[pkg-go] Bug#917716: notary: FTBFS: dh_auto_test: cd _build && go test -vet=off -v -p 2 [...] returned exit code 1
Lucas Nussbaum
lucas at debian.org
Sat Dec 29 22:08:25 GMT 2018
Source: notary
Version: 0.6.1~ds1-2
Severity: serious
Justification: FTBFS on amd64
Tags: buster sid
Usertags: ftbfs-20181229 ftbfs-buster
Hi,
During a rebuild of all packages in sid, your package failed to build
on amd64.
Relevant part (hopefully):
> make[1]: Entering directory '/<<PKGBUILDDIR>>'
> dh_auto_build -- -tags "pkcs11"
> cd _build && go install -gcflags=all=\"-trimpath=/<<BUILDDIR>>/notary-0.6.1\~ds1/_build/src\" -asmflags=all=\"-trimpath=/<<BUILDDIR>>/notary-0.6.1\~ds1/_build/src\" -v -p 2 -tags pkcs11 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version
> errors
> internal/race
> runtime/internal/sys
> runtime/internal/atomic
> sync/atomic
> internal/cpu
> runtime
> math
> unicode/utf8
> strconv
> internal/testlog
> unicode
> encoding
> unicode/utf16
> internal/nettrace
> runtime/cgo
> crypto/subtle
> crypto/internal/cipherhw
> math/bits
> vendor/golang_org/x/crypto/cryptobyte/asn1
> container/list
> crypto/rc4
> vendor/golang_org/x/crypto/poly1305
> vendor/golang_org/x/crypto/curve25519
> github.com/hashicorp/hcl/hcl/strconv
> google.golang.org/grpc/resolver
> google.golang.org/grpc/internal
> google.golang.org/grpc/resolver/passthrough
> github.com/theupdateframework/notary/version
> golang.org/x/crypto/blowfish
> github.com/lib/pq/oid
> sync
> io
> syscall
> hash
> crypto
> crypto/md5
> bytes
> reflect
> time
> internal/poll
> os
> encoding/binary
> github.com/theupdateframework/notary
> fmt
> encoding/base64
> sort
> strings
> bufio
> encoding/json
> github.com/docker/go/canonical/json
> context
> internal/singleflight
> math/rand
> log
> net
> crypto/cipher
> crypto/aes
> internal/syscall/unix
> math/big
> crypto/rand
> github.com/docker/distribution/uuid
> crypto/elliptic
> crypto/sha512
> encoding/asn1
> crypto/ecdsa
> crypto/rsa
> crypto/sha256
> crypto/des
> crypto/dsa
> crypto/sha1
> golang.org/x/sys/unix
> encoding/hex
> crypto/x509/pkix
> encoding/pem
> vendor/golang_org/x/crypto/cryptobyte
> path/filepath
> io/ioutil
> net/url
> crypto/x509
> golang.org/x/crypto/ssh/terminal
> github.com/sirupsen/logrus
> golang.org/x/crypto/ed25519/internal/edwards25519
> path
> regexp/syntax
> golang.org/x/crypto/ed25519
> crypto/hmac
> golang.org/x/crypto/pbkdf2
> github.com/theupdateframework/notary/tuf/validation
> mime
> regexp
> mime/quotedprintable
> net/textproto
> mime/multipart
> github.com/theupdateframework/notary/tuf/data
> compress/flate
> hash/crc32
> compress/gzip
> github.com/theupdateframework/notary/client/changelist
> github.com/theupdateframework/notary/tuf/utils
> vendor/golang_org/x/crypto/chacha20poly1305/internal/chacha20
> vendor/golang_org/x/crypto/chacha20poly1305
> crypto/tls
> vendor/golang_org/x/net/http2/hpack
> vendor/golang_org/x/text/transform
> vendor/golang_org/x/text/unicode/bidi
> vendor/golang_org/x/text/secure/bidirule
> vendor/golang_org/x/text/unicode/norm
> vendor/golang_org/x/net/proxy
> net/http/httptrace
> net/http/internal
> vendor/golang_org/x/net/idna
> github.com/miekg/pkcs11
> vendor/golang_org/x/net/lex/httplex
> net/http
> github.com/theupdateframework/notary/storage
> github.com/theupdateframework/notary/trustmanager
> github.com/theupdateframework/notary/cryptoservice
> github.com/theupdateframework/notary/tuf/signed
> github.com/theupdateframework/notary/trustpinning
> github.com/theupdateframework/notary/tuf
> github.com/theupdateframework/notary/trustmanager/yubikey
> flag
> github.com/theupdateframework/notary/client
> encoding/csv
> github.com/fsnotify/fsnotify
> github.com/hashicorp/hcl/hcl/token
> github.com/hashicorp/hcl/hcl/ast
> github.com/hashicorp/hcl/hcl/scanner
> github.com/hashicorp/hcl/json/token
> github.com/hashicorp/hcl/hcl/parser
> github.com/hashicorp/hcl/json/scanner
> text/tabwriter
> github.com/hashicorp/hcl/json/parser
> github.com/hashicorp/hcl/hcl/printer
> github.com/hashicorp/hcl
> github.com/magiconair/properties
> github.com/mitchellh/mapstructure
> github.com/pelletier/go-toml
> github.com/spf13/afero/mem
> golang.org/x/text/transform
> golang.org/x/text/unicode/norm
> html
> text/template/parse
> github.com/spf13/afero
> text/template
> github.com/spf13/jwalterweatherman
> github.com/spf13/pflag
> html/template
> github.com/spf13/cast
> gopkg.in/yaml.v2
> github.com/golang/protobuf/proto
> github.com/spf13/viper
> github.com/golang/protobuf/ptypes/empty
> golang.org/x/net/context
> golang.org/x/text/unicode/bidi
> golang.org/x/text/secure/bidirule
> golang.org/x/net/idna
> golang.org/x/net/http2/hpack
> golang.org/x/net/internal/timeseries
> golang.org/x/net/trace
> golang.org/x/net/http/httpguts
> golang.org/x/net/http2
> google.golang.org/grpc/grpclog
> google.golang.org/grpc/connectivity
> google.golang.org/grpc/credentials
> google.golang.org/grpc/balancer
> google.golang.org/grpc/balancer/base
> google.golang.org/grpc/balancer/roundrobin
> google.golang.org/grpc/codes
> google.golang.org/grpc/encoding
> google.golang.org/grpc/encoding/proto
> google.golang.org/grpc/grpclb/grpc_lb_v1/messages
> google.golang.org/grpc/keepalive
> google.golang.org/grpc/metadata
> google.golang.org/grpc/naming
> google.golang.org/grpc/peer
> google.golang.org/grpc/resolver/dns
> google.golang.org/grpc/stats
> github.com/golang/protobuf/ptypes/any
> github.com/golang/protobuf/ptypes/duration
> github.com/golang/protobuf/ptypes/timestamp
> github.com/golang/protobuf/ptypes
> google.golang.org/genproto/googleapis/rpc/status
> google.golang.org/grpc/tap
> net/http/httputil
> google.golang.org/grpc/status
> google.golang.org/grpc/transport
> github.com/bugsnag/bugsnag-go/errors
> os/exec
> os/signal
> github.com/bugsnag/panicwrap
> github.com/bugsnag/bugsnag-go
> google.golang.org/grpc
