10Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:10Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:11Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:11Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:11Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:11Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:11Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:11Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:12Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:12Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:12Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:12Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:12Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:13Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:13Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:13Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:13Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:13Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:13Z" level=error msg="Metadata for root expired" -time="2020-04-29T15:39:13Z" level=error msg="Metadata for root expired" ---- PASS: TestUpdateLocalAndRemoteRootCorrupt (13.90s) +time="2021-06-01T22:05:09Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:09Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:11Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:12Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:12Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:12Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:12Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:12Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:12Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:12Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:12Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:12Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:12Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:12Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:12Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:12Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:12Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:12Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:12Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:12Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:13Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:05:13Z" level=error msg="Metadata for root expired" +--- PASS: TestUpdateLocalAndRemoteRootCorrupt (5.29s) === RUN TestUpdateRemoteKeyRotated -time="2020-04-29T15:39:14Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2020-04-29T15:39:14Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2020-04-29T15:39:14Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" ---- PASS: TestUpdateRemoteKeyRotated (1.29s) +time="2021-06-01T22:05:13Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2021-06-01T22:05:13Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2021-06-01T22:05:13Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +--- PASS: TestUpdateRemoteKeyRotated (0.49s) === RUN TestValidateRootRotationWithOldRole ---- PASS: TestValidateRootRotationWithOldRole (0.54s) +--- PASS: TestValidateRootRotationWithOldRole (0.23s) === RUN TestRootRoleInvariant ---- PASS: TestRootRoleInvariant (0.47s) +--- PASS: TestRootRoleInvariant (0.20s) === RUN TestBadIntermediateTransitions ---- PASS: TestBadIntermediateTransitions (0.23s) +--- PASS: TestBadIntermediateTransitions (0.08s) === RUN TestExpiredIntermediateTransitions -time="2020-04-29T15:39:16Z" level=warning msg="root is nearing expiry, you should re-sign the role metadata" ---- PASS: TestExpiredIntermediateTransitions (0.26s) +time="2021-06-01T22:05:14Z" level=warning msg="root is nearing expiry, you should re-sign the role metadata" +--- PASS: TestExpiredIntermediateTransitions (0.10s) === RUN TestDownloadTargetsLarge ---- PASS: TestDownloadTargetsLarge (7.57s) +--- PASS: TestDownloadTargetsLarge (3.09s) === RUN TestDownloadTargetsDeep ---- PASS: TestDownloadTargetsDeep (0.18s) +--- PASS: TestDownloadTargetsDeep (0.07s) === RUN TestDownloadSnapshotLargeDelegationsMany ---- PASS: TestDownloadSnapshotLargeDelegationsMany (6.11s) +--- PASS: TestDownloadSnapshotLargeDelegationsMany (2.85s) === RUN TestRootOnDiskTrustPinning ---- PASS: TestRootOnDiskTrustPinning (0.12s) +--- PASS: TestRootOnDiskTrustPinning (0.05s) === RUN TestApplyTargetsChange ---- PASS: TestApplyTargetsChange (0.02s) +--- PASS: TestApplyTargetsChange (0.01s) === RUN TestApplyAddTargetTwice ---- PASS: TestApplyAddTargetTwice (0.02s) +--- PASS: TestApplyAddTargetTwice (0.01s) === RUN TestApplyChangelist --- PASS: TestApplyChangelist (0.01s) === RUN TestApplyChangelistMulti @@ -2026,14 +2038,14 @@ === RUN TestApplyChangelistTargetsToMultipleRoles --- PASS: TestApplyChangelistTargetsToMultipleRoles (0.01s) === RUN TestApplyChangelistTargetsFailsNonexistentRole -time="2020-04-29T15:39:30Z" level=error msg="couldn't add target to targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist" -time="2020-04-29T15:39:30Z" level=error msg="couldn't remove target from targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist" +time="2021-06-01T22:05:20Z" level=error msg="couldn't add target to targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist" +time="2021-06-01T22:05:20Z" level=error msg="couldn't remove target from targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist" --- PASS: TestApplyChangelistTargetsFailsNonexistentRole (0.01s) === RUN TestChangeTargetMetaFailsInvalidRole -time="2020-04-29T15:39:30Z" level=error msg="couldn't add target to ruhroh: tuf: invalid role ruhroh. does not exist" +time="2021-06-01T22:05:20Z" level=error msg="couldn't add target to ruhroh: tuf: invalid role ruhroh. does not exist" --- PASS: TestChangeTargetMetaFailsInvalidRole (0.01s) === RUN TestChangeTargetMetaFailsIfPrefixError -time="2020-04-29T15:39:30Z" level=error msg="couldn't add target to targets/level1: Could not add all targets" +time="2021-06-01T22:05:20Z" level=error msg="couldn't add target to targets/level1: Could not add all targets" --- PASS: TestChangeTargetMetaFailsIfPrefixError (0.01s) === RUN TestAllNearExpiry --- PASS: TestAllNearExpiry (0.01s) @@ -2042,7 +2054,7 @@ === RUN TestRotateRemoteKeyOffline --- PASS: TestRotateRemoteKeyOffline (0.00s) PASS -ok github.com/theupdateframework/notary/client 125.681s +ok github.com/theupdateframework/notary/client 48.949s === RUN TestTUFDelegation --- PASS: TestTUFDelegation (0.00s) === RUN TestMemChangelist @@ -2054,14 +2066,14 @@ === RUN TestAdd --- PASS: TestAdd (0.00s) === RUN TestErrorConditions -time="2020-04-29T15:37:20Z" level=warning msg="invalid character '\\x05' looking for beginning of value" ---- PASS: TestErrorConditions (0.01s) +time="2021-06-01T22:04:29Z" level=warning msg="invalid character '\\x05' looking for beginning of value" +--- PASS: TestErrorConditions (0.00s) === RUN TestListOrder --- PASS: TestListOrder (0.00s) === RUN TestFileChangeIterator --- PASS: TestFileChangeIterator (0.00s) PASS -ok github.com/theupdateframework/notary/client/changelist 0.062s +ok github.com/theupdateframework/notary/client/changelist 0.036s === RUN TestParseConfigError --- PASS: TestParseConfigError (0.00s) === RUN TestSetupGRPCServer @@ -2071,7 +2083,7 @@ === RUN TestSetupNetListener --- PASS: TestSetupNetListener (0.00s) PASS -ok github.com/theupdateframework/notary/cmd/escrow 0.016s +ok github.com/theupdateframework/notary/cmd/escrow 0.008s === RUN TestPurgeDelegationKeys Usage: delegation [command] @@ -2095,11 +2107,11 @@ Use "delegation [command] --help" for more information about a command. Removal of the following keys from all delegations in gun staged for next publish: - abc ---- PASS: TestPurgeDelegationKeys (0.00s) +--- PASS: TestPurgeDelegationKeys (0.01s) === RUN TestAddInvalidDelegationName ---- PASS: TestAddInvalidDelegationName (0.00s) +--- PASS: TestAddInvalidDelegationName (0.01s) === RUN TestAddInvalidDelegationCert ---- PASS: TestAddInvalidDelegationCert (0.01s) +--- PASS: TestAddInvalidDelegationCert (0.00s) === RUN TestAddInvalidShortPubkeyCert --- PASS: TestAddInvalidShortPubkeyCert (0.00s) === RUN TestRemoveInvalidDelegationName @@ -2143,85 +2155,85 @@ Use "delegation [command] --help" for more information about a command. --- PASS: TestRemoveInvalidNumArgs (0.00s) === RUN TestInitWithRootKey ---- PASS: TestInitWithRootKey (0.56s) +--- PASS: TestInitWithRootKey (0.17s) === RUN TestInitWithRootCert ---- PASS: TestInitWithRootCert (0.37s) +--- PASS: TestInitWithRootCert (0.18s) === RUN TestClientTUFInteraction ---- PASS: TestClientTUFInteraction (1.09s) +--- PASS: TestClientTUFInteraction (0.36s) === RUN TestClientDeleteTUFInteraction -time="2020-04-29T15:37:27Z" level=error msg="could not reach https://invalid-server: Get https://invalid-server/v2/: dial tcp: lookup invalid-server on [::1]:53: read udp [::1]:59470->[::1]:53: read: connection refused" ---- PASS: TestClientDeleteTUFInteraction (0.91s) +time="2021-06-01T22:04:32Z" level=error msg="could not reach https://invalid-server: Get https://invalid-server/v2/: dial tcp: lookup invalid-server on [::1]:53: read udp [::1]:33789->[::1]:53: read: connection refused" +--- PASS: TestClientDeleteTUFInteraction (0.37s) === RUN TestClientTUFAddByHashInteraction ---- PASS: TestClientTUFAddByHashInteraction (1.25s) +--- PASS: TestClientTUFAddByHashInteraction (0.57s) === RUN TestClientDelegationsInteraction -time="2020-04-29T15:37:30Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2020-04-29T15:37:30Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" ---- PASS: TestClientDelegationsInteraction (3.17s) +time="2021-06-01T22:04:33Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2021-06-01T22:04:33Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +--- PASS: TestClientDelegationsInteraction (1.13s) === RUN TestClientDelegationsPublishing ---- PASS: TestClientDelegationsPublishing (2.47s) +--- PASS: TestClientDelegationsPublishing (1.22s) === RUN TestClientKeyGenerationRotation ---- PASS: TestClientKeyGenerationRotation (3.10s) +--- PASS: TestClientKeyGenerationRotation (1.31s) === RUN TestKeyRotation ---- PASS: TestKeyRotation (0.47s) +--- PASS: TestKeyRotation (0.20s) === RUN TestKeyRotationNonRoot ---- PASS: TestKeyRotationNonRoot (0.61s) +--- PASS: TestKeyRotationNonRoot (0.28s) === RUN TestDefaultRootKeyGeneration ---- PASS: TestDefaultRootKeyGeneration (0.02s) +--- PASS: TestDefaultRootKeyGeneration (0.01s) === RUN TestLogLevelFlags --- PASS: TestLogLevelFlags (0.00s) === RUN TestClientKeyPassphraseChange ---- PASS: TestClientKeyPassphraseChange (0.49s) +--- PASS: TestClientKeyPassphraseChange (0.20s) === RUN TestPurgeSingleKey Removal of the following keys from all delegations in gun staged for next publish: - - bcda6b6cc73536f87d02868b828583f1f9dd0401edbd296a567cca61c96dddef ---- PASS: TestPurgeSingleKey (0.44s) + - 3ecf3049d4160884baf2d4afbd669091b2dbe856cb8ecd9cd5ee4b70ae980735 +--- PASS: TestPurgeSingleKey (0.20s) === RUN TestWitness -time="2020-04-29T15:37:40Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" -time="2020-04-29T15:37:41Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" -time="2020-04-29T15:37:41Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" -time="2020-04-29T15:37:41Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" -time="2020-04-29T15:37:41Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2020-04-29T15:37:41Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2020-04-29T15:37:41Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" ---- PASS: TestWitness (1.54s) +time="2021-06-01T22:04:37Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" +time="2021-06-01T22:04:37Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" +time="2021-06-01T22:04:38Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" +time="2021-06-01T22:04:38Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" +time="2021-06-01T22:04:38Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2021-06-01T22:04:38Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2021-06-01T22:04:38Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" +--- PASS: TestWitness (0.64s) === RUN TestClientTUFInitWithAutoPublish -time="2020-04-29T15:37:41Z" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get https://notary-server-on-the-moon:12306/v2/: dial tcp: lookup notary-server-on-the-moon on [::1]:53: read udp [::1]:49725->[::1]:53: read: connection refused" ---- PASS: TestClientTUFInitWithAutoPublish (0.37s) +time="2021-06-01T22:04:38Z" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get https://notary-server-on-the-moon:12306/v2/: dial tcp: lookup notary-server-on-the-moon on [::1]:53: read udp [::1]:58338->[::1]:53: read: connection refused" +--- PASS: TestClientTUFInitWithAutoPublish (0.14s) === RUN TestClientTUFAddWithAutoPublish -time="2020-04-29T15:37:42Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on [::1]:53: read udp [::1]:59851->[::1]:53: read: connection refused" -time="2020-04-29T15:37:42Z" level=error msg="Could not publish Repository since we could not update: client is offline" -time="2020-04-29T15:37:42Z" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get https://notary-server-on-the-moon:12306/v2/: dial tcp: lookup notary-server-on-the-moon on [::1]:53: read udp [::1]:42339->[::1]:53: read: connection refused" -time="2020-04-29T15:37:42Z" level=error msg="Could not publish Repository since we could not update: client is offline" ---- PASS: TestClientTUFAddWithAutoPublish (0.42s) +time="2021-06-01T22:04:38Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on [::1]:53: read udp [::1]:37623->[::1]:53: read: connection refused" +time="2021-06-01T22:04:38Z" level=error msg="Could not publish Repository since we could not update: client is offline" +time="2021-06-01T22:04:38Z" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get https://notary-server-on-the-moon:12306/v2/: dial tcp: lookup notary-server-on-the-moon on [::1]:53: read udp [::1]:38068->[::1]:53: read: connection refused" +time="2021-06-01T22:04:38Z" level=error msg="Could not publish Repository since we could not update: client is offline" +--- PASS: TestClientTUFAddWithAutoPublish (0.15s) === RUN TestClientTUFRemoveWithAutoPublish ---- PASS: TestClientTUFRemoveWithAutoPublish (0.78s) +--- PASS: TestClientTUFRemoveWithAutoPublish (0.33s) === RUN TestClientDelegationAddWithAutoPublish ---- PASS: TestClientDelegationAddWithAutoPublish (0.38s) +--- PASS: TestClientDelegationAddWithAutoPublish (0.17s) === RUN TestClientDelegationRemoveWithAutoPublish -time="2020-04-29T15:37:44Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2020-04-29T15:37:44Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" ---- PASS: TestClientDelegationRemoveWithAutoPublish (0.90s) +time="2021-06-01T22:04:39Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2021-06-01T22:04:39Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +--- PASS: TestClientDelegationRemoveWithAutoPublish (0.34s) === RUN TestClientTUFAddByHashWithAutoPublish ---- PASS: TestClientTUFAddByHashWithAutoPublish (0.34s) +--- PASS: TestClientTUFAddByHashWithAutoPublish (0.16s) === RUN TestClientKeyImport -time="2020-04-29T15:37:45Z" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header" -time="2020-04-29T15:37:45Z" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to" ---- PASS: TestClientKeyImport (0.13s) +time="2021-06-01T22:04:39Z" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header" +time="2021-06-01T22:04:39Z" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to" +--- PASS: TestClientKeyImport (0.06s) === RUN TestAddDelImportKeyPublishFlow -time="2020-04-29T15:37:45Z" level=error msg="couldn't add target to targets/releases: could not find necessary signing keys, at least one of these keys must be available: 0570f9fdca00bdaf62f3f79bf84e70748ba2c8bff926f20dd996bac49e6164fc" ---- PASS: TestAddDelImportKeyPublishFlow (0.78s) +time="2021-06-01T22:04:39Z" level=error msg="couldn't add target to targets/releases: could not find necessary signing keys, at least one of these keys must be available: 0570f9fdca00bdaf62f3f79bf84e70748ba2c8bff926f20dd996bac49e6164fc" +--- PASS: TestAddDelImportKeyPublishFlow (0.35s) === RUN TestExportImportFlow ---- PASS: TestExportImportFlow (0.20s) +--- PASS: TestExportImportFlow (0.09s) === RUN TestDelegationKeyImportExport ---- PASS: TestDelegationKeyImportExport (0.02s) +--- PASS: TestDelegationKeyImportExport (0.01s) === RUN TestImportKeysNoYubikey ---- PASS: TestImportKeysNoYubikey (0.03s) +--- PASS: TestImportKeysNoYubikey (0.01s) === RUN TestExportImportKeysNoYubikey ---- PASS: TestExportImportKeysNoYubikey (0.02s) +--- PASS: TestExportImportKeysNoYubikey (0.01s) === RUN TestRemoveIfNoKey --- PASS: TestRemoveIfNoKey (0.00s) === RUN TestRemoveOneKeyAbort ---- PASS: TestRemoveOneKeyAbort (0.01s) +--- PASS: TestRemoveOneKeyAbort (0.00s) === RUN TestRemoveOneKeyConfirm --- PASS: TestRemoveOneKeyConfirm (0.01s) === RUN TestRemoveMultikeysInvalidInput @@ -2231,16 +2243,16 @@ === RUN TestRemoveMultikeysRemoveOnlyChosenKey --- PASS: TestRemoveMultikeysRemoveOnlyChosenKey (0.01s) === RUN TestRotateKeyInvalidRoles -time="2020-04-29T15:37:46Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on [::1]:53: read udp [::1]:36311->[::1]:53: read: connection refused" -time="2020-04-29T15:37:46Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on [::1]:53: read udp [::1]:58293->[::1]:53: read: connection refused" -time="2020-04-29T15:37:46Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on [::1]:53: read udp [::1]:38235->[::1]:53: read: connection refused" -time="2020-04-29T15:37:46Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on [::1]:53: read udp [::1]:53514->[::1]:53: read: connection refused" +time="2021-06-01T22:04:40Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on [::1]:53: read udp [::1]:36947->[::1]:53: read: connection refused" +time="2021-06-01T22:04:40Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on [::1]:53: read udp [::1]:55394->[::1]:53: read: connection refused" +time="2021-06-01T22:04:40Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on [::1]:53: read udp [::1]:36652->[::1]:53: read: connection refused" +time="2021-06-01T22:04:40Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on [::1]:53: read udp [::1]:58481->[::1]:53: read: connection refused" --- PASS: TestRotateKeyInvalidRoles (0.00s) === RUN TestRotateKeyTargetCannotBeServerManaged -time="2020-04-29T15:37:46Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on [::1]:53: read udp [::1]:52135->[::1]:53: read: connection refused" +time="2021-06-01T22:04:40Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on [::1]:53: read udp [::1]:60611->[::1]:53: read: connection refused" --- PASS: TestRotateKeyTargetCannotBeServerManaged (0.00s) === RUN TestRotateKeyTimestampCannotBeLocallyManaged -time="2020-04-29T15:37:46Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on [::1]:53: read udp [::1]:54074->[::1]:53: read: connection refused" +time="2021-06-01T22:04:40Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on [::1]:53: read udp [::1]:38267->[::1]:53: read: connection refused" --- PASS: TestRotateKeyTimestampCannotBeLocallyManaged (0.00s) === RUN TestRotateKeyNoGUN Usage: @@ -2248,13 +2260,13 @@ === RUN TestRotateKeyRemoteServerManagesKey Successfully rotated snapshot key for repository docker.com/notary Successfully rotated timestamp key for repository docker.com/notary ---- PASS: TestRotateKeyRemoteServerManagesKey (0.37s) +--- PASS: TestRotateKeyRemoteServerManagesKey (0.17s) === RUN TestRotateKeyBothKeys Successfully rotated targets key for repository docker.com/notary Successfully rotated snapshot key for repository docker.com/notary ---- PASS: TestRotateKeyBothKeys (0.35s) +--- PASS: TestRotateKeyBothKeys (0.13s) === RUN TestRotateKeyRootIsInteractive ---- PASS: TestRotateKeyRootIsInteractive (0.09s) +--- PASS: TestRotateKeyRootIsInteractive (0.03s) === RUN TestChangeKeyPassphraseInvalidID --- PASS: TestChangeKeyPassphraseInvalidID (0.00s) === RUN TestChangeKeyPassphraseInvalidNumArgs @@ -2273,8 +2285,8 @@ === RUN TestImportKeysNonexistentFile --- PASS: TestImportKeysNonexistentFile (0.00s) === RUN TestKeyGeneration -time="2020-04-29T15:37:47Z" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to" ---- PASS: TestKeyGeneration (0.05s) +time="2021-06-01T22:04:40Z" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to" +--- PASS: TestKeyGeneration (0.02s) === RUN TestNotaryConfigFileDefault --- PASS: TestNotaryConfigFileDefault (0.00s) === RUN TestRemoteServerDefault @@ -2284,21 +2296,21 @@ === RUN TestRemoteServerCommandLineFlagOverridesConfig --- PASS: TestRemoteServerCommandLineFlagOverridesConfig (0.00s) === RUN TestInvalidAddHashCommands ---- PASS: TestInvalidAddHashCommands (0.01s) +--- PASS: TestInvalidAddHashCommands (0.00s) === RUN TestConfigParsingErrorsPropagatedByCommands ---- PASS: TestConfigParsingErrorsPropagatedByCommands (0.01s) +--- PASS: TestConfigParsingErrorsPropagatedByCommands (0.00s) === RUN TestInsufficientArgumentsReturnsErrorAndPrintsUsage --- PASS: TestInsufficientArgumentsReturnsErrorAndPrintsUsage (0.01s) === RUN TestBareCommandPrintsUsageAndNoError --- PASS: TestBareCommandPrintsUsageAndNoError (0.00s) === RUN TestConfigFileTLSCannotBeRelativeToCWD ---- PASS: TestConfigFileTLSCannotBeRelativeToCWD (0.02s) +--- PASS: TestConfigFileTLSCannotBeRelativeToCWD (0.00s) === RUN TestConfigFileTLSCanBeRelativeToConfigOrAbsolute ---- PASS: TestConfigFileTLSCanBeRelativeToConfigOrAbsolute (0.13s) +--- PASS: TestConfigFileTLSCanBeRelativeToConfigOrAbsolute (0.07s) === RUN TestConfigFileOverridenByCmdLineFlags ---- PASS: TestConfigFileOverridenByCmdLineFlags (0.12s) +--- PASS: TestConfigFileOverridenByCmdLineFlags (0.06s) === RUN TestConfigFileTrustPinning ---- PASS: TestConfigFileTrustPinning (0.02s) +--- PASS: TestConfigFileTrustPinning (0.00s) === RUN TestPassphraseRetrieverCaching --- PASS: TestPassphraseRetrieverCaching (0.00s) === RUN TestPassphraseRetrieverDelegationRoleCaching @@ -2310,7 +2322,7 @@ === RUN TestPrettyPrintZeroKeys --- PASS: TestPrettyPrintZeroKeys (0.00s) === RUN TestPrettyPrintRootAndSigningKeys ---- PASS: TestPrettyPrintRootAndSigningKeys (0.05s) +--- PASS: TestPrettyPrintRootAndSigningKeys (0.02s) === RUN TestPrettyPrintZeroTargets --- PASS: TestPrettyPrintZeroTargets (0.00s) === RUN TestPrettyPrintSortedTargets @@ -2320,34 +2332,34 @@ === RUN TestPrettyPrintSortedRoles --- PASS: TestPrettyPrintSortedRoles (0.00s) === RUN TestImportRootCert ---- PASS: TestImportRootCert (0.02s) +--- PASS: TestImportRootCert (0.00s) === RUN TestTokenAuth -time="2020-04-29T15:37:47Z" level=error msg="could not reach https://localhost:9999: Get https://localhost:9999/v2/: dial tcp 127.0.0.1:9999: connect: connection refused" +time="2021-06-01T22:04:40Z" level=error msg="could not reach https://localhost:9999: Get https://localhost:9999/v2/: dial tcp 127.0.0.1:9999: connect: connection refused" --- PASS: TestTokenAuth (0.00s) === RUN TestAdminTokenAuth -time="2020-04-29T15:37:47Z" level=error msg="could not reach https://localhost:9999: Get https://localhost:9999/v2/: dial tcp 127.0.0.1:9999: connect: connection refused" +time="2021-06-01T22:04:40Z" level=error msg="could not reach https://localhost:9999: Get https://localhost:9999/v2/: dial tcp 127.0.0.1:9999: connect: connection refused" --- PASS: TestAdminTokenAuth (0.00s) === RUN TestTokenAuth200Status --- PASS: TestTokenAuth200Status (0.00s) === RUN TestAdminTokenAuth200Status ---- PASS: TestAdminTokenAuth200Status (0.01s) +--- PASS: TestAdminTokenAuth200Status (0.00s) === RUN TestTokenAuth401Status --- PASS: TestTokenAuth401Status (0.00s) === RUN TestAdminTokenAuth401Status --- PASS: TestAdminTokenAuth401Status (0.00s) === RUN TestTokenAuthNon200Non401Status -time="2020-04-29T15:37:47Z" level=error msg="could not reach http://127.0.0.1:46809: 404" +time="2021-06-01T22:04:40Z" level=error msg="could not reach http://127.0.0.1:35625: 404" --- PASS: TestTokenAuthNon200Non401Status (0.00s) === RUN TestAdminTokenAuthNon200Non401Status -time="2020-04-29T15:37:47Z" level=error msg="could not reach http://127.0.0.1:40391: 404" +time="2021-06-01T22:04:40Z" level=error msg="could not reach http://127.0.0.1:33755: 404" --- PASS: TestAdminTokenAuthNon200Non401Status (0.00s) === RUN TestConfigureRepo --- PASS: TestConfigureRepo (0.00s) === RUN TestConfigureRepoRW -Enter username: time="2020-04-29T15:37:47Z" level=error msg="error processing username input: EOF" +Enter username: time="2021-06-01T22:04:40Z" level=error msg="error processing username input: EOF" --- PASS: TestConfigureRepoRW (0.00s) === RUN TestConfigureRepoAdmin -Enter username: time="2020-04-29T15:37:47Z" level=error msg="error processing username input: EOF" +Enter username: time="2021-06-01T22:04:40Z" level=error msg="error processing username input: EOF" --- PASS: TestConfigureRepoAdmin (0.00s) === RUN TestStatusUnstageAndReset Successfully reset specified changes for repository gun @@ -2360,11 +2372,11 @@ Pushing changes to gun --- PASS: TestGetTrustPinningErrors (0.00s) === RUN TestPasswordStore -Enter username: time="2020-04-29T15:37:47Z" level=error msg="error processing username input: EOF" +Enter username: time="2021-06-01T22:04:40Z" level=error msg="error processing username input: EOF" --- PASS: TestPasswordStore (0.00s) === RUN TestPasswordStoreWithEnvvar -time="2020-04-29T15:37:47Z" level=error msg="Authentication string with zero-legnth username" -time="2020-04-29T15:37:47Z" level=error msg="Could not base64-decode authentication string" +time="2021-06-01T22:04:40Z" level=error msg="Authentication string with zero-legnth username" +time="2021-06-01T22:04:40Z" level=error msg="Could not base64-decode authentication string" --- PASS: TestPasswordStoreWithEnvvar (0.00s) === RUN TestGetPayload --- PASS: TestGetPayload (0.00s) @@ -2373,7 +2385,7 @@ === RUN TestHomeExpand --- PASS: TestHomeExpand (0.00s) PASS -ok github.com/theupdateframework/notary/cmd/notary 22.272s +ok github.com/theupdateframework/notary/cmd/notary 9.248s === RUN TestBootstrap --- PASS: TestBootstrap (0.00s) === RUN TestGetAddrAndTLSConfigInvalidTLS @@ -2389,42 +2401,42 @@ === RUN TestGetInvalidTrustService --- PASS: TestGetInvalidTrustService (0.00s) === RUN TestGetLocalTrustService -time="2020-04-29T15:37:32Z" level=info msg="Using local signing service, which requires ED25519. Ignoring all other trust_service parameters, including keyAlgorithm" +time="2021-06-01T22:04:32Z" level=info msg="Using local signing service, which requires ED25519. Ignoring all other trust_service parameters, including keyAlgorithm" --- PASS: TestGetLocalTrustService (0.00s) === RUN TestGetTrustServiceInvalidKeyAlgorithm --- PASS: TestGetTrustServiceInvalidKeyAlgorithm (0.00s) === RUN TestGetTrustServiceTLSMissingCertOrKey --- PASS: TestGetTrustServiceTLSMissingCertOrKey (0.00s) === RUN TestGetTrustServiceNoTLSConfig -time="2020-04-29T15:37:32Z" level=info msg="Using remote signing service" +time="2021-06-01T22:04:32Z" level=info msg="Using remote signing service" --- PASS: TestGetTrustServiceNoTLSConfig (0.00s) === RUN TestGetTrustServiceTLSSuccess -time="2020-04-29T15:37:32Z" level=info msg="Using remote signing service" +time="2021-06-01T22:04:32Z" level=info msg="Using remote signing service" --- PASS: TestGetTrustServiceTLSSuccess (0.00s) === RUN TestGetTrustServiceTLSFailure --- PASS: TestGetTrustServiceTLSFailure (0.00s) === RUN TestGetStoreInvalid -time="2020-04-29T15:37:32Z" level=info msg="Using asdf backend" +time="2021-06-01T22:04:32Z" level=info msg="Using asdf backend" --- PASS: TestGetStoreInvalid (0.00s) === RUN TestGetStoreDBStore -time="2020-04-29T15:37:32Z" level=info msg="Using sqlite3 backend" +time="2021-06-01T22:04:32Z" level=info msg="Using sqlite3 backend" --- PASS: TestGetStoreDBStore (0.00s) === RUN TestGetStoreRethinkDBStoreConnectionFails -time="2020-04-29T15:37:32Z" level=info msg="Using rethinkdb backend" +time="2021-06-01T22:04:32Z" level=info msg="Using rethinkdb backend" --- PASS: TestGetStoreRethinkDBStoreConnectionFails (0.00s) === RUN TestGetMemoryStore -time="2020-04-29T15:37:32Z" level=info msg="Using memory backend" +time="2021-06-01T22:04:32Z" level=info msg="Using memory backend" --- PASS: TestGetMemoryStore (0.00s) === RUN TestGetCacheConfig --- PASS: TestGetCacheConfig (0.00s) === RUN TestGetGUNPRefixes --- PASS: TestGetGUNPRefixes (0.00s) === RUN TestSampleConfig -time="2020-04-29T15:37:32Z" level=info msg="Using remote signing service" -time="2020-04-29T15:37:32Z" level=info msg="Using sqlite3 backend" ---- PASS: TestSampleConfig (0.01s) +time="2021-06-01T22:04:32Z" level=info msg="Using remote signing service" +time="2021-06-01T22:04:32Z" level=info msg="Using sqlite3 backend" +--- PASS: TestSampleConfig (0.00s) PASS -ok github.com/theupdateframework/notary/cmd/notary-server 0.037s +ok github.com/theupdateframework/notary/cmd/notary-server 0.017s === RUN TestGetAddrAndTLSConfigInvalidTLS --- PASS: TestGetAddrAndTLSConfigInvalidTLS (0.00s) === RUN TestGetAddrAndTLSConfigNoGRPCAddr @@ -2439,7 +2451,7 @@ --- SKIP: TestSetupCryptoServicesRethinkDBStoreConnectionFails (0.00s) main_test.go:121: DM - skipping malfunctioning test, fails on sbuild === RUN TestSetupCryptoServicesDBStoreSuccess ---- PASS: TestSetupCryptoServicesDBStoreSuccess (0.17s) +--- PASS: TestSetupCryptoServicesDBStoreSuccess (0.07s) === RUN TestSetupCryptoServicesMemoryStore --- PASS: TestSetupCryptoServicesMemoryStore (0.01s) === RUN TestSetupCryptoServicesInvalidStore @@ -2457,17 +2469,17 @@ === RUN TestSampleConfig --- PASS: TestSampleConfig (0.00s) PASS -ok github.com/theupdateframework/notary/cmd/notary-signer 0.205s +ok github.com/theupdateframework/notary/cmd/notary-signer 0.086s === RUN TestGenerateCertificate ---- PASS: TestGenerateCertificate (0.03s) +--- PASS: TestGenerateCertificate (0.01s) === RUN TestCryptoServiceWithNonEmptyGUN ---- PASS: TestCryptoServiceWithNonEmptyGUN (1.88s) +--- PASS: TestCryptoServiceWithNonEmptyGUN (1.68s) === RUN TestCryptoServiceWithEmptyGUN ---- PASS: TestCryptoServiceWithEmptyGUN (1.72s) +--- PASS: TestCryptoServiceWithEmptyGUN (0.96s) === RUN TestCryptoSignerInterfaceBehavior ---- PASS: TestCryptoSignerInterfaceBehavior (0.04s) +--- PASS: TestCryptoSignerInterfaceBehavior (0.01s) PASS -ok github.com/theupdateframework/notary/cryptoservice 3.680s +ok github.com/theupdateframework/notary/cryptoservice 2.672s === RUN TestGetPassphraseForUsingDelegationKey --- PASS: TestGetPassphraseForUsingDelegationKey (0.00s) === RUN TestGetPassphraseLimitsShortPassphrases @@ -2483,253 +2495,253 @@ === RUN TestGetPassphrase --- PASS: TestGetPassphrase (0.00s) PASS -ok github.com/theupdateframework/notary/passphrase 0.042s +ok github.com/theupdateframework/notary/passphrase 0.034s ? github.com/theupdateframework/notary/proto [no test files] === RUN TestValidationErrorFormat -time="2020-04-29T15:37:23Z" level=info msg="invalid update: Update sent by the client is invalid.: &{ErrBadHierarchy Metadata hierarchy is incomplete: no snapshot was included in update and server does not hold current snapshot key for repository}" go.version=go1.11.6 http.request.contenttype="multipart/form-data; boundary=a4d84c20be70e63b1afd9681100b3712b6f48dc9be84b8f6a3bde50258ac" http.request.host="127.0.0.1:44515" http.request.id=8150be76-7a4b-4e15-a4cf-176fceb9187f http.request.method=POST http.request.remoteaddr="127.0.0.1:51908" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 -time="2020-04-29T15:37:23Z" level=info msg="response completed" go.version=go1.11.6 http.request.contenttype="multipart/form-data; boundary=a4d84c20be70e63b1afd9681100b3712b6f48dc9be84b8f6a3bde50258ac" http.request.host="127.0.0.1:44515" http.request.id=8150be76-7a4b-4e15-a4cf-176fceb9187f http.request.method=POST http.request.remoteaddr="127.0.0.1:51908" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration=19.32511ms http.response.status=400 http.response.written=260 ---- PASS: TestValidationErrorFormat (0.11s) +time="2021-06-01T22:04:30Z" level=info msg="invalid update: Update sent by the client is invalid.: &{ErrBadHierarchy Metadata hierarchy is incomplete: no snapshot was included in update and server does not hold current snapshot key for repository}" go.version=go1.11.6 http.request.contenttype="multipart/form-data; boundary=253d2d91560daa1b02525f5e60d112d1c811c4c2f4808829b7a8b49809a3" http.request.host="127.0.0.1:35599" http.request.id=5720ce92-a6fc-4fc3-bc84-6c4714f9a86f http.request.method=POST http.request.remoteaddr="127.0.0.1:49618" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.contenttype="multipart/form-data; boundary=253d2d91560daa1b02525f5e60d112d1c811c4c2f4808829b7a8b49809a3" http.request.host="127.0.0.1:35599" http.request.id=5720ce92-a6fc-4fc3-bc84-6c4714f9a86f http.request.method=POST http.request.remoteaddr="127.0.0.1:49618" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration=9.167532ms http.response.status=400 http.response.written=260 +--- PASS: TestValidationErrorFormat (0.05s) === RUN TestRunBadAddr --- PASS: TestRunBadAddr (0.00s) === RUN TestRunReservedPort --- PASS: TestRunReservedPort (0.00s) === RUN TestRepoPrefixMatches -time="2020-04-29T15:37:24Z" level=info msg="updated docker.io/notary to timestamp version 1, checksum 0ce147d8925e8a841b4edfdf5beab1ee3d33610e5c2673aaa2737cdfda94aded" docker.io/notary=gun go.version=go1.11.6 http.request.contenttype="multipart/form-data; boundary=06e16e19734913da65f7fe79c220fd018ae969c3b13263e43252b4d6dfb5" http.request.host="127.0.0.1:34065" http.request.id=284e7731-88be-4119-aec1-3fe798a432ba http.request.method=POST http.request.remoteaddr="127.0.0.1:39362" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.contenttype="multipart/form-data; boundary=06e16e19734913da65f7fe79c220fd018ae969c3b13263e43252b4d6dfb5" http.request.host="127.0.0.1:34065" http.request.id=284e7731-88be-4119-aec1-3fe798a432ba http.request.method=POST http.request.remoteaddr="127.0.0.1:39362" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration=19.370463ms http.response.status=0 http.response.written=0 -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:34065" http.request.id=6168ec3b-dd96-4bd6-92d1-c60c8ea841b9 http.request.method=GET http.request.remoteaddr="127.0.0.1:39362" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.json http.request.useragent=Go-http-client/1.1 http.response.duration="672.23µs" http.response.status=200 http.response.written=682 -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:34065" http.request.id=afc7703b-95e1-4ca8-93db-62e0015293d6 http.request.method=GET http.request.remoteaddr="127.0.0.1:39362" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.36b5bad26e252d2f60b2bd50634817cbd150a14957e982bb876f41d45ec9a13d.json http.request.useragent=Go-http-client/1.1 http.response.duration="58.841µs" http.response.status=200 http.response.written=682 -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:34065" http.request.id=458a3341-0536-439f-bc8b-373c668e5f64 http.request.method=GET http.request.remoteaddr="127.0.0.1:39362" http.request.uri=/v2/docker.io/notary/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="813.633µs" http.response.status=200 http.response.written=181 -time="2020-04-29T15:37:24Z" level=info msg="trust data deleted for docker.io/notary" docker.io/notary=gun go.version=go1.11.6 http.request.host="127.0.0.1:34065" http.request.id=45e405a7-4177-4f0b-b574-403b6d448ead http.request.method=DELETE http.request.remoteaddr="127.0.0.1:39362" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:34065" http.request.id=45e405a7-4177-4f0b-b574-403b6d448ead http.request.method=DELETE http.request.remoteaddr="127.0.0.1:39362" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration="218.482µs" http.response.status=0 http.response.written=0 ---- PASS: TestRepoPrefixMatches (0.10s) +time="2021-06-01T22:04:30Z" level=info msg="updated docker.io/notary to timestamp version 1, checksum decbb5007a699a4fc5c984681fd411b41086af5a48db6eabc4fb8d6ee3e78639" docker.io/notary=gun go.version=go1.11.6 http.request.contenttype="multipart/form-data; boundary=be19e3a6282efaa789bcfce8851ad73c1ffe0dacd392fee0e74feeb9204c" http.request.host="127.0.0.1:40907" http.request.id=6c663d02-370b-4f1e-8658-eae06e780b61 http.request.method=POST http.request.remoteaddr="127.0.0.1:41712" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.contenttype="multipart/form-data; boundary=be19e3a6282efaa789bcfce8851ad73c1ffe0dacd392fee0e74feeb9204c" http.request.host="127.0.0.1:40907" http.request.id=6c663d02-370b-4f1e-8658-eae06e780b61 http.request.method=POST http.request.remoteaddr="127.0.0.1:41712" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration=22.397237ms http.response.status=0 http.response.written=0 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:40907" http.request.id=53d0945c-a1a7-426e-9f4f-3e41aab11e75 http.request.method=GET http.request.remoteaddr="127.0.0.1:41712" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.json http.request.useragent=Go-http-client/1.1 http.response.duration="688.097µs" http.response.status=200 http.response.written=683 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:40907" http.request.id=06eeb9f2-6b6a-41a4-b933-4200c379f344 http.request.method=GET http.request.remoteaddr="127.0.0.1:41712" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.7400d366153dbd30d306bcae6c131bce6709749f860be4da431aa34ce7707c48.json http.request.useragent=Go-http-client/1.1 http.response.duration="50.714µs" http.response.status=200 http.response.written=683 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:40907" http.request.id=df46f35f-d993-4c9f-b6ff-a0dc2d7a796c http.request.method=GET http.request.remoteaddr="127.0.0.1:41712" http.request.uri=/v2/docker.io/notary/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="498.327µs" http.response.status=200 http.response.written=181 +time="2021-06-01T22:04:30Z" level=info msg="trust data deleted for docker.io/notary" docker.io/notary=gun go.version=go1.11.6 http.request.host="127.0.0.1:40907" http.request.id=5e561b55-302c-4e13-90d6-353b3eaac394 http.request.method=DELETE http.request.remoteaddr="127.0.0.1:41712" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:40907" http.request.id=5e561b55-302c-4e13-90d6-353b3eaac394 http.request.method=DELETE http.request.remoteaddr="127.0.0.1:41712" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration="96.541µs" http.response.status=0 http.response.written=0 +--- PASS: TestRepoPrefixMatches (0.07s) === RUN TestRepoPrefixDoesNotMatch ---- PASS: TestRepoPrefixDoesNotMatch (0.07s) +--- PASS: TestRepoPrefixDoesNotMatch (0.04s) === RUN TestMetricsEndpoint --- PASS: TestMetricsEndpoint (0.01s) === RUN TestGetKeysEndpoint -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:36035" http.request.id=be8de19d-7c04-4413-83e5-b49b4bd61710 http.request.method=GET http.request.remoteaddr="127.0.0.1:59260" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="612.203µs" http.response.status=200 http.response.written=103 -time="2020-04-29T15:37:24Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.11.6 http.request.host="127.0.0.1:36035" http.request.id=bfbcce84-5816-4c52-97eb-a60c6807653c http.request.method=GET http.request.remoteaddr="127.0.0.1:59262" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:36035" http.request.id=bfbcce84-5816-4c52-97eb-a60c6807653c http.request.method=GET http.request.remoteaddr="127.0.0.1:59262" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration=2.665919ms http.response.status=404 http.response.written=104 -time="2020-04-29T15:37:24Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.11.6 http.request.host="127.0.0.1:36035" http.request.id=952fd0db-adc9-4858-a343-328fe2585049 http.request.method=GET http.request.remoteaddr="127.0.0.1:59264" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:36035" http.request.id=952fd0db-adc9-4858-a343-328fe2585049 http.request.method=GET http.request.remoteaddr="127.0.0.1:59264" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="101.582µs" http.response.status=404 http.response.written=104 -time="2020-04-29T15:37:24Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.11.6 http.request.host="127.0.0.1:36035" http.request.id=0e2118d6-af15-42c5-8942-472e66486da1 http.request.method=GET http.request.remoteaddr="127.0.0.1:59266" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:36035" http.request.id=0e2118d6-af15-42c5-8942-472e66486da1 http.request.method=GET http.request.remoteaddr="127.0.0.1:59266" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="128.593µs" http.response.status=404 http.response.written=104 -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:36035" http.request.id=2a1eeff3-cbda-44cf-9088-af010970aa44 http.request.method=GET http.request.remoteaddr="127.0.0.1:59268" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="620.836µs" http.response.status=200 http.response.written=103 ---- PASS: TestGetKeysEndpoint (0.02s) +time="2021-06-01T22:04:30Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.11.6 http.request.host="127.0.0.1:32809" http.request.id=6612e6b0-4cb1-4ff4-bc45-bba041365999 http.request.method=GET http.request.remoteaddr="127.0.0.1:38514" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:32809" http.request.id=6612e6b0-4cb1-4ff4-bc45-bba041365999 http.request.method=GET http.request.remoteaddr="127.0.0.1:38514" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="91.873µs" http.response.status=404 http.response.written=104 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:32809" http.request.id=179e49dc-4953-492e-b43f-75bc6ed7a4bb http.request.method=GET http.request.remoteaddr="127.0.0.1:38516" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="360.152µs" http.response.status=200 