> github.com/Shopify/logrus-bugsnag
> github.com/gorilla/context
> github.com/gorilla/mux
> github.com/docker/distribution/context
> github.com/docker/distribution/registry/api/errcode
> github.com/docker/distribution/registry/auth
> github.com/pkg/errors
> github.com/docker/go-connections/tlsconfig
> database/sql/driver
> github.com/theupdateframework/notary/trustmanager/remoteks
> database/sql
> github.com/docker/distribution/digest
> github.com/docker/distribution/reference
> github.com/docker/distribution
> github.com/docker/distribution/registry/api/v2
> github.com/go-sql-driver/mysql
> github.com/docker/distribution/registry/client/auth/challenge
> github.com/docker/distribution/registry/client/transport
> github.com/docker/distribution/registry/storage/cache
> github.com/docker/distribution/registry/storage/cache/memory
> github.com/docker/distribution/registry/client
> github.com/theupdateframework/notary/utils
> github.com/docker/distribution/registry/client/auth
> github.com/spf13/cobra
> github.com/theupdateframework/notary/cmd/escrow
> github.com/theupdateframework/notary/passphrase
> github.com/theupdateframework/notary/cmd/notary
> expvar
> github.com/docker/distribution/health
> golang.org/x/crypto/bcrypt
> github.com/docker/distribution/registry/auth/htpasswd
> encoding/base32
> github.com/docker/libtrust
> github.com/docker/distribution/registry/auth/token
> os/user
> github.com/beorn7/perks/quantile
> github.com/prometheus/client_model/go
> github.com/prometheus/client_golang/prometheus/internal
> github.com/matttproud/golang_protobuf_extensions/pbutil
> github.com/prometheus/common/internal/bitbucket.org/ww/goautoneg
> github.com/prometheus/common/model
> github.com/prometheus/common/expfmt
> github.com/lib/pq
> github.com/prometheus/procfs/internal/util
> github.com/prometheus/procfs/nfs
> github.com/prometheus/procfs/xfs
> github.com/prometheus/procfs
> runtime/debug
> github.com/theupdateframework/notary/server/errors
> github.com/prometheus/client_golang/prometheus
> github.com/jinzhu/inflection
> go/token
> go/scanner
> go/ast
> github.com/jinzhu/gorm
> github.com/cenkalti/backoff
> github.com/hailocab/go-hostpool
> gopkg.in/fatih/pool.v2
> gopkg.in/gorethink/gorethink.v3/encoding
> gopkg.in/gorethink/gorethink.v3/ql2
> gopkg.in/gorethink/gorethink.v3/types
> gopkg.in/dancannon/gorethink.v3
> github.com/theupdateframework/notary/proto
> google.golang.org/grpc/health/grpc_health_v1
> github.com/theupdateframework/notary/signer/client
> runtime/pprof
> runtime/trace
> net/http/pprof
> github.com/theupdateframework/notary/storage/rethinkdb
> github.com/theupdateframework/notary/server/storage
> github.com/theupdateframework/notary/signer
> github.com/theupdateframework/notary/signer/api
> github.com/dvsekhvalnov/jose2go/base64url
> github.com/dvsekhvalnov/jose2go/arrays
> github.com/dvsekhvalnov/jose2go/aes
> github.com/dvsekhvalnov/jose2go/compact
> github.com/dvsekhvalnov/jose2go/kdf
> github.com/dvsekhvalnov/jose2go/keys/ecc
> github.com/dvsekhvalnov/jose2go/padding
> github.com/dvsekhvalnov/jose2go
> github.com/theupdateframework/notary/server/snapshot
> github.com/theupdateframework/notary/server/timestamp
> github.com/theupdateframework/notary/signer/keydbstore
> github.com/theupdateframework/notary/server/handlers
> google.golang.org/grpc/health
> github.com/theupdateframework/notary/cmd/notary-signer
> github.com/theupdateframework/notary/server
> github.com/theupdateframework/notary/cmd/notary-server
> github.com/davecgh/go-spew/spew
> github.com/pmezard/go-difflib/difflib
> net/http/httptest
> github.com/theupdateframework/notary/tuf/testutils/keys
> testing
> github.com/stretchr/testify/assert
> github.com/stretchr/testify/require
> github.com/theupdateframework/notary/tuf/testutils/interfaces
> github.com/theupdateframework/notary/tuf/testutils
> make[1]: Leaving directory '/<<PKGBUILDDIR>>'
> dh_auto_test -O--builddirectory=/<<BUILDDIR>>/notary-0.6.1\~ds1/_build -O--buildsystem=golang
> cd _build && go test -vet=off -v -p 2 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version
> ? github.com/theupdateframework/notary [no test files]
> === RUN Test0Dot1Migration
> --- PASS: Test0Dot1Migration (0.05s)
> === RUN Test0Dot3Migration
> --- PASS: Test0Dot3Migration (0.03s)
> === RUN Test0Dot1RepoFormat
> time="2018-12-29T12:20:24Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: Test0Dot1RepoFormat (0.15s)
> === RUN Test0Dot3RepoFormat
> time="2018-12-29T12:20:24Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: Test0Dot3RepoFormat (0.20s)
> === RUN TestDownloading0Dot1RepoFormat
> --- PASS: TestDownloading0Dot1RepoFormat (0.02s)
> === RUN TestDownloading0Dot3RepoFormat
> --- PASS: TestDownloading0Dot3RepoFormat (0.01s)
> === RUN TestInitRepositoryManagedRolesIncludingRoot
> --- PASS: TestInitRepositoryManagedRolesIncludingRoot (0.01s)
> === RUN TestInitRepositoryManagedRolesInvalidRole
> --- PASS: TestInitRepositoryManagedRolesInvalidRole (0.01s)
> === RUN TestInitRepositoryManagedRolesIncludingTargets
> --- PASS: TestInitRepositoryManagedRolesIncludingTargets (0.01s)
> === RUN TestInitRepositoryManagedRolesIncludingTimestamp
> --- PASS: TestInitRepositoryManagedRolesIncludingTimestamp (0.03s)
> === RUN TestInitRepositoryWithCerts
> --- PASS: TestInitRepositoryWithCerts (0.04s)
> === RUN TestMatchKeyIDsWithPublicKeys
> --- PASS: TestMatchKeyIDsWithPublicKeys (0.02s)
> === RUN TestInitRepositoryNeedsRemoteTimestampKey
> --- PASS: TestInitRepositoryNeedsRemoteTimestampKey (0.02s)
> === RUN TestInitRepositoryNeedsRemoteSnapshotKey
> --- PASS: TestInitRepositoryNeedsRemoteSnapshotKey (0.01s)
> === RUN TestInitRepoServerOnlyManagesTimestampKey
> --- PASS: TestInitRepoServerOnlyManagesTimestampKey (0.15s)
> === RUN TestInitRepoServerManagesTimestampAndSnapshotKeys
> --- PASS: TestInitRepoServerManagesTimestampAndSnapshotKeys (0.11s)
> === RUN TestInitRepoAttemptsExceeded
> --- PASS: TestInitRepoAttemptsExceeded (0.11s)
> === RUN TestInitRepoPasswordInvalid
> --- PASS: TestInitRepoPasswordInvalid (0.01s)
> === RUN TestAddTargetToTargetRoleByDefault
> --- PASS: TestAddTargetToTargetRoleByDefault (0.03s)
> === RUN TestAddTargetToSpecifiedValidRoles
> --- PASS: TestAddTargetToSpecifiedValidRoles (0.03s)
> === RUN TestAddTargetToSpecifiedInvalidRoles
> --- PASS: TestAddTargetToSpecifiedInvalidRoles (0.03s)
> === RUN TestAddTargetWithInvalidTarget
> --- PASS: TestAddTargetWithInvalidTarget (0.02s)
> === RUN TestAddTargetErrorWritingChanges
> --- PASS: TestAddTargetErrorWritingChanges (0.02s)
> === RUN TestRemoveTargetToTargetRoleByDefault
> --- PASS: TestRemoveTargetToTargetRoleByDefault (0.04s)
> === RUN TestRemoveTargetFromSpecifiedValidRoles
> --- PASS: TestRemoveTargetFromSpecifiedValidRoles (0.04s)
> === RUN TestRemoveTargetToSpecifiedInvalidRoles
> --- PASS: TestRemoveTargetToSpecifiedInvalidRoles (0.04s)
> === RUN TestRemoveTargetErrorWritingChanges
> --- PASS: TestRemoveTargetErrorWritingChanges (0.02s)
> === RUN TestListTarget
> --- PASS: TestListTarget (0.38s)
> === RUN TestListTargetRestrictsDelegationPaths
> --- PASS: TestListTargetRestrictsDelegationPaths (0.06s)
> === RUN TestValidateRootKey
> --- PASS: TestValidateRootKey (0.04s)
> === RUN TestGetChangelist
> --- PASS: TestGetChangelist (0.04s)
> === RUN TestPublishBareRepo
> --- PASS: TestPublishBareRepo (0.40s)
> === RUN TestPublishUninitializedRepo
> time="2018-12-29T12:20:26Z" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time"
> --- PASS: TestPublishUninitializedRepo (0.03s)
> === RUN TestPublishClientHasSnapshotKey
> --- PASS: TestPublishClientHasSnapshotKey (0.33s)
> === RUN TestPublishAfterInitServerHasSnapshotKey
> --- PASS: TestPublishAfterInitServerHasSnapshotKey (0.34s)
> === RUN TestPublishAfterPullServerHasSnapshotKey
> --- PASS: TestPublishAfterPullServerHasSnapshotKey (0.12s)
> === RUN TestPublishNoOneHasSnapshotKey
> --- PASS: TestPublishNoOneHasSnapshotKey (0.08s)
> === RUN TestPublishSnapshotCorrupt
> --- PASS: TestPublishSnapshotCorrupt (0.17s)
> === RUN TestPublishTargetsCorrupt
> --- PASS: TestPublishTargetsCorrupt (0.09s)
> === RUN TestPublishRootCorrupt
> time="2018-12-29T12:20:27Z" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')"
> time="2018-12-29T12:20:28Z" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')"
> --- PASS: TestPublishRootCorrupt (0.06s)
> === RUN TestPublishSnapshotLocalKeysCreatedFirst
> --- PASS: TestPublishSnapshotLocalKeysCreatedFirst (0.01s)
> === RUN TestPublishDelegations
> --- PASS: TestPublishDelegations (0.17s)
> === RUN TestPublishDelegationsX509
> --- PASS: TestPublishDelegationsX509 (0.18s)
> === RUN TestPublishTargetsDelegationScopeFailIfNoKeys
> time="2018-12-29T12:20:28Z" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist"
> time="2018-12-29T12:20:28Z" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist"
> --- PASS: TestPublishTargetsDelegationScopeFailIfNoKeys (0.15s)
> === RUN TestPublishTargetsDelegationSuccessLocallyHasRoles
> --- PASS: TestPublishTargetsDelegationSuccessLocallyHasRoles (0.12s)
> === RUN TestPublishTargetsDelegationNoTargetsKeyNeeded
> --- PASS: TestPublishTargetsDelegationNoTargetsKeyNeeded (0.11s)
> === RUN TestPublishTargetsDelegationSuccessNeedsToDownloadRoles
> --- PASS: TestPublishTargetsDelegationSuccessNeedsToDownloadRoles (0.12s)
> === RUN TestPublishTargetsDelegationFromTwoRepos
> --- PASS: TestPublishTargetsDelegationFromTwoRepos (0.10s)
> === RUN TestPublishRemoveDelegationKeyFromDelegationRole
> time="2018-12-29T12:20:29Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2018-12-29T12:20:29Z" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: 249f9c54ecb975222c00bf84b255d7b5592488731fff5fd554ba86008154e40d"
> --- PASS: TestPublishRemoveDelegationKeyFromDelegationRole (0.08s)
> === RUN TestPublishRemoveDelegation
> time="2018-12-29T12:20:29Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2018-12-29T12:20:29Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2018-12-29T12:20:29Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2018-12-29T12:20:29Z" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: "
> --- PASS: TestPublishRemoveDelegation (0.06s)
> === RUN TestPublishSucceedsDespiteDelegationCorrupt
> --- PASS: TestPublishSucceedsDespiteDelegationCorrupt (0.09s)
> === RUN TestRotateKeyInvalidRole
> --- PASS: TestRotateKeyInvalidRole (0.05s)
> === RUN TestRemoteRotationError
> --- PASS: TestRemoteRotationError (0.01s)
> === RUN TestRemoteRotationEndpointError
> --- PASS: TestRemoteRotationEndpointError (0.03s)
> === RUN TestRemoteRotationNoRootKey
> --- PASS: TestRemoteRotationNoRootKey (0.05s)
> === RUN TestRemoteRotationNoInit
> time="2018-12-29T12:20:29Z" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time"
> --- PASS: TestRemoteRotationNoInit (0.03s)
> === RUN TestRotateBeforePublishFromRemoteKeyToLocalKey
> --- PASS: TestRotateBeforePublishFromRemoteKeyToLocalKey (0.17s)
> === RUN TestRotateKeyAfterPublishNoServerManagementChange
> --- PASS: TestRotateKeyAfterPublishNoServerManagementChange (0.31s)
> === RUN TestRotateKeyAfterPublishServerManagementChange
> --- PASS: TestRotateKeyAfterPublishServerManagementChange (0.38s)
> === RUN TestRotateRootKey
> --- PASS: TestRotateRootKey (0.11s)
> === RUN TestRotateRootMultiple
> --- PASS: TestRotateRootMultiple (0.12s)
> === RUN TestRotateRootKeyProvided
> --- PASS: TestRotateRootKeyProvided (0.06s)
> === RUN TestRotateRootKeyLegacySupport
> --- PASS: TestRotateRootKeyLegacySupport (0.13s)
> === RUN TestRemoteServerUnavailableNoLocalCache
> time="2018-12-29T12:20:30Z" level=error msg="Could not publish Repository since we could not update: unable to reach trust server at this time: 500."