http.response.written=103 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:32809" http.request.id=1062755a-aa3a-4794-9323-4a9c1da6939c http.request.method=GET http.request.remoteaddr="127.0.0.1:38518" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="295.369µs" http.response.status=200 http.response.written=103 +time="2021-06-01T22:04:30Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.11.6 http.request.host="127.0.0.1:32809" http.request.id=53e56de2-e657-4c85-ba43-b320581a1ca1 http.request.method=GET http.request.remoteaddr="127.0.0.1:38520" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:32809" http.request.id=53e56de2-e657-4c85-ba43-b320581a1ca1 http.request.method=GET http.request.remoteaddr="127.0.0.1:38520" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="105.957µs" http.response.status=404 http.response.written=104 +time="2021-06-01T22:04:30Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.11.6 http.request.host="127.0.0.1:32809" http.request.id=c067ea65-6d16-4e86-a0b4-8aa42284d452 http.request.method=GET http.request.remoteaddr="127.0.0.1:38522" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:32809" http.request.id=c067ea65-6d16-4e86-a0b4-8aa42284d452 http.request.method=GET http.request.remoteaddr="127.0.0.1:38522" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="137.813µs" http.response.status=404 http.response.written=104 +--- PASS: TestGetKeysEndpoint (0.01s) === RUN TestGetRoleByHash -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:42351" http.request.id=d7cb2a73-10c0-4246-b32d-54be1d750444 http.request.method=GET http.request.remoteaddr="127.0.0.1:40936" http.request.uri=/v2/gun/_trust/tuf/timestamp.5d495430fd6dcd4a6095aadac7ce6842d1892ac97c24486b07e94d6f69e7a5b9.json http.request.useragent=Go-http-client/1.1 http.response.duration="98.566µs" http.response.status=200 http.response.written=115 ---- PASS: TestGetRoleByHash (0.01s) +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:35077" http.request.id=01c4d0a8-d585-4626-a42e-03bdcb9db4b9 http.request.method=GET http.request.remoteaddr="127.0.0.1:41736" http.request.uri=/v2/gun/_trust/tuf/timestamp.c7d8225576848f0641f0b052012aab8c60f5973767664a02d3b5dcde5ccf61cb.json http.request.useragent=Go-http-client/1.1 http.response.duration="46.003µs" http.response.status=200 http.response.written=114 +--- PASS: TestGetRoleByHash (0.00s) === RUN TestGetRoleByVersion -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:35915" http.request.id=dd981389-ddaf-42ae-ba88-821c19fd09c6 http.request.method=GET http.request.remoteaddr="127.0.0.1:49012" http.request.uri=/v2/gun/_trust/tuf/1.timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration="88.998µs" http.response.status=200 http.response.written=115 ---- PASS: TestGetRoleByVersion (0.01s) +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:41347" http.request.id=e6521c3b-9437-4525-8f36-1e862a70ac42 http.request.method=GET http.request.remoteaddr="127.0.0.1:43616" http.request.uri=/v2/gun/_trust/tuf/1.timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration="61.474µs" http.response.status=200 http.response.written=115 +--- PASS: TestGetRoleByVersion (0.00s) === RUN TestGetCurrentRole -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:46471" http.request.id=58f6ade4-d5f1-4916-91f5-424772d385fc http.request.method=GET http.request.remoteaddr="127.0.0.1:51526" http.request.uri=/v2/gun/_trust/tuf/timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration=1.539087ms http.response.status=200 http.response.written=495 ---- PASS: TestGetCurrentRole (0.05s) +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:40919" http.request.id=bbcfad71-6459-47ef-9469-03e538999728 http.request.method=GET http.request.remoteaddr="127.0.0.1:33530" http.request.uri=/v2/gun/_trust/tuf/timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration="569.158µs" http.response.status=200 http.response.written=495 +--- PASS: TestGetCurrentRole (0.02s) === RUN TestRotateKeyEndpoint -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:43431" http.request.id=99195a76-a432-4a29-85f4-fb639d2b4828 http.request.method=POST http.request.remoteaddr="127.0.0.1:35442" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="563.958µs" http.response.status=200 http.response.written=103 -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:43431" http.request.id=e49860ee-df2b-4058-9032-18c419b98b27 http.request.method=POST http.request.remoteaddr="127.0.0.1:35444" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="709.584µs" http.response.status=200 http.response.written=103 -time="2020-04-29T15:37:24Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:43431" http.request.id=a07d7be4-ea0c-4e64-8e82-2dddebf739ee http.request.method=POST http.request.remoteaddr="127.0.0.1:35446" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:43431" http.request.id=a07d7be4-ea0c-4e64-8e82-2dddebf739ee http.request.method=POST http.request.remoteaddr="127.0.0.1:35446" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="171.611µs" http.response.status=404 http.response.written=104 -time="2020-04-29T15:37:24Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:43431" http.request.id=d9f81fa6-ea56-44f8-b323-325ba50cd4c9 http.request.method=POST http.request.remoteaddr="127.0.0.1:35448" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:43431" http.request.id=d9f81fa6-ea56-44f8-b323-325ba50cd4c9 http.request.method=POST http.request.remoteaddr="127.0.0.1:35448" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="83.211µs" http.response.status=404 http.response.written=104 -time="2020-04-29T15:37:24Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:43431" http.request.id=00ab2918-d503-46c5-beac-532db596864d http.request.method=POST http.request.remoteaddr="127.0.0.1:35450" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1 -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:43431" http.request.id=00ab2918-d503-46c5-beac-532db596864d http.request.method=POST http.request.remoteaddr="127.0.0.1:35450" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="174.559µs" http.response.status=404 http.response.written=104 -time="2020-04-29T15:37:24Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:43431" http.request.id=f5f92e1e-0499-41ff-826e-773f5035ce11 http.request.method=POST http.request.remoteaddr="127.0.0.1:35452" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 -time="2020-04-29T15:37:24Z" level=info msg="response completed" go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:43431" http.request.id=f5f92e1e-0499-41ff-826e-773f5035ce11 http.request.method=POST http.request.remoteaddr="127.0.0.1:35452" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="86.037µs" http.response.status=404 http.response.written=104 ---- PASS: TestRotateKeyEndpoint (0.02s) +time="2021-06-01T22:04:30Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:44337" http.request.id=797db767-c97b-4e8a-bbf9-bee5e3c48853 http.request.method=POST http.request.remoteaddr="127.0.0.1:37916" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:44337" http.request.id=797db767-c97b-4e8a-bbf9-bee5e3c48853 http.request.method=POST http.request.remoteaddr="127.0.0.1:37916" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="210.286µs" http.response.status=404 http.response.written=104 +time="2021-06-01T22:04:30Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:44337" http.request.id=69e88e61-3997-4375-b3d8-c0fc8140333c http.request.method=POST http.request.remoteaddr="127.0.0.1:37918" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:44337" http.request.id=69e88e61-3997-4375-b3d8-c0fc8140333c http.request.method=POST http.request.remoteaddr="127.0.0.1:37918" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="105.699µs" http.response.status=404 http.response.written=104 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:44337" http.request.id=d9952489-94a3-44ba-a609-ca7b9a0546db http.request.method=POST http.request.remoteaddr="127.0.0.1:37920" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="311.097µs" http.response.status=200 http.response.written=103 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:44337" http.request.id=19b30ef4-ab4c-4681-80e2-e0edfa5e0a14 http.request.method=POST http.request.remoteaddr="127.0.0.1:37922" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="515.745µs" http.response.status=200 http.response.written=103 +time="2021-06-01T22:04:30Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:44337" http.request.id=14701208-4aff-43d2-8cf1-4573dfd54f6e http.request.method=POST http.request.remoteaddr="127.0.0.1:37924" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:44337" http.request.id=14701208-4aff-43d2-8cf1-4573dfd54f6e http.request.method=POST http.request.remoteaddr="127.0.0.1:37924" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="87.425µs" http.response.status=404 http.response.written=104 +time="2021-06-01T22:04:30Z" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:44337" http.request.id=2576080f-c04c-4f39-a359-e93b12d514a6 http.request.method=POST http.request.remoteaddr="127.0.0.1:37926" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.contenttype=text/plain http.request.host="127.0.0.1:44337" http.request.id=2576080f-c04c-4f39-a359-e93b12d514a6 http.request.method=POST http.request.remoteaddr="127.0.0.1:37926" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="78.703µs" http.response.status=404 http.response.written=104 +--- PASS: TestRotateKeyEndpoint (0.01s) PASS -ok github.com/theupdateframework/notary/server 0.444s +ok github.com/theupdateframework/notary/server 0.218s ? github.com/theupdateframework/notary/server/errors [no test files] === RUN Test_changefeed --- PASS: Test_changefeed (0.00s) === RUN Test_checkChangefeedInputs -time="2020-04-29T15:37:23Z" level=error msg="500 GET unable to retrieve storage" -time="2020-04-29T15:37:23Z" level=error msg="400 GET invalid pageSize: not_a_number" +time="2021-06-01T22:04:30Z" level=error msg="500 GET unable to retrieve storage" +time="2021-06-01T22:04:30Z" level=error msg="400 GET invalid pageSize: not_a_number" --- PASS: Test_checkChangefeedInputs (0.00s) === RUN TestMainHandlerGet -time="2020-04-29T15:37:23Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:43649" http.request.id=44e0ca38-c03c-4398-9c38-4bdb9dbadc3b http.request.method=GET http.request.remoteaddr="127.0.0.1:60606" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.duration="65.776µs" http.response.status=200 http.response.written=2 ---- PASS: TestMainHandlerGet (0.04s) +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:42747" http.request.id=75bc8a36-884f-4f29-944c-6651d6b74366 http.request.method=GET http.request.remoteaddr="127.0.0.1:54236" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.duration="73.347µs" http.response.status=200 http.response.written=2 +--- PASS: TestMainHandlerGet (0.00s) === RUN TestMainHandlerNotGet -time="2020-04-29T15:37:23Z" level=info msg="generic not found: You have requested a resource that does not exist.: " go.version=go1.11.6 http.request.host="127.0.0.1:32901" http.request.id=74289a2c-fdbe-4105-88f2-ca99d019d67d http.request.method=HEAD http.request.remoteaddr="127.0.0.1:39950" http.request.uri=/ http.request.useragent=Go-http-client/1.1 -time="2020-04-29T15:37:23Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:32901" http.request.id=74289a2c-fdbe-4105-88f2-ca99d019d67d http.request.method=HEAD http.request.remoteaddr="127.0.0.1:39950" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="272.488µs" http.response.status=404 http.response.written=105 +time="2021-06-01T22:04:30Z" level=info msg="generic not found: You have requested a resource that does not exist.: " go.version=go1.11.6 http.request.host="127.0.0.1:32829" http.request.id=5b8d2aa9-5b9d-4d5a-b172-a6599251c4ad http.request.method=HEAD http.request.remoteaddr="127.0.0.1:60536" http.request.uri=/ http.request.useragent=Go-http-client/1.1 +time="2021-06-01T22:04:30Z" level=info msg="response completed" go.version=go1.11.6 http.request.host="127.0.0.1:32829" http.request.id=5b8d2aa9-5b9d-4d5a-b172-a6599251c4ad http.request.method=HEAD http.request.remoteaddr="127.0.0.1:60536" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="181.676µs" http.response.status=404 http.response.written=105 --- PASS: TestMainHandlerNotGet (0.00s) === RUN TestKeyHandlersInvalidConfiguration -time="2020-04-29T15:37:23Z" level=error msg="500 GET key algorithm not configured" go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=error msg="500 GET key algorithm not configured" go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=error msg="500 GET storage not configured" go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=error msg="500 GET storage not configured" go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=error msg="500 GET crypto service not configured" go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=error msg="500 GET crypto service not configured" go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=error msg="500 POST key algorithm not configured" go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=error msg="500 POST key algorithm not configured" go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=error msg="500 POST storage not configured" go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=error msg="500 POST storage not configured" go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=error msg="500 POST crypto service not configured" go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=error msg="500 POST crypto service not configured" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=error msg="500 GET crypto service not configured" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=error msg="500 GET crypto service not configured" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=error msg="500 