> --- PASS: TestRemoteServerUnavailableNoLocalCache (0.00s)
> === RUN TestAddDelegationChangefileValid
> --- PASS: TestAddDelegationChangefileValid (0.02s)
> === RUN TestAddDelegationChangefileApplicable
> --- PASS: TestAddDelegationChangefileApplicable (0.02s)
> === RUN TestAddDelegationErrorWritingChanges
> --- PASS: TestAddDelegationErrorWritingChanges (0.02s)
> === RUN TestRemoveDelegationChangefileValid
> --- PASS: TestRemoveDelegationChangefileValid (0.02s)
> === RUN TestRemoveDelegationChangefileApplicable
> time="2018-12-29T12:20:30Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2018-12-29T12:20:30Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> --- PASS: TestRemoveDelegationChangefileApplicable (0.02s)
> === RUN TestClearAllPathsDelegationChangefileApplicable
> --- PASS: TestClearAllPathsDelegationChangefileApplicable (0.02s)
> === RUN TestFullAddDelegationChangefileApplicable
> --- PASS: TestFullAddDelegationChangefileApplicable (0.02s)
> === RUN TestFullRemoveDelegationChangefileApplicable
> --- PASS: TestFullRemoveDelegationChangefileApplicable (0.02s)
> === RUN TestRemoveDelegationErrorWritingChanges
> --- PASS: TestRemoveDelegationErrorWritingChanges (0.02s)
> === RUN TestBootstrapClientBadURL
> --- PASS: TestBootstrapClientBadURL (0.00s)
> === RUN TestClientInvalidURL
> --- PASS: TestClientInvalidURL (0.00s)
> === RUN TestPublishTargetsDelegationCanUseUserKeyWithArbitraryRole
> --- PASS: TestPublishTargetsDelegationCanUseUserKeyWithArbitraryRole (0.26s)
> === RUN TestDeleteRepo
> --- PASS: TestDeleteRepo (0.05s)
> === RUN TestDeleteRemoteRepo
> --- PASS: TestDeleteRemoteRepo (0.11s)
> === RUN TestListRoles
> --- PASS: TestListRoles (0.16s)
> === RUN TestGetAllTargetInfo
> --- PASS: TestGetAllTargetInfo (0.09s)
> === RUN TestUpdateSucceedsEvenIfCannotWriteNewRepo
> time="2018-12-29T12:20:31Z" level=error msg="could not save root to cache: Non-writable"
> --- PASS: TestUpdateSucceedsEvenIfCannotWriteNewRepo (0.05s)
> === RUN TestUpdateSucceedsEvenIfCannotWriteExistingRepo
> --- PASS: TestUpdateSucceedsEvenIfCannotWriteExistingRepo (0.25s)
> === RUN TestUpdateInOfflineMode
> time="2018-12-29T12:20:31Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> time="2018-12-29T12:20:31Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: TestUpdateInOfflineMode (0.06s)
> === RUN TestUpdateReplacesCorruptOrMissingMetadata
> time="2018-12-29T12:20:32Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:32Z" level=error msg="Metadata for root expired"
> --- PASS: TestUpdateReplacesCorruptOrMissingMetadata (0.49s)
> === RUN TestUpdateFailsIfServerRootKeyChangedWithoutMultiSign
> time="2018-12-29T12:20:32Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:32Z" level=error msg="Metadata for root expired"
> --- PASS: TestUpdateFailsIfServerRootKeyChangedWithoutMultiSign (0.05s)
> === RUN TestUpdateRemoteRootNotExistNoLocalCache
> --- PASS: TestUpdateRemoteRootNotExistNoLocalCache (0.01s)
> === RUN TestUpdateRemoteRootNotExistCanUseLocalCache
> --- PASS: TestUpdateRemoteRootNotExistCanUseLocalCache (0.03s)
> === RUN TestUpdateRemoteRootNotExistCannotUseLocalCache
> --- PASS: TestUpdateRemoteRootNotExistCannotUseLocalCache (0.04s)
> === RUN TestUpdateRemoteRoot50XNoLocalCache
> --- PASS: TestUpdateRemoteRoot50XNoLocalCache (0.02s)
> === RUN TestUpdateRemoteRoot50XCanUseLocalCache
> --- PASS: TestUpdateRemoteRoot50XCanUseLocalCache (0.04s)
> === RUN TestUpdateRemoteRoot50XCannotUseLocalCache
> --- PASS: TestUpdateRemoteRoot50XCannotUseLocalCache (0.04s)
> === RUN TestUpdateNonRootRemoteMissingMetadataNoLocalCache
> --- PASS: TestUpdateNonRootRemoteMissingMetadataNoLocalCache (0.09s)
> === RUN TestUpdateNonRootRemoteMissingMetadataCanUseLocalCache
> time="2018-12-29T12:20:32Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: TestUpdateNonRootRemoteMissingMetadataCanUseLocalCache (0.12s)
> === RUN TestUpdateNonRootRemoteMissingMetadataCannotUseLocalCache
> time="2018-12-29T12:20:32Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: TestUpdateNonRootRemoteMissingMetadataCannotUseLocalCache (0.16s)
> === RUN TestUpdateNonRootRemote50XNoLocalCache
> --- PASS: TestUpdateNonRootRemote50XNoLocalCache (0.09s)
> === RUN TestUpdateNonRootRemote50XCanUseLocalCache
> time="2018-12-29T12:20:33Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: TestUpdateNonRootRemote50XCanUseLocalCache (0.11s)
> === RUN TestUpdateNonRootRemote50XCannotUseLocalCache
> time="2018-12-29T12:20:33Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: TestUpdateNonRootRemote50XCannotUseLocalCache (0.15s)
> === RUN TestUpdateRemoteChecksumWrongNoLocalCache
> --- PASS: TestUpdateRemoteChecksumWrongNoLocalCache (0.09s)
> === RUN TestUpdateRemoteChecksumWrongCanUseLocalCache
> --- PASS: TestUpdateRemoteChecksumWrongCanUseLocalCache (0.11s)
> === RUN TestUpdateRemoteChecksumWrongCannotUseLocalCache
> --- PASS: TestUpdateRemoteChecksumWrongCannotUseLocalCache (0.19s)
> === RUN TestUpdateRootRemoteCorruptedNoLocalCache
> time="2018-12-29T12:20:33Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:33Z" level=error msg="Metadata for root expired"
> --- PASS: TestUpdateRootRemoteCorruptedNoLocalCache (0.35s)
> === RUN TestUpdateRootRemoteCorruptedCanUseLocalCache
> --- PASS: TestUpdateRootRemoteCorruptedCanUseLocalCache (0.61s)
> === RUN TestUpdateRootRemoteCorruptedCannotUseLocalCache
> time="2018-12-29T12:20:34Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:35Z" level=error msg="Metadata for root expired"
> --- PASS: TestUpdateRootRemoteCorruptedCannotUseLocalCache (0.72s)
> === RUN TestUpdateNonRootRemoteCorruptedNoLocalCache
> time="2018-12-29T12:20:35Z" level=error msg="Metadata for targets expired"
> time="2018-12-29T12:20:35Z" level=error msg="Metadata for targets expired"
> time="2018-12-29T12:20:35Z" level=error msg="Metadata for snapshot expired"
> time="2018-12-29T12:20:35Z" level=error msg="Metadata for snapshot expired"
> time="2018-12-29T12:20:35Z" level=error msg="Metadata for timestamp expired"
> time="2018-12-29T12:20:35Z" level=error msg="Metadata for timestamp expired"
> time="2018-12-29T12:20:35Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2018-12-29T12:20:35Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2018-12-29T12:20:35Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2018-12-29T12:20:35Z" level=error msg="Metadata for targets/a expired"
> time="2018-12-29T12:20:35Z" level=warning msg="Error getting targets/a: targets/a expired at Tue Nov 28 12:20:35 UTC 2017"
> time="2018-12-29T12:20:36Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2018-12-29T12:20:36Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2018-12-29T12:20:36Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2018-12-29T12:20:36Z" level=error msg="Metadata for targets/a/b expired"
> time="2018-12-29T12:20:36Z" level=warning msg="Error getting targets/a/b: targets/a/b expired at Tue Nov 28 12:20:36 UTC 2017"
> time="2018-12-29T12:20:36Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2018-12-29T12:20:36Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2018-12-29T12:20:36Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2018-12-29T12:20:36Z" level=error msg="Metadata for targets/b expired"
> time="2018-12-29T12:20:36Z" level=warning msg="Error getting targets/b: targets/b expired at Tue Nov 28 12:20:36 UTC 2017"
> --- PASS: TestUpdateNonRootRemoteCorruptedNoLocalCache (0.87s)
> === RUN TestUpdateNonRootRemoteCorruptedCanUseLocalCache
> time="2018-12-29T12:20:36Z" level=error msg="Metadata for timestamp expired"
> time="2018-12-29T12:20:36Z" level=error msg="Metadata for timestamp expired"
> --- PASS: TestUpdateNonRootRemoteCorruptedCanUseLocalCache (0.80s)
> === RUN TestUpdateNonRootRemoteCorruptedCannotUseLocalCache
> time="2018-12-29T12:20:37Z" level=error msg="Metadata for targets expired"
> time="2018-12-29T12:20:37Z" level=error msg="Metadata for snapshot expired"
> time="2018-12-29T12:20:37Z" level=error msg="Metadata for snapshot expired"
> time="2018-12-29T12:20:37Z" level=error msg="Metadata for timestamp expired"
> time="2018-12-29T12:20:37Z" level=error msg="Metadata for timestamp expired"
> time="2018-12-29T12:20:37Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2018-12-29T12:20:37Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2018-12-29T12:20:37Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2018-12-29T12:20:37Z" level=error msg="Metadata for targets/a expired"
> time="2018-12-29T12:20:37Z" level=warning msg="Error getting targets/a: targets/a expired at Tue Nov 28 12:20:37 UTC 2017"
> time="2018-12-29T12:20:37Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2018-12-29T12:20:38Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2018-12-29T12:20:38Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2018-12-29T12:20:38Z" level=error msg="Metadata for targets/a/b expired"
> time="2018-12-29T12:20:38Z" level=warning msg="Error getting targets/a/b: targets/a/b expired at Tue Nov 28 12:20:38 UTC 2017"
> time="2018-12-29T12:20:38Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2018-12-29T12:20:38Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2018-12-29T12:20:38Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2018-12-29T12:20:38Z" level=error msg="Metadata for targets/b expired"
> time="2018-12-29T12:20:38Z" level=warning msg="Error getting targets/b: targets/b expired at Tue Nov 28 12:20:38 UTC 2017"
> --- PASS: TestUpdateNonRootRemoteCorruptedCannotUseLocalCache (1.41s)
> === RUN TestUpdateLocalAndRemoteRootCorrupt
> time="2018-12-29T12:20:39Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:39Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:39Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:39Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:39Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:40Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:40Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:40Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:40Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:40Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:40Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:40Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:40Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:40Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:40Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:40Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:40Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:40Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:40Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:40Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:40Z" level=error msg="Metadata for root expired"
> time="2018-12-29T12:20:40Z" level=error msg="Metadata for root expired"
> --- PASS: TestUpdateLocalAndRemoteRootCorrupt (1.84s)
> === RUN TestUpdateRemoteKeyRotated
> time="2018-12-29T12:20:40Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2018-12-29T12:20:40Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2018-12-29T12:20:40Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> --- PASS: TestUpdateRemoteKeyRotated (0.17s)
> === RUN TestValidateRootRotationWithOldRole
> --- PASS: TestValidateRootRotationWithOldRole (0.09s)
> === RUN TestRootRoleInvariant
> --- PASS: TestRootRoleInvariant (0.08s)
> === RUN TestBadIntermediateTransitions
> --- PASS: TestBadIntermediateTransitions (0.03s)
> === RUN TestExpiredIntermediateTransitions
> time="2018-12-29T12:20:40Z" level=warning msg="root is nearing expiry, you should re-sign the role metadata"
> --- PASS: TestExpiredIntermediateTransitions (0.04s)
> === RUN TestDownloadTargetsLarge
> --- PASS: TestDownloadTargetsLarge (4.37s)
> === RUN TestDownloadTargetsDeep
> --- PASS: TestDownloadTargetsDeep (0.02s)
> === RUN TestDownloadSnapshotLargeDelegationsMany
> --- PASS: TestDownloadSnapshotLargeDelegationsMany (3.21s)
> === RUN TestRootOnDiskTrustPinning
> --- PASS: TestRootOnDiskTrustPinning (0.01s)
> === RUN TestApplyTargetsChange
> --- PASS: TestApplyTargetsChange (0.00s)
> === RUN TestApplyAddTargetTwice
> --- PASS: TestApplyAddTargetTwice (0.00s)
> === RUN TestApplyChangelist
> --- PASS: TestApplyChangelist (0.00s)
> === RUN TestApplyChangelistMulti
> --- PASS: TestApplyChangelistMulti (0.00s)
> === RUN TestApplyTargetsDelegationCreateDelete
> --- PASS: TestApplyTargetsDelegationCreateDelete (0.00s)
> === RUN TestApplyTargetsDelegationCreate2SharedKey
> --- PASS: TestApplyTargetsDelegationCreate2SharedKey (0.00s)
> === RUN TestApplyTargetsDelegationCreateEdit
> --- PASS: TestApplyTargetsDelegationCreateEdit (0.00s)
> === RUN TestApplyTargetsDelegationEditNonExisting
> --- PASS: TestApplyTargetsDelegationEditNonExisting (0.00s)
> === RUN TestApplyTargetsDelegationCreateAlreadyExisting
> --- PASS: TestApplyTargetsDelegationCreateAlreadyExisting (0.00s)
> === RUN TestApplyTargetsDelegationAlreadyExistingMergePaths
> --- PASS: TestApplyTargetsDelegationAlreadyExistingMergePaths (0.00s)
> === RUN TestApplyTargetsDelegationInvalidRole
> --- PASS: TestApplyTargetsDelegationInvalidRole (0.00s)
> === RUN TestApplyTargetsDelegationInvalidJSONContent
> --- PASS: TestApplyTargetsDelegationInvalidJSONContent (0.00s)
> === RUN TestApplyTargetsDelegationInvalidAction
> --- PASS: TestApplyTargetsDelegationInvalidAction (0.00s)
> === RUN TestApplyTargetsChangeInvalidType
> --- PASS: TestApplyTargetsChangeInvalidType (0.00s)
> === RUN TestApplyTargetsDelegationCreate2Deep
> --- PASS: TestApplyTargetsDelegationCreate2Deep (0.00s)
> === RUN TestApplyTargetsDelegationParentDoesntExist
> --- PASS: TestApplyTargetsDelegationParentDoesntExist (0.00s)
> === RUN TestApplyChangelistCreatesDelegation
> --- PASS: TestApplyChangelistCreatesDelegation (0.00s)
> === RUN TestApplyChangelistTargetsToMultipleRoles
> --- PASS: TestApplyChangelistTargetsToMultipleRoles (0.00s)
> === RUN TestApplyChangelistTargetsFailsNonexistentRole
> time="2018-12-29T12:20:48Z" level=error msg="couldn't add target to targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist"
> time="2018-12-29T12:20:48Z" level=error msg="couldn't remove target from targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist"
> --- PASS: TestApplyChangelistTargetsFailsNonexistentRole (0.00s)
> === RUN TestChangeTargetMetaFailsInvalidRole
> time="2018-12-29T12:20:48Z" level=error msg="couldn't add target to ruhroh: tuf: invalid role ruhroh. does not exist"
> --- PASS: TestChangeTargetMetaFailsInvalidRole (0.00s)
> === RUN TestChangeTargetMetaFailsIfPrefixError
> time="2018-12-29T12:20:48Z" level=error msg="couldn't add target to targets/level1: Could not add all targets"
> --- PASS: TestChangeTargetMetaFailsIfPrefixError (0.00s)
> === RUN TestAllNearExpiry
> --- PASS: TestAllNearExpiry (0.00s)
> === RUN TestAllNotNearExpiry
> --- PASS: TestAllNotNearExpiry (0.00s)
> === RUN TestRotateRemoteKeyOffline
> --- PASS: TestRotateRemoteKeyOffline (0.03s)
> PASS
> ok github.com/theupdateframework/notary/client 23.833s
> === RUN TestTUFDelegation
> --- PASS: TestTUFDelegation (0.00s)
> === RUN TestMemChangelist
> --- PASS: TestMemChangelist (0.00s)
> === RUN TestMemChangeIterator
> --- PASS: TestMemChangeIterator (0.00s)
> === RUN TestMemChangelistRemove
> --- PASS: TestMemChangelistRemove (0.00s)
> === RUN TestAdd
> --- PASS: TestAdd (0.00s)
> === RUN TestErrorConditions
> time="2018-12-29T12:20:21Z" level=warning msg="invalid character '\\x05' looking for beginning of value"
> --- PASS: TestErrorConditions (0.00s)
> === RUN TestListOrder
> --- PASS: TestListOrder (0.00s)
> === RUN TestFileChangeIterator
> --- PASS: TestFileChangeIterator (0.00s)
> PASS
> ok github.com/theupdateframework/notary/client/changelist 0.005s
> === RUN TestParseConfigError
> --- PASS: TestParseConfigError (0.00s)
> === RUN TestSetupGRPCServer
> --- PASS: TestSetupGRPCServer (0.00s)
> === RUN TestSetupStorage
> --- PASS: TestSetupStorage (0.00s)
> === RUN TestSetupNetListener
> --- FAIL: TestSetupNetListener (0.00s)
> require.go:794:
> Error Trace: config_test.go:61
> Error: Received unexpected error:
> listen tcp 127.0.0.1:9999: bind: address already in use
> Test: TestSetupNetListener
> FAIL
> FAIL github.com/theupdateframework/notary/cmd/escrow 0.005s
> === RUN TestPurgeDelegationKeys
> Usage:
> delegation [command]
>
> Available Commands:
> add Add a keys to delegation using the provided public key X509 certificates.