GET key algorithm not configured" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=error msg="500 GET key algorithm not configured" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=error msg="500 GET storage not configured" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=error msg="500 GET storage not configured" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=error msg="500 POST storage not configured" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=error msg="500 POST storage not configured" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=error msg="500 POST crypto service not configured" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=error msg="500 POST crypto service not configured" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=error msg="500 POST key algorithm not configured" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=error msg="500 POST key algorithm not configured" go.version=go1.11.6 gun=gun --- PASS: TestKeyHandlersInvalidConfiguration (0.00s) === RUN TestKeyHandlersNoRoleOrRepo -time="2020-04-29T15:37:23Z" level=info msg="400 GET no gun in request" =gun go.version=go1.11.6 -time="2020-04-29T15:37:23Z" level=info msg="400 GET no gun in request" =gun go.version=go1.11.6 -time="2020-04-29T15:37:23Z" level=info msg="400 GET no role in request" go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=info msg="400 GET no role in request" go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=info msg="400 POST no gun in request" =gun go.version=go1.11.6 -time="2020-04-29T15:37:23Z" level=info msg="400 POST no gun in request" =gun go.version=go1.11.6 -time="2020-04-29T15:37:23Z" level=info msg="400 POST no role in request" go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=info msg="400 POST no role in request" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=info msg="400 GET no gun in request" =gun go.version=go1.11.6 +time="2021-06-01T22:04:30Z" level=info msg="400 GET no gun in request" =gun go.version=go1.11.6 +time="2021-06-01T22:04:30Z" level=info msg="400 GET no role in request" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=info msg="400 GET no role in request" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=info msg="400 POST no gun in request" =gun go.version=go1.11.6 +time="2021-06-01T22:04:30Z" level=info msg="400 POST no gun in request" =gun go.version=go1.11.6 +time="2021-06-01T22:04:30Z" level=info msg="400 POST no role in request" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=info msg="400 POST no role in request" go.version=go1.11.6 gun=gun --- PASS: TestKeyHandlersNoRoleOrRepo (0.00s) === RUN TestKeyHandlersInvalidRole -time="2020-04-29T15:37:23Z" level=info msg="400 GET root key: " go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=info msg="400 GET targets key: " go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=info msg="400 GET targets/a key: " go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=info msg="400 GET invalidrole key: " go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=info msg="400 POST root key: " go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=info msg="400 POST targets key: " go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=info msg="400 POST targets/a key: " go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=info msg="400 POST invalidrole key: " go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=info msg="400 GET root key: " go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=info msg="400 GET targets key: " go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=info msg="400 GET targets/a key: " go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=info msg="400 GET invalidrole key: " go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=info msg="400 POST root key: " go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=info msg="400 POST targets key: " go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=info msg="400 POST targets/a key: " go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=info msg="400 POST invalidrole key: " go.version=go1.11.6 gun=gun --- PASS: TestKeyHandlersInvalidRole (0.00s) === RUN TestGetKeyHandlerCreatesOnce --- PASS: TestGetKeyHandlerCreatesOnce (0.00s) === RUN TestKeyHandlersInvalidKeyAlgo -time="2020-04-29T15:37:23Z" level=error msg="500 GET timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=error msg="500 GET snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=error msg="500 POST timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.11.6 gun=gun -time="2020-04-29T15:37:23Z" level=error msg="500 POST snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=error msg="500 GET timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=error msg="500 GET snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=error msg="500 POST timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=error msg="500 POST snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.11.6 gun=gun --- PASS: TestKeyHandlersInvalidKeyAlgo (0.00s) === RUN TestRotateKeyHandlerSuccessfulRotation --- PASS: TestRotateKeyHandlerSuccessfulRotation (0.00s) === RUN TestGetHandlerRoot -time="2020-04-29T15:37:23Z" level=info msg="404 GET root role" go.version=go1.11.6 gun=gun ---- PASS: TestGetHandlerRoot (0.04s) +time="2021-06-01T22:04:30Z" level=info msg="404 GET root role" go.version=go1.11.6 gun=gun +--- PASS: TestGetHandlerRoot (0.02s) === RUN TestGetHandlerTimestamp ---- PASS: TestGetHandlerTimestamp (0.05s) +--- PASS: TestGetHandlerTimestamp (0.02s) === RUN TestGetHandlerSnapshot ---- PASS: TestGetHandlerSnapshot (0.04s) +--- PASS: TestGetHandlerSnapshot (0.02s) === RUN TestGetHandler404 -time="2020-04-29T15:37:23Z" level=info msg="404 GET root role" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=info msg="404 GET root role" go.version=go1.11.6 gun=gun --- PASS: TestGetHandler404 (0.00s) === RUN TestGetHandlerNilData -time="2020-04-29T15:37:23Z" level=info msg="404 GET root role" go.version=go1.11.6 gun=gun +time="2021-06-01T22:04:30Z" level=info msg="404 GET root role" go.version=go1.11.6 gun=gun --- PASS: TestGetHandlerNilData (0.00s) === RUN TestGetHandlerNoStorage -time="2020-04-29T15:37:23Z" level=error msg="500 GET: no storage exists" =gun go.version=go1.11.6 +time="2021-06-01T22:04:30Z" level=error msg="500 GET: no storage exists" =gun go.version=go1.11.6 --- PASS: TestGetHandlerNoStorage (0.00s) === RUN TestAtomicUpdateValidationFailurePropagated ---- PASS: TestAtomicUpdateValidationFailurePropagated (0.08s) +--- PASS: TestAtomicUpdateValidationFailurePropagated (0.05s) === RUN TestAtomicUpdateNonValidationFailureNotPropagated -time="2020-04-29T15:37:23Z" level=info msg="400 POST error validating update" go.version=go1.11.6 testGUN=gun +time="2021-06-01T22:04:30Z" level=info msg="400 POST error validating update" go.version=go1.11.6 testGUN=gun --- PASS: TestAtomicUpdateNonValidationFailureNotPropagated (0.04s) === RUN TestAtomicUpdateVersionErrorPropagated -time="2020-04-29T15:37:23Z" level=info msg="400 POST old version error" go.version=go1.11.6 testGUN=gun +time="2021-06-01T22:04:30Z" level=info msg="400 POST old version error" go.version=go1.11.6 testGUN=gun --- PASS: TestAtomicUpdateVersionErrorPropagated (0.06s) === RUN TestGetMaybeServerSignedNoCrypto --- PASS: TestGetMaybeServerSignedNoCrypto (0.00s) === RUN TestGetMaybeServerSignedNoKey --- PASS: TestGetMaybeServerSignedNoKey (0.00s) === RUN TestValidateEmptyNew ---- PASS: TestValidateEmptyNew (0.07s) +--- PASS: TestValidateEmptyNew (0.06s) === RUN TestValidateRootCanContainOnlyx509KeysWithRightGun ---- PASS: TestValidateRootCanContainOnlyx509KeysWithRightGun (0.09s) +--- PASS: TestValidateRootCanContainOnlyx509KeysWithRightGun (0.07s) === RUN TestValidatePrevTimestamp ---- PASS: TestValidatePrevTimestamp (0.06s) +--- PASS: TestValidatePrevTimestamp (0.04s) === RUN TestValidatePreviousTimestampCorrupt -time="2020-04-29T15:37:24Z" level=error msg="Failed to unmarshal existing timestamp for GUN docker.com/notary" ---- PASS: TestValidatePreviousTimestampCorrupt (0.05s) +time="2021-06-01T22:04:31Z" level=error msg="Failed to unmarshal existing timestamp for GUN docker.com/notary" +--- PASS: TestValidatePreviousTimestampCorrupt (0.04s) === RUN TestValidateGetCurrentTimestampBroken ---- PASS: TestValidateGetCurrentTimestampBroken (0.06s) +--- PASS: TestValidateGetCurrentTimestampBroken (0.05s) === RUN TestValidateNoNewRoot --- PASS: TestValidateNoNewRoot (0.06s) === RUN TestValidateNoNewTargets ---- PASS: TestValidateNoNewTargets (0.05s) +--- PASS: TestValidateNoNewTargets (0.03s) === RUN TestValidateOnlySnapshot ---- PASS: TestValidateOnlySnapshot (0.05s) +--- PASS: TestValidateOnlySnapshot (0.03s) === RUN TestValidateOldRoot ---- PASS: TestValidateOldRoot (0.07s) +--- PASS: TestValidateOldRoot (0.03s) === RUN TestValidateOldRootCorrupt ---- PASS: TestValidateOldRootCorrupt (0.04s) +--- PASS: TestValidateOldRootCorrupt (0.02s) === RUN TestValidateOldRootCorruptRootRole ---- PASS: TestValidateOldRootCorruptRootRole (0.04s) +--- PASS: TestValidateOldRootCorruptRootRole (0.02s) === RUN TestValidateRootGetCurrentRootBroken ---- PASS: TestValidateRootGetCurrentRootBroken (0.04s) +--- PASS: TestValidateRootGetCurrentRootBroken (0.02s) === RUN TestValidateRootRotationWithOldSigs ---- PASS: TestValidateRootRotationWithOldSigs (0.18s) +--- PASS: TestValidateRootRotationWithOldSigs (0.09s) === RUN TestValidateRootRotationMultipleKeysThreshold1 ---- PASS: TestValidateRootRotationMultipleKeysThreshold1 (0.12s) +--- PASS: TestValidateRootRotationMultipleKeysThreshold1 (0.07s) === RUN TestRootRotationNotSignedWithOldKeysForOldRole ---- PASS: TestRootRotationNotSignedWithOldKeysForOldRole (0.17s) +--- PASS: TestRootRotationNotSignedWithOldKeysForOldRole (0.14s) === RUN TestRootRotationVersionIncrement ---- PASS: TestRootRotationVersionIncrement (0.11s) +--- PASS: TestRootRotationVersionIncrement (0.05s) === RUN TestValidateNoRoot ---- PASS: TestValidateNoRoot (0.04s) +--- PASS: TestValidateNoRoot (0.02s) === RUN TestValidateSnapshotMissingNoSnapshotKey ---- PASS: TestValidateSnapshotMissingNoSnapshotKey (0.05s) +--- PASS: TestValidateSnapshotMissingNoSnapshotKey (0.03s) === RUN TestValidateSnapshotGenerateNoPrev ---- PASS: TestValidateSnapshotGenerateNoPrev (0.07s) +--- PASS: TestValidateSnapshotGenerateNoPrev (0.04s) === RUN TestValidateSnapshotGenerateWithPrev ---- PASS: TestValidateSnapshotGenerateWithPrev (0.09s) +--- PASS: TestValidateSnapshotGenerateWithPrev (0.04s) === RUN TestValidateSnapshotGeneratePrevCorrupt -time="2020-04-29T15:37:25Z" level=error msg="Failed to unmarshal existing snapshot for GUN docker.com/notary" ---- PASS: TestValidateSnapshotGeneratePrevCorrupt (0.11s) +time="2021-06-01T22:04:31Z" level=error msg="Failed to unmarshal existing snapshot for GUN docker.com/notary" +--- PASS: TestValidateSnapshotGeneratePrevCorrupt (0.03s) === RUN TestValidateSnapshotGenerateStoreGetCurrentSnapshotBroken ---- PASS: TestValidateSnapshotGenerateStoreGetCurrentSnapshotBroken (0.06s) +--- PASS: TestValidateSnapshotGenerateStoreGetCurrentSnapshotBroken (0.03s) === RUN TestValidateSnapshotGenerateNoTargets ---- PASS: TestValidateSnapshotGenerateNoTargets (0.06s) +--- PASS: TestValidateSnapshotGenerateNoTargets (0.03s) === RUN TestValidateSnapshotGenerate ---- PASS: TestValidateSnapshotGenerate (0.07s) +--- PASS: TestValidateSnapshotGenerate (0.04s) === RUN TestValidateRootNoTimestampKey ---- PASS: TestValidateRootNoTimestampKey (0.05s) +--- PASS: TestValidateRootNoTimestampKey (0.02s) === RUN TestValidateRootInvalidTimestampKey ---- PASS: TestValidateRootInvalidTimestampKey (0.10s) +--- PASS: TestValidateRootInvalidTimestampKey (0.02s) === RUN TestValidateRootInvalidTimestampThreshold ---- PASS: TestValidateRootInvalidTimestampThreshold (0.06s) +--- PASS: TestValidateRootInvalidTimestampThreshold (0.03s) === RUN TestValidateRootInvalidZeroThreshold ---- PASS: TestValidateRootInvalidZeroThreshold (0.20s) +--- PASS: TestValidateRootInvalidZeroThreshold (0.12s) === RUN TestValidateRootRoleMissing ---- PASS: TestValidateRootRoleMissing (0.04s) +--- PASS: TestValidateRootRoleMissing (0.02s) === RUN TestValidateTargetsRoleMissing ---- PASS: TestValidateTargetsRoleMissing (0.04s) +--- PASS: TestValidateTargetsRoleMissing (0.02s) === RUN TestValidateSnapshotRoleMissing ---- PASS: TestValidateSnapshotRoleMissing (0.04s) +--- PASS: TestValidateSnapshotRoleMissing (0.02s) === RUN TestValidateRootSigMissing ---- PASS: TestValidateRootSigMissing (0.04s) +--- PASS: TestValidateRootSigMissing (0.03s) === RUN TestValidateTargetsSigMissing -time="2020-04-29T15:37:26Z" level=error msg="ErrBadTargets: tuf: data has no signatures" ---- PASS: TestValidateTargetsSigMissing (0.05s) +time="2021-06-01T22:04:32Z" level=error msg="ErrBadTargets: tuf: data has no signatures" +--- PASS: TestValidateTargetsSigMissing (0.02s) === RUN TestValidateSnapshotSigMissing ---- PASS: TestValidateSnapshotSigMissing (0.10s) +--- PASS: TestValidateSnapshotSigMissing (0.03s) === RUN TestValidateRootCorrupt ---- PASS: TestValidateRootCorrupt (0.07s) +--- PASS: TestValidateRootCorrupt (0.02s) === RUN TestValidateTargetsCorrupt -time="2020-04-29T15:37:26Z" level=error msg="ErrBadTargets: invalid character '\\u0084' looking for beginning of value" ---- PASS: TestValidateTargetsCorrupt (0.08s) +time="2021-06-01T22:04:32Z" level=error msg="ErrBadTargets: invalid character '\\u0084' looking for beginning of value" +--- PASS: TestValidateTargetsCorrupt (0.03s) === RUN TestValidateSnapshotCorrupt ---- PASS: TestValidateSnapshotCorrupt (0.07s) +--- PASS: TestValidateSnapshotCorrupt (0.03s) === RUN TestValidateRootModifiedSize ---- PASS: TestValidateRootModifiedSize (0.05s) +--- PASS: TestValidateRootModifiedSize (0.02s) === RUN TestValidateTargetsModifiedSize ---- PASS: TestValidateTargetsModifiedSize (0.09s) +--- PASS: TestValidateTargetsModifiedSize (0.03s) === RUN TestValidateRootModifiedHash ---- PASS: TestValidateRootModifiedHash (0.07s) +--- PASS: TestValidateRootModifiedHash (0.03s) === RUN TestValidateTargetsModifiedHash ---- PASS: TestValidateTargetsModifiedHash (0.06s) +--- PASS: TestValidateTargetsModifiedHash (0.03s) === RUN TestGenerateSnapshotRootNotLoaded --- PASS: TestGenerateSnapshotRootNotLoaded (0.00s) === RUN TestGenerateSnapshotNoKey ---- PASS: TestGenerateSnapshotNoKey (0.07s) +--- PASS: TestGenerateSnapshotNoKey (0.02s) === RUN TestLoadTargetsLoadsNothingIfNoUpdates ---- PASS: TestLoadTargetsLoadsNothingIfNoUpdates (0.06s) +--- PASS: TestLoadTargetsLoadsNothingIfNoUpdates (0.02s) === RUN TestValidateTargetsRequiresStoredParent -time="2020-04-29T15:37:27Z" level=error msg="ErrBadTargets: targets must be loaded first" ---- PASS: TestValidateTargetsRequiresStoredParent (0.07s) +time="2021-06-01T22:04:32Z" level=error msg="ErrBadTargets: targets must be loaded first" +--- PASS: TestValidateTargetsRequiresStoredParent (0.03s) === RUN TestValidateTargetsParentInUpdate -time="2020-04-29T15:37:27Z" level=error msg="ErrBadTargets: invalid character 'I' looking for beginning of value" ---- PASS: TestValidateTargetsParentInUpdate (0.13s) +time="2021-06-01T22:04:32Z" level=error msg="ErrBadTargets: invalid character 'I' looking for beginning of value" +--- PASS: TestValidateTargetsParentInUpdate (0.03s) === RUN TestValidateTargetsRoleNotInParent -time="2020-04-29T15:37:27Z" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist" -time="2020-04-29T15:37:27Z" level=error msg="ErrBadTargets: targets has already been loaded" -time="2020-04-29T15:37:27Z" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist" ---- PASS: TestValidateTargetsRoleNotInParent (0.11s) +time="2021-06-01T22:04:32Z" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist" +time="2021-06-01T22:04:32Z" level=error msg="ErrBadTargets: targets has already been loaded" +time="2021-06-01T22:04:32Z" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist" +--- PASS: TestValidateTargetsRoleNotInParent (0.04s) PASS -ok github.com/theupdateframework/notary/server/handlers 3.871s +ok github.com/theupdateframework/notary/server/handlers 1.944s === RUN TestSnapshotExpired --- PASS: TestSnapshotExpired (0.00s) === RUN TestSnapshotNotExpired @@ -2737,17 +2749,17 @@ === RUN TestGetSnapshotKeyCreate --- PASS: TestGetSnapshotKeyCreate (0.00s) === RUN TestGetSnapshotKeyCreateWithFailingStore -time="2020-04-29T15:37:23Z" level=error msg="Error when retrieving root role for GUN gun: failing store failed" +time="2021-06-01T22:04:29Z" level=error msg="Error when retrieving root role for GUN gun: failing store failed" --- PASS: TestGetSnapshotKeyCreateWithFailingStore (0.00s) === RUN TestGetSnapshotKeyCreateWithCorruptedStore -time="2020-04-29T15:37:23Z" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve snapshot key ID" +time="2021-06-01T22:04:29Z" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve snapshot key ID" --- PASS: TestGetSnapshotKeyCreateWithCorruptedStore (0.00s) === RUN TestGetSnapshotKeyCreateWithInvalidAlgo --- PASS: TestGetSnapshotKeyCreateWithInvalidAlgo (0.00s) === RUN TestGetSnapshotKeyExistingMetadata --- PASS: TestGetSnapshotKeyExistingMetadata (0.02s) === RUN TestGetSnapshotNoPreviousSnapshot -time="2020-04-29T15:37:23Z" level=error msg="Failed to unmarshal existing snapshot for GUN gun" +time="2021-06-01T22:04:30Z" level=error msg="Failed to unmarshal existing snapshot for GUN gun" --- PASS: TestGetSnapshotNoPreviousSnapshot (0.02s) === RUN TestGetSnapshotReturnsPreviousSnapshotIfUnexpired --- PASS: TestGetSnapshotReturnsPreviousSnapshotIfUnexpired (0.02s) @@ -2758,7 +2770,7 @@ === RUN TestCreateSnapshotNoKeyInCrypto --- PASS: TestCreateSnapshotNoKeyInCrypto (0.03s) PASS -ok github.com/theupdateframework/notary/server/snapshot 0.153s +ok github.com/theupdateframework/notary/server/snapshot 0.138s === RUN TestMemoryUpdateCurrentEmpty --- PASS: TestMemoryUpdateCurrentEmpty (0.00s) === RUN TestMemoryUpdateCurrentVersionCheckOldVersionExists @@ -2784,77 +2796,77 @@ === RUN TestRDBTUFFileJSONUnmarshallingFailure --- PASS: TestRDBTUFFileJSONUnmarshallingFailure (0.00s) === RUN TestSQLUpdateCurrentEmpty ---- PASS: TestSQLUpdateCurrentEmpty (0.37s) +--- PASS: TestSQLUpdateCurrentEmpty (0.17s) === RUN TestSQLUpdateCurrentVersionCheckOldVersionExists ---- PASS: TestSQLUpdateCurrentVersionCheckOldVersionExists (0.34s) +--- PASS: TestSQLUpdateCurrentVersionCheckOldVersionExists (0.08s) === RUN TestSQLUpdateCurrentVersionCheckOldVersionNotExist ---- PASS: TestSQLUpdateCurrentVersionCheckOldVersionNotExist (0.28s) +--- PASS: TestSQLUpdateCurrentVersionCheckOldVersionNotExist (0.08s) === RUN TestSQLUpdateManyNoConflicts ---- PASS: TestSQLUpdateManyNoConflicts (0.28s) +--- PASS: TestSQLUpdateManyNoConflicts (0.09s) === RUN TestSQLUpdateManyConflictRollback ---- PASS: TestSQLUpdateManyConflictRollback (0.14s) +--- PASS: TestSQLUpdateManyConflictRollback (0.08s) === RUN TestSQLDelete ---- PASS: TestSQLDelete (0.22s) +--- PASS: TestSQLDelete (0.10s) === RUN TestSQLDBCheckHealthTableMissing ---- PASS: TestSQLDBCheckHealthTableMissing (0.10s) +--- PASS: TestSQLDBCheckHealthTableMissing (0.04s) === RUN TestSQLDBCheckHealthDBConnectionFail ---- PASS: TestSQLDBCheckHealthDBConnectionFail (0.13s) +--- PASS: TestSQLDBCheckHealthDBConnectionFail (0.06s) === RUN TestSQLDBCheckHealthSucceeds ---- PASS: TestSQLDBCheckHealthSucceeds (0.27s) +--- PASS: TestSQLDBCheckHealthSucceeds (0.04s) === RUN TestSQLDBGetChecksum ---- PASS: TestSQLDBGetChecksum (0.13s) +--- PASS: TestSQLDBGetChecksum (0.07s) === RUN TestSQLDBGetChecksumNotFound ---- PASS: TestSQLDBGetChecksumNotFound (0.05s) +--- PASS: TestSQLDBGetChecksumNotFound (0.03s) === RUN TestSQLTUFMetaStoreGetCurrent ---- PASS: TestSQLTUFMetaStoreGetCurrent (0.18s) +--- PASS: TestSQLTUFMetaStoreGetCurrent (0.13s) === RUN TestSQLGetChanges ---- PASS: TestSQLGetChanges (0.17s) +--- PASS: TestSQLGetChanges (0.14s) === RUN TestSQLDBGetVersion --- PASS: TestSQLDBGetVersion (0.06s) PASS -ok github.com/theupdateframework/notary/server/storage 2.746s +ok github.com/theupdateframework/notary/server/storage 1.190s === RUN TestTimestampExpired --- PASS: TestTimestampExpired (0.00s) === RUN TestTimestampNotExpired --- PASS: TestTimestampNotExpired (0.00s) === RUN TestGetTimestampKey ---- PASS: TestGetTimestampKey (0.01s) +--- PASS: TestGetTimestampKey (0.00s) === RUN TestGetTimestampNoPreviousTimestamp -time="2020-04-29T15:37:23Z" level=error msg="Failed to unmarshal existing timestamp" ---- PASS: TestGetTimestampNoPreviousTimestamp (0.06s) +time="2021-06-01T22:04:30Z" level=error msg="Failed to unmarshal existing timestamp" +--- PASS: TestGetTimestampNoPreviousTimestamp (0.03s) === RUN TestGetTimestampReturnsPreviousTimestampIfUnexpired ---- PASS: TestGetTimestampReturnsPreviousTimestampIfUnexpired (0.05s) +--- PASS: TestGetTimestampReturnsPreviousTimestampIfUnexpired (0.03s) === RUN TestGetTimestampOldTimestampExpired ---- PASS: TestGetTimestampOldTimestampExpired (0.07s) +--- PASS: TestGetTimestampOldTimestampExpired (0.04s) === RUN TestCannotMakeNewTimestampIfNoRootOrSnapshot -time="2020-04-29T15:37:23Z" level=error msg="Failed to create a new timestamp" -time="2020-04-29T15:37:23Z" level=error msg="Failed to create a new timestamp" ---- PASS: TestCannotMakeNewTimestampIfNoRootOrSnapshot (0.05s) +time="2021-06-01T22:04:30Z" level=error msg="Failed to create a new timestamp" +time="2021-06-01T22:04:30Z" level=error msg="Failed to create a new timestamp" +--- PASS: TestCannotMakeNewTimestampIfNoRootOrSnapshot (0.04s) === RUN TestCreateTimestampNoKeyInCrypto -time="2020-04-29T15:37:23Z" level=error msg="Failed to create a new timestamp" +time="2021-06-01T22:04:30Z" level=error msg="Failed to create a new timestamp" --- PASS: TestCreateTimestampNoKeyInCrypto (0.05s) === RUN TestGetTimestampKeyCreateWithFailingStore -time="2020-04-29T15:37:23Z" level=error msg="Error when retrieving root role for GUN gun: failing store failed" +time="2021-06-01T22:04:30Z" level=error msg="Error when retrieving root role for GUN gun: failing store failed" --- PASS: TestGetTimestampKeyCreateWithFailingStore (0.00s) === RUN TestGetTimestampKeyCreateWithCorruptedStore -time="2020-04-29T15:37:23Z" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve timestamp key ID" +time="2021-06-01T22:04:30Z" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve timestamp key ID" --- PASS: TestGetTimestampKeyCreateWithCorruptedStore (0.00s) === RUN TestGetTimestampKeyCreateWithInvalidAlgo --- PASS: TestGetTimestampKeyCreateWithInvalidAlgo (0.00s) === RUN TestGetTimestampKeyExistingMetadata --- PASS: TestGetTimestampKeyExistingMetadata (0.02s) PASS -ok github.com/theupdateframework/notary/server/timestamp 0.335s +ok github.com/theupdateframework/notary/server/timestamp 0.226s === RUN TestHealthCheckKMUnhealthy ---- PASS: TestHealthCheckKMUnhealthy (0.01s) +--- PASS: TestHealthCheckKMUnhealthy (0.00s) === RUN TestHealthCheckSignerUnhealthy ---- PASS: TestHealthCheckSignerUnhealthy (0.02s) +--- PASS: TestHealthCheckSignerUnhealthy (0.00s) === RUN TestHealthCheckKMTimeout --- PASS: TestHealthCheckKMTimeout (0.00s) === RUN TestHealthCheckSignerTimeout --- PASS: TestHealthCheckSignerTimeout (0.00s) === RUN TestHealthCheckKMHealthy ---- PASS: TestHealthCheckKMHealthy (0.02s) +--- PASS: TestHealthCheckKMHealthy (0.00s) === RUN TestHealthCheckSignerHealthy --- PASS: TestHealthCheckSignerHealthy (0.00s) === RUN TestHealthCheckKMConnectionDied @@ -2862,33 +2874,33 @@ === RUN TestHealthCheckSignerConnectionDied --- PASS: TestHealthCheckSignerConnectionDied (0.00s) === RUN TestHealthCheckForOverallStatus ---- PASS: TestHealthCheckForOverallStatus (0.00s) +--- PASS: TestHealthCheckForOverallStatus (0.01s) === RUN TestHealthCheckNonexistentService --- PASS: TestHealthCheckNonexistentService (0.00s) === RUN TestGetPrivateKeyAndSignWithExistingKey -time="2020-04-29T15:37:25Z" level=info msg="Sign: Signed message! with KeyID 91d78164967ab9f1c4abed7501f0da15d6f3b0181948b49c2b347d34fba03568" go.version=go1.11.6 ---- PASS: TestGetPrivateKeyAndSignWithExistingKey (0.03s) +time="2021-06-01T22:04:30Z" level=info msg="Sign: Signed message! with KeyID 8cabff9a348a4b6a9903dca13ce0db679a486158975142419402bece288e0437" go.version=go1.11.6 +--- PASS: TestGetPrivateKeyAndSignWithExistingKey (0.01s) === RUN TestCannotSignWithKeyThatDoesntExist -time="2020-04-29T15:37:25Z" level=error msg="Sign: key 4a7b8d13978191a3dae1b93ef02041f25e867dd7ea94ff8ebd2862043c06bd24 not found" go.version=go1.11.6 ---- PASS: TestCannotSignWithKeyThatDoesntExist (0.01s) +time="2021-06-01T22:04:30Z" level=error msg="Sign: key 96b89d7157b58ee1d04ddb08e47b0e60ec281c0b3b5e11ba32c29598ad286828 not found" go.version=go1.11.6 +--- PASS: TestCannotSignWithKeyThatDoesntExist (0.00s) === RUN TestCryptoSignerInterfaceBehavior -time="2020-04-29T15:37:25Z" level=error msg="GetKeyInfo: key nonexistent not found" go.version=go1.11.6 -time="2020-04-29T15:37:25Z" level=error msg="GetKeyInfo: key nonexistent not found" go.version=go1.11.6 -time="2020-04-29T15:37:25Z" level=info msg="CreateKey: Created KeyID 32cb263d4f13115b4867b27cdf8657b7500425bd331c033db76d350721dab660" go.version=go1.11.6 -time="2020-04-29T15:37:25Z" level=info msg="CreateKey: Created KeyID 64dd0f3f35b8b73fa86f50a1baac7c74cf69baaf1dd880145ddbdb5741c43635" go.version=go1.11.6 -time="2020-04-29T15:37:25Z" level=error msg="GetKeyInfo: key 32cb263d4f13115b4867b27cdf8657b7500425bd331c033db76d350721dab660 not found" go.version=go1.11.6 -time="2020-04-29T15:37:25Z" level=error msg="GetKeyInfo: key 64dd0f3f35b8b73fa86f50a1baac7c74cf69baaf1dd880145ddbdb5741c43635 not found" go.version=go1.11.6 ---- PASS: TestCryptoSignerInterfaceBehavior (0.06s) +time="2021-06-01T22:04:30Z" level=error msg="GetKeyInfo: key nonexistent not found" go.version=go1.11.6 +time="2021-06-01T22:04:30Z" level=error msg="GetKeyInfo: key nonexistent not found" go.version=go1.11.6 +time="2021-06-01T22:04:30Z" level=info msg="CreateKey: Created KeyID 16150192988946d5691105e0fab15685711ef59884d13affe1de58375be7e074" go.version=go1.11.6 +time="2021-06-01T22:04:30Z" level=info msg="CreateKey: Created KeyID 17fd5a19e3e7f91d1b6ab7a7dba0f3302ce08be39a68ac8416da732244e1d458" go.version=go1.11.6 +time="2021-06-01T22:04:30Z" level=error msg="GetKeyInfo: key 16150192988946d5691105e0fab15685711ef59884d13affe1de58375be7e074 not found" go.version=go1.11.6 +time="2021-06-01T22:04:30Z" level=error msg="GetKeyInfo: key 17fd5a19e3e7f91d1b6ab7a7dba0f3302ce08be39a68ac8416da732244e1d458 not found" go.version=go1.11.6 +--- PASS: TestCryptoSignerInterfaceBehavior (0.01s) PASS -ok github.com/theupdateframework/notary/signer 0.194s +ok github.com/theupdateframework/notary/signer 0.053s ? github.com/theupdateframework/notary/signer/api [no test files] ? github.com/theupdateframework/notary/signer/client [no test files] === RUN TestGetSuccessPopulatesCache --- PASS: TestGetSuccessPopulatesCache (0.01s) === RUN TestAddKeyPopulatesCacheIfSuccessful ---- PASS: TestAddKeyPopulatesCacheIfSuccessful (0.02s) +--- PASS: TestAddKeyPopulatesCacheIfSuccessful (0.01s) === RUN TestDeleteKeyRemovesKeyFromCache ---- PASS: TestDeleteKeyRemovesKeyFromCache (0.01s) +--- PASS: TestDeleteKeyRemovesKeyFromCache (0.02s) === RUN TestRDBPrivateKeyJSONUnmarshalling --- PASS: TestRDBPrivateKeyJSONUnmarshalling (0.00s) === RUN TestRDBPrivateKeyJSONUnmarshallingFailure @@ -2897,30 +2909,30 @@ `nodb` is not officially supported, running under compatibility mode. --- PASS: TestNewSQLKeyDBStorePropagatesDBError (0.00s) === RUN TestSQLDBHealthCheckMissingTable ---- PASS: TestSQLDBHealthCheckMissingTable (0.13s) +--- PASS: TestSQLDBHealthCheckMissingTable (0.07s) === RUN TestSQLDBHealthCheckNoConnection ---- PASS: TestSQLDBHealthCheckNoConnection (0.06s) +--- PASS: TestSQLDBHealthCheckNoConnection (0.04s) === RUN TestSQLKeyCanOnlyBeAddedOnce (UNIQUE constraint failed: private_keys.key_id) -[2020-04-29 