> list Lists delegations for the Global Unique Name.
> purge Remove KeyID(s) from all delegation roles in the given GUN.
> remove Remove KeyID(s) from the specified Role delegation.
>
> Use "delegation [command] --help" for more information about a command.
> Usage:
> delegation [command]
>
> Available Commands:
> add Add a keys to delegation using the provided public key X509 certificates.
> list Lists delegations for the Global Unique Name.
> purge Remove KeyID(s) from all delegation roles in the given GUN.
> remove Remove KeyID(s) from the specified Role delegation.
>
> Use "delegation [command] --help" for more information about a command.
> Removal of the following keys from all delegations in gun staged for next publish:
> - abc
> --- PASS: TestPurgeDelegationKeys (0.00s)
> === RUN TestAddInvalidDelegationName
> --- PASS: TestAddInvalidDelegationName (0.02s)
> === RUN TestAddInvalidDelegationCert
> --- PASS: TestAddInvalidDelegationCert (0.00s)
> === RUN TestAddInvalidShortPubkeyCert
> --- PASS: TestAddInvalidShortPubkeyCert (0.01s)
> === RUN TestRemoveInvalidDelegationName
> --- PASS: TestRemoveInvalidDelegationName (0.00s)
> === RUN TestRemoveAllInvalidDelegationName
> --- PASS: TestRemoveAllInvalidDelegationName (0.00s)
> === RUN TestAddInvalidNumArgs
> Usage:
> delegation [command]
>
> Available Commands:
> add Add a keys to delegation using the provided public key X509 certificates.
> list Lists delegations for the Global Unique Name.
> purge Remove KeyID(s) from all delegation roles in the given GUN.
> remove Remove KeyID(s) from the specified Role delegation.
>
> Use "delegation [command] --help" for more information about a command.
> --- PASS: TestAddInvalidNumArgs (0.00s)
> === RUN TestListInvalidNumArgs
> Usage:
> delegation [command]
>
> Available Commands:
> add Add a keys to delegation using the provided public key X509 certificates.
> list Lists delegations for the Global Unique Name.
> purge Remove KeyID(s) from all delegation roles in the given GUN.
> remove Remove KeyID(s) from the specified Role delegation.
>
> Use "delegation [command] --help" for more information about a command.
> --- PASS: TestListInvalidNumArgs (0.00s)
> === RUN TestRemoveInvalidNumArgs
> Usage:
> delegation [command]
>
> Available Commands:
> add Add a keys to delegation using the provided public key X509 certificates.
> list Lists delegations for the Global Unique Name.
> purge Remove KeyID(s) from all delegation roles in the given GUN.
> remove Remove KeyID(s) from the specified Role delegation.
>
> Use "delegation [command] --help" for more information about a command.
> --- PASS: TestRemoveInvalidNumArgs (0.00s)
> === RUN TestInitWithRootKey
> --- PASS: TestInitWithRootKey (0.12s)
> === RUN TestInitWithRootCert
> --- PASS: TestInitWithRootCert (0.08s)
> === RUN TestClientTUFInteraction
> --- PASS: TestClientTUFInteraction (0.13s)
> === RUN TestClientDeleteTUFInteraction
> time="2018-12-29T12:20:30Z" level=error msg="could not reach https://invalid-server: Get https://invalid-server/v2/: dial tcp: lookup invalid-server on 172.31.0.2:53: no such host"
> --- PASS: TestClientDeleteTUFInteraction (0.26s)
> === RUN TestClientTUFAddByHashInteraction
> --- PASS: TestClientTUFAddByHashInteraction (0.25s)
> === RUN TestClientDelegationsInteraction
> time="2018-12-29T12:20:31Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2018-12-29T12:20:31Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> --- PASS: TestClientDelegationsInteraction (0.54s)
> === RUN TestClientDelegationsPublishing
> --- PASS: TestClientDelegationsPublishing (0.49s)
> === RUN TestClientKeyGenerationRotation
> --- PASS: TestClientKeyGenerationRotation (0.67s)
> === RUN TestKeyRotation
> --- PASS: TestKeyRotation (0.12s)
> === RUN TestKeyRotationNonRoot
> --- PASS: TestKeyRotationNonRoot (0.14s)
> === RUN TestDefaultRootKeyGeneration
> --- PASS: TestDefaultRootKeyGeneration (0.01s)
> === RUN TestLogLevelFlags
> --- PASS: TestLogLevelFlags (0.00s)
> === RUN TestClientKeyPassphraseChange
> --- PASS: TestClientKeyPassphraseChange (0.14s)
> === RUN TestPurgeSingleKey
> Removal of the following keys from all delegations in gun staged for next publish:
> - 28e8f74c0e8c9e386b44fa8c3756b7eeed5ae1116b63931f043640d1fb8f4783
> --- PASS: TestPurgeSingleKey (0.11s)
> === RUN TestWitness
> time="2018-12-29T12:20:33Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation"
> time="2018-12-29T12:20:33Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation"
> time="2018-12-29T12:20:33Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation"
> time="2018-12-29T12:20:33Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation"
> time="2018-12-29T12:20:33Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2018-12-29T12:20:33Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2018-12-29T12:20:33Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation"
> --- PASS: TestWitness (0.32s)
> === RUN TestClientTUFInitWithAutoPublish
> time="2018-12-29T12:20:33Z" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get https://notary-server-on-the-moon:12306/v2/: dial tcp: lookup notary-server-on-the-moon on 172.31.0.2:53: no such host"
> --- PASS: TestClientTUFInitWithAutoPublish (0.18s)
> === RUN TestClientTUFAddWithAutoPublish
> time="2018-12-29T12:20:33Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> time="2018-12-29T12:20:33Z" level=error msg="Could not publish Repository since we could not update: client is offline"
> time="2018-12-29T12:20:33Z" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get https://notary-server-on-the-moon:12306/v2/: dial tcp: lookup notary-server-on-the-moon on 172.31.0.2:53: no such host"
> time="2018-12-29T12:20:33Z" level=error msg="Could not publish Repository since we could not update: client is offline"
> --- PASS: TestClientTUFAddWithAutoPublish (0.14s)
> === RUN TestClientTUFRemoveWithAutoPublish
> --- PASS: TestClientTUFRemoveWithAutoPublish (0.17s)
> === RUN TestClientDelegationAddWithAutoPublish
> --- PASS: TestClientDelegationAddWithAutoPublish (0.09s)
> === RUN TestClientDelegationRemoveWithAutoPublish
> time="2018-12-29T12:20:34Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2018-12-29T12:20:34Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> --- PASS: TestClientDelegationRemoveWithAutoPublish (0.17s)
> === RUN TestClientTUFAddByHashWithAutoPublish
> --- PASS: TestClientTUFAddByHashWithAutoPublish (0.08s)
> === RUN TestClientKeyImport
> time="2018-12-29T12:20:34Z" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header"
> time="2018-12-29T12:20:34Z" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to"
> --- PASS: TestClientKeyImport (0.05s)
> === RUN TestAddDelImportKeyPublishFlow
> time="2018-12-29T12:20:34Z" level=error msg="couldn't add target to targets/releases: could not find necessary signing keys, at least one of these keys must be available: 0570f9fdca00bdaf62f3f79bf84e70748ba2c8bff926f20dd996bac49e6164fc"
> --- PASS: TestAddDelImportKeyPublishFlow (0.18s)
> === RUN TestExportImportFlow
> --- PASS: TestExportImportFlow (0.06s)