15:37:31]   ---- PASS: TestSQLKeyCanOnlyBeAddedOnce (0.29s) +[2021-06-01 22:04:32]   +--- PASS: TestSQLKeyCanOnlyBeAddedOnce (0.14s) === RUN TestSQLCreateDelete ---- PASS: TestSQLCreateDelete (0.64s) +--- PASS: TestSQLCreateDelete (0.18s) === RUN TestSQLKeyRotation ---- PASS: TestSQLKeyRotation (0.36s) +--- PASS: TestSQLKeyRotation (0.24s) === RUN TestSQLSigningMarksKeyActive -time="2020-04-29T15:37:33Z" level=error msg="Key 424e313487431f60af17384aaf18e02586937d76bc5f42120edcd1d3118f81f1 was just used to sign hash successful, db closed, error when trying to mark key as active: sql: database is closed" +time="2021-06-01T22:04:32Z" level=error msg="Key 93c510f9147947079ec286618b5f876ae284b6296320bb6f92331b06cc702f47 was just used to sign hash successful, db closed, error when trying to mark key as active: sql: database is closed" (sql: database is closed) -[2020-04-29 15:37:33]   ---- PASS: TestSQLSigningMarksKeyActive (0.53s) +[2021-06-01 22:04:32]   +--- PASS: TestSQLSigningMarksKeyActive (0.31s) === RUN TestSQLCreateKey ---- PASS: TestSQLCreateKey (0.40s) +--- PASS: TestSQLCreateKey (0.25s) === RUN TestSQLUnimplementedInterfaceBehavior ---- PASS: TestSQLUnimplementedInterfaceBehavior (0.12s) +--- PASS: TestSQLUnimplementedInterfaceBehavior (0.08s) PASS -ok github.com/theupdateframework/notary/signer/keydbstore 2.603s +ok github.com/theupdateframework/notary/signer/keydbstore 1.361s === RUN TestSet --- PASS: TestSet (0.00s) === RUN TestSetWithNoParentDirectory @@ -2952,13 +2964,13 @@ === RUN TestCreatePrivateDirectory --- PASS: TestCreatePrivateDirectory (0.00s) === RUN TestFileStoreConsistency ---- PASS: TestFileStoreConsistency (0.04s) +--- PASS: TestFileStoreConsistency (0.00s) === RUN TestHTTPStoreGetSized --- PASS: TestHTTPStoreGetSized (0.00s) === RUN TestHTTPStoreGetAllMeta --- PASS: TestHTTPStoreGetAllMeta (0.00s) === RUN TestSetSingleAndSetMultiMeta ---- PASS: TestSetSingleAndSetMultiMeta (0.00s) +--- PASS: TestSetSingleAndSetMultiMeta (0.01s) === RUN Test404Error --- PASS: Test404Error (0.00s) === RUN Test50XErrors @@ -2978,13 +2990,13 @@ === RUN TestHTTPStoreGetKey --- PASS: TestHTTPStoreGetKey (0.00s) === RUN TestHTTPStoreGetRotateKeySizeLimited ---- PASS: TestHTTPStoreGetRotateKeySizeLimited (0.01s) +--- PASS: TestHTTPStoreGetRotateKeySizeLimited (0.04s) === RUN TestHTTPOffline --- PASS: TestHTTPOffline (0.00s) === RUN TestErrServerUnavailable --- PASS: TestErrServerUnavailable (0.00s) === RUN TestNetworkError -time="2020-04-29T15:37:23Z" level=error msg="unescape network error message failed: invalid URL escape \"%GA\"" +time="2021-06-01T22:04:28Z" level=error msg="unescape network error message failed: invalid URL escape \"%GA\"" --- PASS: TestNetworkError (0.00s) === RUN TestMemoryStoreMetadataOperations --- PASS: TestMemoryStoreMetadataOperations (0.00s) @@ -2997,10 +3009,10 @@ === RUN TestMemoryStoreMetadata --- PASS: TestMemoryStoreMetadata (0.00s) PASS -ok github.com/theupdateframework/notary/storage 0.103s +ok github.com/theupdateframework/notary/storage 0.102s ? github.com/theupdateframework/notary/storage/rethinkdb [no test files] === RUN TestExportKeys ---- PASS: TestExportKeys (0.01s) +--- PASS: TestExportKeys (0.00s) === RUN TestExportKeysByGUN --- PASS: TestExportKeysByGUN (0.00s) === RUN TestExportKeysByID @@ -3010,9 +3022,9 @@ === RUN TestImportKeys --- PASS: TestImportKeys (0.00s) === RUN TestImportNoPath ---- PASS: TestImportNoPath (0.01s) +--- PASS: TestImportNoPath (0.02s) === RUN TestNonRootPathInference ---- PASS: TestNonRootPathInference (0.01s) +--- PASS: TestNonRootPathInference (0.02s) === RUN TestBlockHeaderPrecedenceRoleAndGun --- PASS: TestBlockHeaderPrecedenceRoleAndGun (0.01s) === RUN TestBlockHeaderPrecedenceGunFromPath @@ -3020,71 +3032,71 @@ === RUN TestImportKeys2InOneFile --- PASS: TestImportKeys2InOneFile (0.00s) === RUN TestImportKeys2InOneFileNoPath ---- PASS: TestImportKeys2InOneFileNoPath (0.02s) +--- PASS: TestImportKeys2InOneFileNoPath (0.03s) === RUN TestEncryptedKeyImportFail -time="2020-04-29T15:37:25Z" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header" +time="2021-06-01T22:04:28Z" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header" --- PASS: TestEncryptedKeyImportFail (0.01s) === RUN TestEncryptedKeyImportSuccess ---- PASS: TestEncryptedKeyImportSuccess (0.02s) +--- PASS: TestEncryptedKeyImportSuccess (0.03s) === RUN TestEncryption --- PASS: TestEncryption (0.02s) === RUN TestAddKey ---- PASS: TestAddKey (0.06s) +--- PASS: TestAddKey (0.07s) === RUN TestKeyStoreInternalState ---- PASS: TestKeyStoreInternalState (0.02s) +--- PASS: TestKeyStoreInternalState (0.03s) === RUN TestGet --- PASS: TestGet (0.01s) === RUN TestGetLegacyKey --- PASS: TestGetLegacyKey (0.00s) === RUN TestListKeys ---- PASS: TestListKeys (0.09s) +--- PASS: TestListKeys (0.06s) === RUN TestAddGetKeyMemStore --- PASS: TestAddGetKeyMemStore (0.01s) === RUN TestAddGetKeyInfoMemStore ---- PASS: TestAddGetKeyInfoMemStore (0.03s) +--- PASS: TestAddGetKeyInfoMemStore (0.04s) === RUN TestGetDecryptedWithTamperedCipherText -time="2020-04-29T15:37:25Z" level=error msg="PEM block is empty" ---- PASS: TestGetDecryptedWithTamperedCipherText (0.03s) +time="2021-06-01T22:04:29Z" level=error msg="PEM block is empty" +--- PASS: TestGetDecryptedWithTamperedCipherText (0.01s) === RUN TestGetDecryptedWithInvalidPassphrase ---- PASS: TestGetDecryptedWithInvalidPassphrase (0.09s) +--- PASS: TestGetDecryptedWithInvalidPassphrase (0.06s) === RUN TestGetDecryptedWithConsistentlyInvalidPassphrase ---- PASS: TestGetDecryptedWithConsistentlyInvalidPassphrase (0.08s) +--- PASS: TestGetDecryptedWithConsistentlyInvalidPassphrase (0.09s) === RUN TestRemoveKey ---- PASS: TestRemoveKey (0.06s) +--- PASS: TestRemoveKey (0.05s) === RUN TestKeysAreCached --- PASS: TestKeysAreCached (0.02s) PASS -ok github.com/theupdateframework/notary/trustmanager 0.654s +ok github.com/theupdateframework/notary/trustmanager 0.617s === RUN TestRemoteStore -time="2020-04-29T15:37:26Z" level=info msg="listing files from localhost:9888" -time="2020-04-29T15:37:26Z" level=info msg="listing files from localhost:9888" ---- PASS: TestRemoteStore (0.25s) +time="2021-06-01T22:04:30Z" level=info msg="listing files from localhost:9888" +time="2021-06-01T22:04:30Z" level=info msg="listing files from localhost:9888" +--- PASS: TestRemoteStore (0.12s) === RUN TestErrors -time="2020-04-29T15:37:26Z" level=error msg="failed to store: test error" ---- PASS: TestErrors (0.14s) +time="2021-06-01T22:04:30Z" level=error msg="failed to store: test error" +--- PASS: TestErrors (0.11s) === RUN TestNewGRPCStorage --- PASS: TestNewGRPCStorage (0.00s) === RUN TestGRPCStorage --- PASS: TestGRPCStorage (0.00s) PASS -ok github.com/theupdateframework/notary/trustmanager/remoteks 0.433s +ok github.com/theupdateframework/notary/trustmanager/remoteks 0.240s ? github.com/theupdateframework/notary/trustmanager/yubikey [no test files] === RUN TestWildcardMatch --- PASS: TestWildcardMatch (0.00s) === RUN TestValidateRoot -2020/04/29 15:37:30 [INFO] generate received request -2020/04/29 15:37:30 [INFO] received CSR -2020/04/29 15:37:30 [INFO] generating key: ecdsa-256 -2020/04/29 15:37:30 [INFO] encoded CSR -2020/04/29 15:37:30 [INFO] signed certificate with serial number 504671743814245908070808685775977452237008878415 -2020/04/29 15:37:30 [INFO] received CSR -2020/04/29 15:37:30 [INFO] generating key: ecdsa-256 -2020/04/29 15:37:30 [INFO] encoded CSR -2020/04/29 15:37:30 [INFO] signed certificate with serial number 72814538807713178294976319678144754079966768428 -2020/04/29 15:37:30 [INFO] received CSR -2020/04/29 15:37:30 [INFO] generating key: ecdsa-256 -2020/04/29 15:37:30 [INFO] encoded CSR -2020/04/29 15:37:30 [INFO] signed certificate with serial number 366221259130062839880816374682233455756234799351 +2021/06/01 22:04:30 [INFO] generate received request +2021/06/01 22:04:30 [INFO] received CSR +2021/06/01 22:04:30 [INFO] generating key: ecdsa-256 +2021/06/01 22:04:30 [INFO] encoded CSR +2021/06/01 22:04:30 [INFO] signed certificate with serial number 656657210860928066642396717232030869685422835154 +2021/06/01 22:04:30 [INFO] received CSR +2021/06/01 22:04:30 [INFO] generating key: ecdsa-256 +2021/06/01 22:04:30 [INFO] encoded CSR +2021/06/01 22:04:30 [INFO] signed certificate with serial number 377099573278547834015095846922384064773349098271 +2021/06/01 22:04:30 [INFO] received CSR +2021/06/01 22:04:30 [INFO] generating key: ecdsa-256 +2021/06/01 22:04:30 [INFO] encoded CSR +2021/06/01 22:04:30 [INFO] signed certificate with serial number 704835581030467194211628473055837918177445586680 --- PASS: TestValidateRoot (0.09s) === RUN TestValidateRootWithoutTOFUS --- PASS: TestValidateRootWithoutTOFUS (0.00s) @@ -3095,22 +3107,22 @@ === RUN TestValidateRootFailuresWithPinnedCert --- PASS: TestValidateRootFailuresWithPinnedCert (0.01s) === RUN TestValidateRootWithPinnedCA ---- PASS: TestValidateRootWithPinnedCA (0.09s) +--- PASS: TestValidateRootWithPinnedCA (0.21s) === RUN TestValidateSuccessfulRootRotation ---- PASS: TestValidateSuccessfulRootRotation (0.13s) +--- PASS: TestValidateSuccessfulRootRotation (0.17s) === RUN TestValidateRootRotationMissingOrigSig ---- PASS: TestValidateRootRotationMissingOrigSig (0.09s) +--- PASS: TestValidateRootRotationMissingOrigSig (0.10s) === RUN TestValidateRootRotationMissingNewSig --- PASS: TestValidateRootRotationMissingNewSig (0.09s) === RUN TestValidateRootRotationTrustPinning ---- PASS: TestValidateRootRotationTrustPinning (0.10s) +--- PASS: TestValidateRootRotationTrustPinning (0.11s) === RUN TestValidateRootRotationTrustPinningInvalidCA ---- PASS: TestValidateRootRotationTrustPinningInvalidCA (0.09s) +--- PASS: TestValidateRootRotationTrustPinningInvalidCA (0.08s) === RUN TestParsePEMPublicKey -time="2020-04-29T15:37:30Z" level=warning msg="certificate with CN notary is near expiry" +time="2021-06-01T22:04:30Z" level=warning msg="certificate with CN notary is near expiry" --- PASS: TestParsePEMPublicKey (0.02s) === RUN TestCheckingCertExpiry -time="2020-04-29T15:37:30Z" level=warning msg="certificate with CN notary is near expiry" +time="2021-06-01T22:04:30Z" level=warning msg="certificate with CN notary is near expiry" --- PASS: TestCheckingCertExpiry (0.02s) === RUN TestValidateRootWithExpiredIntermediate --- PASS: TestValidateRootWithExpiredIntermediate (0.02s) @@ -3119,7 +3131,7 @@ === RUN TestWildcardMatching --- PASS: TestWildcardMatching (0.00s) PASS -ok github.com/theupdateframework/notary/trustpinning 0.813s +ok github.com/theupdateframework/notary/trustpinning 0.984s === RUN TestInitSnapshotNoTargets --- PASS: TestInitSnapshotNoTargets (0.00s) === RUN TestInitRepo @@ -3127,11 +3139,11 @@ === RUN TestUpdateDelegations --- PASS: TestUpdateDelegations (0.00s) === RUN TestPurgeDelegationsKeyFromTop -time="2020-04-29T15:37:30Z" level=warning msg="role targets/sybil has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2020-04-29T15:37:30Z" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2021-06-01T22:04:30Z" level=warning msg="role targets/sybil has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2021-06-01T22:04:30Z" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it" --- PASS: TestPurgeDelegationsKeyFromTop (0.00s) === RUN TestPurgeDelegationsKeyFromDeep -time="2020-04-29T15:37:30Z" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2021-06-01T22:04:30Z" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it" --- PASS: TestPurgeDelegationsKeyFromDeep (0.00s) === RUN TestPurgeDelegationsKeyBadWildRole --- PASS: TestPurgeDelegationsKeyBadWildRole (0.00s) @@ -3144,7 +3156,7 @@ === RUN TestUpdateDelegationsRoleThatIsMissingDelegationKey --- PASS: TestUpdateDelegationsRoleThatIsMissingDelegationKey (0.00s) === RUN TestUpdateDelegationsNotEnoughKeys -time="2020-04-29T15:37:30Z" level=warning msg="role targets/role has fewer keys than its threshold of 2; it will not be usable until keys are added to it" +time="2021-06-01T22:04:30Z" level=warning msg="role targets/role has fewer keys than its threshold of 2; it will not be usable until keys are added to it" --- PASS: TestUpdateDelegationsNotEnoughKeys (0.00s) === RUN TestUpdateDelegationsAddKeyToRole --- PASS: TestUpdateDelegationsAddKeyToRole (0.00s) @@ -3211,41 +3223,41 @@ === RUN TestGetDelegationRoleKeyMissing --- PASS: TestGetDelegationRoleKeyMissing (0.00s) === RUN TestSignRootOldKeyCertExists ---- PASS: TestSignRootOldKeyCertExists (0.07s) +--- PASS: TestSignRootOldKeyCertExists (0.08s) === RUN TestSignRootOldKeyCertMissing --- PASS: TestSignRootOldKeyCertMissing (0.06s) === RUN TestRootKeyRotation ---- PASS: TestRootKeyRotation (0.21s) +--- PASS: TestRootKeyRotation (0.23s) === RUN TestBuilderLoadsValidRolesOnly --- PASS: TestBuilderLoadsValidRolesOnly (0.05s) === RUN TestBuilderOnlyAcceptsRootFirstWhenLoading ---- PASS: TestBuilderOnlyAcceptsRootFirstWhenLoading (0.00s) +--- PASS: TestBuilderOnlyAcceptsRootFirstWhenLoading (0.01s) === RUN TestBuilderOnlyAcceptsDelegationsAfterParent ---- PASS: TestBuilderOnlyAcceptsDelegationsAfterParent (0.01s) +--- PASS: TestBuilderOnlyAcceptsDelegationsAfterParent (0.02s) === RUN TestMarkingIsValid --- PASS: TestMarkingIsValid (0.02s) === RUN TestBuilderLoadInvalidDelegations ---- PASS: TestBuilderLoadInvalidDelegations (0.05s) +--- PASS: TestBuilderLoadInvalidDelegations (0.02s) === RUN TestBuilderLoadInvalidDelegationsOldVersion ---- PASS: TestBuilderLoadInvalidDelegationsOldVersion (0.04s) +--- PASS: TestBuilderLoadInvalidDelegationsOldVersion (0.03s) === RUN TestBuilderAcceptRoleOnce ---- PASS: TestBuilderAcceptRoleOnce (0.02s) +--- PASS: TestBuilderAcceptRoleOnce (0.01s) === RUN TestBuilderStopsAcceptingOrProducingDataOnceDone ---- PASS: TestBuilderStopsAcceptingOrProducingDataOnceDone (0.02s) +--- PASS: TestBuilderStopsAcceptingOrProducingDataOnceDone (0.01s) === RUN TestGenerateSnapshotInvalidOperations ---- PASS: TestGenerateSnapshotInvalidOperations (0.20s) +--- PASS: TestGenerateSnapshotInvalidOperations (0.13s) === RUN TestGenerateTimestampInvalidOperations ---- PASS: TestGenerateTimestampInvalidOperations (0.14s) +--- PASS: TestGenerateTimestampInvalidOperations (0.09s) === RUN TestGetConsistentInfo ---- PASS: TestGetConsistentInfo (0.05s) +--- PASS: TestGetConsistentInfo (0.02s) === RUN TestTimestampPreAndPostChecksumming ---- PASS: TestTimestampPreAndPostChecksumming (0.08s) +--- PASS: TestTimestampPreAndPostChecksumming (0.05s) === RUN TestSnapshotLoadedFirstChecksumsOthers --- PASS: TestSnapshotLoadedFirstChecksumsOthers (0.06s) === RUN TestSnapshotLoadedAfterChecksumsOthersRetroactively ---- PASS: TestSnapshotLoadedAfterChecksumsOthersRetroactively (0.18s) +--- PASS: TestSnapshotLoadedAfterChecksumsOthersRetroactively (0.10s) PASS -ok github.com/theupdateframework/notary/tuf 1.414s +ok github.com/theupdateframework/notary/tuf 1.131s === RUN TestMergeStrSlicesExclusive --- PASS: TestMergeStrSlicesExclusive (0.00s) === RUN TestMergeStrSlicesOverlap @@ -3297,7 +3309,7 @@ === RUN TestRootFromSignedValidatesRoleType --- PASS: TestRootFromSignedValidatesRoleType (0.00s) === RUN TestRootFromSignedValidatesVersion ---- PASS: TestRootFromSignedValidatesVersion (0.00s) +--- PASS: TestRootFromSignedValidatesVersion (0.01s) === RUN TestSnapshotToSignedMarshalsSignedPortionWithCanonicalJSON --- PASS: TestSnapshotToSignedMarshalsSignedPortionWithCanonicalJSON (0.00s) === RUN TestSnapshotToSignCopiesSignatures @@ -3319,7 +3331,7 @@ === RUN TestSnapshotFromSignedValidatesVersion --- PASS: TestSnapshotFromSignedValidatesVersion (0.00s) === RUN TestSnapshotGetMeta ---- PASS: TestSnapshotGetMeta (0.00s) +--- PASS: TestSnapshotGetMeta (0.01s) === RUN TestTargetsToSignedMarshalsSignedPortionWithCanonicalJSON --- PASS: TestTargetsToSignedMarshalsSignedPortionWithCanonicalJSON (0.00s) === RUN TestTargetsToSignCopiesSignatures @@ -3379,7 +3391,7 @@ === RUN TestFileMetaEquals --- PASS: TestFileMetaEquals (0.00s) PASS -ok github.com/theupdateframework/notary/tuf/data 0.040s +ok github.com/theupdateframework/notary/tuf/data 0.064s === RUN TestListKeys --- PASS: TestListKeys (0.00s) === RUN TestGetKeys @@ -3401,11 +3413,11 @@ === RUN TestSignMinSignatures --- PASS: TestSignMinSignatures (0.00s) === RUN TestSignFailingKeys ---- PASS: TestSignFailingKeys (0.00s) +--- PASS: TestSignFailingKeys (0.01s) === RUN TestErrInsufficientSignaturesMessaging --- PASS: TestErrInsufficientSignaturesMessaging (0.00s) === RUN TestRSAPSSVerifier ---- PASS: TestRSAPSSVerifier (0.02s) +--- PASS: TestRSAPSSVerifier (0.03s) === RUN TestRSAPSSx509Verifier --- PASS: TestRSAPSSx509Verifier (0.00s) === RUN TestRSAPSSVerifierWithInvalidKeyType @@ -3425,12 +3437,12 @@ === RUN TestRSAPKCS1v15VerifierWithInvalidKey --- PASS: TestRSAPKCS1v15VerifierWithInvalidKey (0.00s) === RUN TestRSAPKCS1v15VerifierWithInvalidSignature -time="2020-04-29T15:37:30Z" level=error msg="Failed verification: crypto/rsa: verification error" +time="2021-06-01T22:04:29Z" level=error msg="Failed verification: crypto/rsa: verification error" --- PASS: TestRSAPKCS1v15VerifierWithInvalidSignature (0.02s) === RUN TestECDSAVerifier --- PASS: TestECDSAVerifier (0.01s) === RUN TestECDSAVerifierOtherCurves ---- PASS: TestECDSAVerifierOtherCurves (0.56s) +--- PASS: TestECDSAVerifierOtherCurves (0.48s) === RUN TestECDSAx509Verifier --- PASS: TestECDSAx509Verifier (0.00s) === RUN TestECDSAVerifierWithInvalidKeyType @@ -3458,7 +3470,7 @@ === RUN TestIsValidNotExported --- PASS: TestIsValidNotExported (0.00s) === RUN TestMoreThanEnoughSigs ---- PASS: TestMoreThanEnoughSigs (0.00s) +--- PASS: TestMoreThanEnoughSigs (0.01s) === RUN TestValidSigWithIncorrectKeyID --- PASS: TestValidSigWithIncorrectKeyID (0.00s) === RUN TestDuplicateSigs @@ -3468,32 +3480,32 @@ === RUN TestVerifyVersion --- PASS: TestVerifyVersion (0.00s) === RUN TestVerifyExpiry -time="2020-04-29T15:37:30Z" level=error msg="Metadata for root expired" +time="2021-06-01T22:04:29Z" level=error msg="Metadata for root expired" --- PASS: TestVerifyExpiry (0.00s) === RUN TestVerifyPublicKeyMatchesPrivateKeyHappyCase --- PASS: TestVerifyPublicKeyMatchesPrivateKeyHappyCase (0.00s) === RUN TestVerifyPublicKeyMatchesPrivateKeyFails --- PASS: TestVerifyPublicKeyMatchesPrivateKeyFails (0.00s) PASS -ok github.com/theupdateframework/notary/tuf/signed 0.790s +ok github.com/theupdateframework/notary/tuf/signed 0.739s === RUN TestNewSwizzler ---- PASS: TestNewSwizzler (0.06s) +--- PASS: TestNewSwizzler (0.05s) === RUN TestSwizzlerSetInvalidJSON ---- PASS: TestSwizzlerSetInvalidJSON (0.07s) +--- PASS: TestSwizzlerSetInvalidJSON (0.05s) === RUN TestSwizzlerAddExtraSpace --- PASS: TestSwizzlerAddExtraSpace (0.05s) === RUN TestSwizzlerSetInvalidSigned --- PASS: TestSwizzlerSetInvalidSigned (0.05s) === RUN TestSwizzlerSetInvalidSignedMeta ---- PASS: TestSwizzlerSetInvalidSignedMeta (0.06s) +--- PASS: TestSwizzlerSetInvalidSignedMeta (0.05s) === RUN TestSwizzlerSetInvalidMetadataType --- PASS: TestSwizzlerSetInvalidMetadataType (0.05s) === RUN TestSwizzlerInvalidateMetadataSignatures ---- PASS: TestSwizzlerInvalidateMetadataSignatures (0.05s) +--- PASS: TestSwizzlerInvalidateMetadataSignatures (0.03s) === RUN TestSwizzlerRemoveMetadata ---- PASS: TestSwizzlerRemoveMetadata (0.06s) +--- PASS: TestSwizzlerRemoveMetadata (0.04s) === RUN TestSwizzlerSignMetadataWithInvalidKey ---- PASS: TestSwizzlerSignMetadataWithInvalidKey (0.06s) +--- PASS: TestSwizzlerSignMetadataWithInvalidKey (0.05s) === RUN TestSwizzlerOffsetMetadataVersion --- PASS: TestSwizzlerOffsetMetadataVersion (0.06s) === RUN TestSwizzlerExpireMetadata @@ -3503,35 +3515,35 @@ === RUN TestSwizzlerSetThresholdDelegatedRole --- PASS: TestSwizzlerSetThresholdDelegatedRole (0.05s) === RUN TestSwizzlerChangeRootKey ---- PASS: TestSwizzlerChangeRootKey (0.05s) +--- PASS: TestSwizzlerChangeRootKey (0.06s) === RUN TestSwizzlerUpdateSnapshotHashesSpecifiedRoles --- PASS: TestSwizzlerUpdateSnapshotHashesSpecifiedRoles (0.06s) === RUN TestSwizzlerUpdateSnapshotHashesNoSpecifiedRoles ---- PASS: TestSwizzlerUpdateSnapshotHashesNoSpecifiedRoles (0.05s) +--- PASS: TestSwizzlerUpdateSnapshotHashesNoSpecifiedRoles (0.06s) === RUN TestSwizzlerUpdateTimestamp ---- PASS: TestSwizzlerUpdateTimestamp (0.05s) +--- PASS: TestSwizzlerUpdateTimestamp (0.06s) === RUN TestMissingSigningKey --- PASS: TestMissingSigningKey (0.05s) === RUN TestSwizzlerMutateRoot ---- PASS: TestSwizzlerMutateRoot (0.06s) +--- PASS: TestSwizzlerMutateRoot (0.05s) === RUN TestSwizzlerMutateTimestamp ---- PASS: TestSwizzlerMutateTimestamp (0.04s) +--- PASS: TestSwizzlerMutateTimestamp (0.03s) === RUN TestSwizzlerMutateSnapshot --- PASS: TestSwizzlerMutateSnapshot (0.05s) === RUN TestSwizzlerMutateTargets ---- PASS: TestSwizzlerMutateTargets (0.08s) +--- PASS: TestSwizzlerMutateTargets (0.05s) === RUN TestSwizzlerRotateKeyBaseRole ---- PASS: TestSwizzlerRotateKeyBaseRole (0.06s) +--- PASS: TestSwizzlerRotateKeyBaseRole (0.05s) === RUN TestSwizzlerRotateKeyDelegationRole --- PASS: TestSwizzlerRotateKeyDelegationRole (0.05s) PASS -ok github.com/theupdateframework/notary/tuf/testutils 1.345s +ok github.com/theupdateframework/notary/tuf/testutils 1.239s ? github.com/theupdateframework/notary/tuf/testutils/interfaces [no test files] ? github.com/theupdateframework/notary/tuf/testutils/keys [no test files] === RUN TestConvertTUFKeyToPKCS8 ---- PASS: TestConvertTUFKeyToPKCS8 (0.05s) +--- PASS: TestConvertTUFKeyToPKCS8 (0.06s) === RUN TestParsePKCS8ToTufKey ---- PASS: TestParsePKCS8ToTufKey (0.35s) +--- PASS: TestParsePKCS8ToTufKey (0.41s) === RUN TestPEMtoPEM --- PASS: TestPEMtoPEM (0.00s) === RUN TestRoleListLen @@ -3571,7 +3583,7 @@ === RUN TestNewCertificate --- PASS: TestNewCertificate (0.00s) === RUN TestKeyOperations ---- PASS: TestKeyOperations (0.05s) +--- PASS: TestKeyOperations (0.06s) === RUN TestRSAX509PublickeyID --- PASS: TestRSAX509PublickeyID (0.00s) === RUN TestECDSAX509PublickeyID @@ -3587,9 +3599,9 @@ === RUN TestValidateCertificateWithInvalidExpiry --- PASS: TestValidateCertificateWithInvalidExpiry (0.00s) === RUN TestValidateCertificateWithShortKey ---- PASS: TestValidateCertificateWithShortKey (0.12s) +--- PASS: TestValidateCertificateWithShortKey (0.19s) PASS -ok github.com/theupdateframework/notary/tuf/utils 0.624s +ok github.com/theupdateframework/notary/tuf/utils 0.748s === RUN TestNewSerializableErrorNonValidationError --- PASS: TestNewSerializableErrorNonValidationError (0.00s) === RUN TestNewSerializableErrorValidationError @@ -3605,7 +3617,7 @@ === RUN TestUnmarshalInvalidJSON --- PASS: TestUnmarshalInvalidJSON (0.00s) PASS -ok github.com/theupdateframework/notary/tuf/validation 0.013s +ok github.com/theupdateframework/notary/tuf/validation 0.021s === RUN TestSetSignalTrap --- PASS: TestSetSignalTrap (0.00s) === RUN TestLogLevelSignalHandle @@ -3681,7 +3693,7 @@ === RUN TestRootHandlerFactory --- PASS: TestRootHandlerFactory (0.00s) === RUN TestRootHandlerError ---- PASS: TestRootHandlerError (0.01s) +--- PASS: TestRootHandlerError (0.00s) === RUN TestWrapWithCacheHeaderNilCacheControlConfig --- PASS: TestWrapWithCacheHeaderNilCacheControlConfig (0.00s) === RUN TestWrapWithCacheHeaderNon200Response @@ -3705,7 +3717,7 @@ === RUN TestDoAuthWildcardImage --- PASS: TestDoAuthWildcardImage (0.00s) PASS -ok github.com/theupdateframework/notary/utils 0.037s +ok github.com/theupdateframework/notary/utils 0.019s ? github.com/theupdateframework/notary/version [no test files] create-stamp debian/debhelper-build-stamp fakeroot debian/rules binary @@ -3738,38 +3750,40 @@ dh_missing -O--builddirectory=/build/notary-0.6.1\~ds1/_build -O--buildsystem=golang dh_strip -O--builddirectory=/build/notary-0.6.1\~ds1/_build -O--buildsystem=golang dh_strip: Could not find the BuildID in debian/notary/usr/bin/notary-server -dh_strip: Could not find the BuildID in debian/notary/usr/bin/notary-signer dh_strip: Could not find the BuildID in debian/notary/usr/bin/escrow +dh_strip: Could not find the BuildID in debian/notary/usr/bin/notary-signer dh_makeshlibs -O--builddirectory=/build/notary-0.6.1\~ds1/_build -O--buildsystem=golang dh_shlibdeps -O--builddirectory=/build/notary-0.6.1\~ds1/_build -O--buildsystem=golang -dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/notary/usr/bin/notary was not linked against libdl.so.2 (it uses none of the library's symbols) -dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/notary/usr/bin/notary was not linked against libplc4.so (it uses none of the library's symbols) -dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/notary/usr/bin/notary was not linked against libnss3.so (it uses none of the library's symbols) -dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/notary/usr/bin/notary was not linked against libsmime3.so (it uses none of the library's symbols) dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/notary/usr/bin/notary was not linked against libnssutil3.so (it uses none of the library's symbols) +dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/notary/usr/bin/notary was not linked against libsmime3.so (it uses none of the library's symbols) dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/notary/usr/bin/notary was not linked against libnspr4.so (it uses none of the library's symbols) -dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/notary/usr/bin/notary was not linked against libplds4.so (it uses none of the library's symbols) +dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/notary/usr/bin/notary was not linked against libdl.so.2 (it uses none of the library's symbols) dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/notary/usr/bin/notary was not linked against libssl3.so (it uses none of the library's symbols) +dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/notary/usr/bin/notary was not linked against libplds4.so (it uses none of the library's symbols) +dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/notary/usr/bin/notary was not linked against libplc4.so (it uses none of the library's symbols) +dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/notary/usr/bin/notary was not linked against libnss3.so (it uses none of the library's symbols) dh_installdeb -O--builddirectory=/build/notary-0.6.1\~ds1/_build -O--buildsystem=golang dh_golang -O--builddirectory=/build/notary-0.6.1\~ds1/_build -O--buildsystem=golang dh_gencontrol -O--builddirectory=/build/notary-0.6.1\~ds1/_build -O--buildsystem=golang dh_md5sums -O--builddirectory=/build/notary-0.6.1\~ds1/_build -O--buildsystem=golang dh_builddeb -O--builddirectory=/build/notary-0.6.1\~ds1/_build -O--buildsystem=golang +dpkg-deb: building package 'notary-dbgsym' in '../notary-dbgsym_0.6.1~ds1-3_i386.deb'. dpkg-deb: building package 'notary' in '../notary_0.6.1~ds1-3_i386.deb'. dpkg-deb: building package 'golang-github-docker-notary-dev' in '../golang-github-docker-notary-dev_0.6.1~ds1-3_all.deb'. -dpkg-deb: building package 'notary-dbgsym' in '../notary-dbgsym_0.6.1~ds1-3_i386.deb'. dpkg-genbuildinfo --build=binary dpkg-genchanges --build=binary >../notary_0.6.1~ds1-3_i386.changes dpkg-genchanges: info: binary-only upload (no source code included) dpkg-source --after-build . dpkg-buildpackage: info: binary-only upload (no source included) I: copying local configuration +I: user script /srv/workspace/pbuilder/25579/tmp/hooks/B01_cleanup starting +I: user script /srv/workspace/pbuilder/25579/tmp/hooks/B01_cleanup finished I: unmounting dev/ptmx filesystem I: unmounting dev/pts filesystem I: unmounting dev/shm filesystem I: unmounting proc filesystem I: unmounting sys filesystem I: cleaning the build env -I: removing directory /srv/workspace/pbuilder/5397 and its subdirectories -I: Current time: Wed Apr 29 03:40:36 -12 2020 -I: pbuilder-time-stamp: 1588174836 +I: removing directory /srv/workspace/pbuilder/25579 and its subdirectories +I: Current time: Wed Jun 2 12:05:37 +14 2021 +I: pbuilder-time-stamp: 1622585137