> === RUN TestDelegationKeyImportExport
> --- PASS: TestDelegationKeyImportExport (0.01s)
> === RUN TestImportKeysNoYubikey
> --- PASS: TestImportKeysNoYubikey (0.01s)
> === RUN TestExportImportKeysNoYubikey
> --- PASS: TestExportImportKeysNoYubikey (0.01s)
> === RUN TestRemoveIfNoKey
> --- PASS: TestRemoveIfNoKey (0.00s)
> === RUN TestRemoveOneKeyAbort
> --- PASS: TestRemoveOneKeyAbort (0.01s)
> === RUN TestRemoveOneKeyConfirm
> --- PASS: TestRemoveOneKeyConfirm (0.01s)
> === RUN TestRemoveMultikeysInvalidInput
> --- PASS: TestRemoveMultikeysInvalidInput (0.01s)
> === RUN TestRemoveMultikeysAbortChoice
> --- PASS: TestRemoveMultikeysAbortChoice (0.01s)
> === RUN TestRemoveMultikeysRemoveOnlyChosenKey
> --- PASS: TestRemoveMultikeysRemoveOnlyChosenKey (0.01s)
> === RUN TestRotateKeyInvalidRoles
> time="2018-12-29T12:20:34Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> time="2018-12-29T12:20:34Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> time="2018-12-29T12:20:34Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> time="2018-12-29T12:20:34Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> --- PASS: TestRotateKeyInvalidRoles (0.21s)
> === RUN TestRotateKeyTargetCannotBeServerManaged
> time="2018-12-29T12:20:34Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> --- PASS: TestRotateKeyTargetCannotBeServerManaged (0.02s)
> === RUN TestRotateKeyTimestampCannotBeLocallyManaged
> time="2018-12-29T12:20:34Z" level=error msg="could not reach https://notary-server:4443: Get https://notary-server:4443/v2/: dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> --- PASS: TestRotateKeyTimestampCannotBeLocallyManaged (0.01s)
> === RUN TestRotateKeyNoGUN
> Usage:
> --- PASS: TestRotateKeyNoGUN (0.00s)
> === RUN TestRotateKeyRemoteServerManagesKey
> Successfully rotated snapshot key for repository docker.com/notary
> Successfully rotated timestamp key for repository docker.com/notary
> --- PASS: TestRotateKeyRemoteServerManagesKey (0.11s)
> === RUN TestRotateKeyBothKeys
> Successfully rotated targets key for repository docker.com/notary
> Successfully rotated snapshot key for repository docker.com/notary
> --- PASS: TestRotateKeyBothKeys (0.08s)
> === RUN TestRotateKeyRootIsInteractive
> --- PASS: TestRotateKeyRootIsInteractive (0.03s)
> === RUN TestChangeKeyPassphraseInvalidID
> --- PASS: TestChangeKeyPassphraseInvalidID (0.00s)
> === RUN TestChangeKeyPassphraseInvalidNumArgs
> Usage:
> --- PASS: TestChangeKeyPassphraseInvalidNumArgs (0.00s)
> === RUN TestChangeKeyPassphraseNonexistentID
> --- PASS: TestChangeKeyPassphraseNonexistentID (0.00s)
> === RUN TestExportKeys
> --- PASS: TestExportKeys (0.00s)
> === RUN TestExportKeysByGUN
> --- PASS: TestExportKeysByGUN (0.00s)
> === RUN TestExportKeysByID
> --- PASS: TestExportKeysByID (0.00s)
> === RUN TestExportKeysBadFlagCombo
> --- PASS: TestExportKeysBadFlagCombo (0.00s)
> === RUN TestImportKeysNonexistentFile
> --- PASS: TestImportKeysNonexistentFile (0.00s)
> === RUN TestKeyGeneration
> time="2018-12-29T12:20:35Z" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to"
> --- PASS: TestKeyGeneration (0.02s)
> === RUN TestNotaryConfigFileDefault
> --- PASS: TestNotaryConfigFileDefault (0.00s)
> === RUN TestRemoteServerDefault
> --- PASS: TestRemoteServerDefault (0.00s)
> === RUN TestRemoteServerUsesConfigFile
> --- PASS: TestRemoteServerUsesConfigFile (0.00s)
> === RUN TestRemoteServerCommandLineFlagOverridesConfig
> --- PASS: TestRemoteServerCommandLineFlagOverridesConfig (0.00s)
> === RUN TestInvalidAddHashCommands
> --- PASS: TestInvalidAddHashCommands (0.00s)
> === RUN TestConfigParsingErrorsPropagatedByCommands
> --- PASS: TestConfigParsingErrorsPropagatedByCommands (0.00s)
> === RUN TestInsufficientArgumentsReturnsErrorAndPrintsUsage
> --- PASS: TestInsufficientArgumentsReturnsErrorAndPrintsUsage (0.01s)
> === RUN TestBareCommandPrintsUsageAndNoError
> --- PASS: TestBareCommandPrintsUsageAndNoError (0.00s)
> === RUN TestConfigFileTLSCannotBeRelativeToCWD
> --- PASS: TestConfigFileTLSCannotBeRelativeToCWD (0.01s)
> === RUN TestConfigFileTLSCanBeRelativeToConfigOrAbsolute
> --- PASS: TestConfigFileTLSCanBeRelativeToConfigOrAbsolute (0.03s)
> === RUN TestConfigFileOverridenByCmdLineFlags
> --- PASS: TestConfigFileOverridenByCmdLineFlags (0.03s)
> === RUN TestConfigFileTrustPinning
> --- PASS: TestConfigFileTrustPinning (0.00s)
> === RUN TestPassphraseRetrieverCaching
> --- PASS: TestPassphraseRetrieverCaching (0.00s)
> === RUN TestPassphraseRetrieverDelegationRoleCaching
> --- PASS: TestPassphraseRetrieverDelegationRoleCaching (0.00s)
> === RUN TestTruncateWithEllipsis
> --- PASS: TestTruncateWithEllipsis (0.00s)
> === RUN TestKeyInfoSorter
> --- PASS: TestKeyInfoSorter (0.00s)
> === RUN TestPrettyPrintZeroKeys
> --- PASS: TestPrettyPrintZeroKeys (0.00s)
> === RUN TestPrettyPrintRootAndSigningKeys
> --- PASS: TestPrettyPrintRootAndSigningKeys (0.03s)
> === RUN TestPrettyPrintZeroTargets
> --- PASS: TestPrettyPrintZeroTargets (0.00s)
> === RUN TestPrettyPrintSortedTargets
> --- PASS: TestPrettyPrintSortedTargets (0.00s)
> === RUN TestPrettyPrintZeroRoles
> --- PASS: TestPrettyPrintZeroRoles (0.00s)
> === RUN TestPrettyPrintSortedRoles
> --- PASS: TestPrettyPrintSortedRoles (0.00s)
> === RUN TestImportRootCert
> --- PASS: TestImportRootCert (0.00s)
> === RUN TestTokenAuth
> time="2018-12-29T12:20:35Z" level=error msg="could not reach https://localhost:9999: Get https://localhost:9999/v2/: http: server gave HTTP response to HTTPS client"
> --- PASS: TestTokenAuth (0.01s)
> === RUN TestAdminTokenAuth
> time="2018-12-29T12:20:35Z" level=error msg="could not reach https://localhost:9999: Get https://localhost:9999/v2/: http: server gave HTTP response to HTTPS client"
> --- PASS: TestAdminTokenAuth (0.01s)
> === RUN TestTokenAuth200Status
> --- PASS: TestTokenAuth200Status (0.00s)
> === RUN TestAdminTokenAuth200Status
> --- PASS: TestAdminTokenAuth200Status (0.00s)
> === RUN TestTokenAuth401Status
> --- PASS: TestTokenAuth401Status (0.00s)
> === RUN TestAdminTokenAuth401Status
> --- PASS: TestAdminTokenAuth401Status (0.00s)
> === RUN TestTokenAuthNon200Non401Status
> time="2018-12-29T12:20:35Z" level=error msg="could not reach http://127.0.0.1:33863: 404"
> --- PASS: TestTokenAuthNon200Non401Status (0.00s)
> === RUN TestAdminTokenAuthNon200Non401Status
> time="2018-12-29T12:20:35Z" level=error msg="could not reach http://127.0.0.1:40595: 404"
> --- PASS: TestAdminTokenAuthNon200Non401Status (0.00s)
> === RUN TestConfigureRepo
> --- PASS: TestConfigureRepo (0.00s)
> === RUN TestConfigureRepoRW
> Enter username: time="2018-12-29T12:20:35Z" level=error msg="error processing username input: EOF"
> --- PASS: TestConfigureRepoRW (0.00s)
> === RUN TestConfigureRepoAdmin
> Enter username: time="2018-12-29T12:20:35Z" level=error msg="error processing username input: EOF"
> --- PASS: TestConfigureRepoAdmin (0.01s)
> === RUN TestStatusUnstageAndReset
> Successfully reset specified changes for repository gun
> Addition of target "test1" by sha256 hash to repository "gun" staged for next publish.
> Addition of target "test2" by sha256 hash to repository "gun" staged for next publish.
> Addition of target "test3" by sha256 hash to repository "gun" staged for next publish.
> Addition of target "test4" by sha256 hash to repository "gun" staged for next publish.
> --- PASS: TestStatusUnstageAndReset (0.00s)
> === RUN TestGetTrustPinningErrors
> Pushing changes to gun
> --- PASS: TestGetTrustPinningErrors (0.00s)
> === RUN TestPasswordStore
> Enter username: time="2018-12-29T12:20:35Z" level=error msg="error processing username input: EOF"
> --- PASS: TestPasswordStore (0.00s)
> === RUN TestPasswordStoreWithEnvvar
> time="2018-12-29T12:20:35Z" level=error msg="Authentication string with zero-legnth username"
> time="2018-12-29T12:20:35Z" level=error msg="Could not base64-decode authentication string"
> --- PASS: TestPasswordStoreWithEnvvar (0.00s)
> === RUN TestGetPayload
> --- PASS: TestGetPayload (0.00s)
> === RUN TestFeedback
> --- PASS: TestFeedback (0.00s)
> === RUN TestHomeExpand
> --- PASS: TestHomeExpand (0.00s)
> PASS
> ok github.com/theupdateframework/notary/cmd/notary 5.283s
> === RUN TestBootstrap
> --- PASS: TestBootstrap (0.00s)
> === RUN TestGetAddrAndTLSConfigInvalidTLS
> --- PASS: TestGetAddrAndTLSConfigInvalidTLS (0.00s)
> === RUN TestGetAddrAndTLSConfigNoHTTPAddr
> --- PASS: TestGetAddrAndTLSConfigNoHTTPAddr (0.00s)
> === RUN TestGetAddrAndTLSConfigSuccessWithTLS
> --- PASS: TestGetAddrAndTLSConfigSuccessWithTLS (0.00s)
> === RUN TestGetAddrAndTLSConfigSuccessWithoutTLS
> --- PASS: TestGetAddrAndTLSConfigSuccessWithoutTLS (0.00s)
> === RUN TestGetAddrAndTLSConfigWithClientTLS
> --- PASS: TestGetAddrAndTLSConfigWithClientTLS (0.00s)
> === RUN TestGetInvalidTrustService
> --- PASS: TestGetInvalidTrustService (0.00s)
> === RUN TestGetLocalTrustService
> time="2018-12-29T12:20:42Z" level=info msg="Using local signing service, which requires ED25519. Ignoring all other trust_service parameters, including keyAlgorithm"
> --- PASS: TestGetLocalTrustService (0.00s)
> === RUN TestGetTrustServiceInvalidKeyAlgorithm
> --- PASS: TestGetTrustServiceInvalidKeyAlgorithm (0.00s)
> === RUN TestGetTrustServiceTLSMissingCertOrKey
> --- PASS: TestGetTrustServiceTLSMissingCertOrKey (0.00s)
> === RUN TestGetTrustServiceNoTLSConfig
> time="2018-12-29T12:20:42Z" level=info msg="Using remote signing service"
> --- PASS: TestGetTrustServiceNoTLSConfig (0.00s)
> === RUN TestGetTrustServiceTLSSuccess
> time="2018-12-29T12:20:42Z" level=info msg="Using remote signing service"
> --- PASS: TestGetTrustServiceTLSSuccess (0.00s)
> === RUN TestGetTrustServiceTLSFailure
> --- PASS: TestGetTrustServiceTLSFailure (0.00s)
> === RUN TestGetStoreInvalid
> time="2018-12-29T12:20:42Z" level=info msg="Using asdf backend"
> --- PASS: TestGetStoreInvalid (0.00s)
> === RUN TestGetStoreDBStore
> time="2018-12-29T12:20:42Z" level=info msg="Using sqlite3 backend"
> --- PASS: TestGetStoreDBStore (0.00s)
> === RUN TestGetStoreRethinkDBStoreConnectionFails
> time="2018-12-29T12:20:42Z" level=info msg="Using rethinkdb backend"
> --- PASS: TestGetStoreRethinkDBStoreConnectionFails (0.00s)
> === RUN TestGetMemoryStore
> time="2018-12-29T12:20:42Z" level=info msg="Using memory backend"
> --- PASS: TestGetMemoryStore (0.00s)
> === RUN TestGetCacheConfig
> --- PASS: TestGetCacheConfig (0.00s)
> === RUN TestGetGUNPRefixes
> --- PASS: TestGetGUNPRefixes (0.00s)
> === RUN TestSampleConfig
> time="2018-12-29T12:20:42Z" level=info msg="Using remote signing service"
> time="2018-12-29T12:20:42Z" level=info msg="Using sqlite3 backend"
> --- PASS: TestSampleConfig (0.00s)
> PASS
> ok github.com/theupdateframework/notary/cmd/notary-server 0.015s
> === RUN TestGetAddrAndTLSConfigInvalidTLS
> --- PASS: TestGetAddrAndTLSConfigInvalidTLS (0.00s)
> === RUN TestGetAddrAndTLSConfigNoGRPCAddr
> --- PASS: TestGetAddrAndTLSConfigNoGRPCAddr (0.00s)
> === RUN TestGetAddrAndTLSConfigSuccess
> --- PASS: TestGetAddrAndTLSConfigSuccess (0.00s)
> === RUN TestSetupCryptoServicesDBStoreNoDefaultAlias
> --- PASS: TestSetupCryptoServicesDBStoreNoDefaultAlias (0.00s)
> === RUN TestSetupCryptoServicesRethinkDBStoreNoDefaultAlias
> --- PASS: TestSetupCryptoServicesRethinkDBStoreNoDefaultAlias (0.00s)
> === RUN TestSetupCryptoServicesRethinkDBStoreConnectionFails
> --- SKIP: TestSetupCryptoServicesRethinkDBStoreConnectionFails (0.00s)
> main_test.go:121: DM - skipping malfunctioning test, fails on sbuild
> === RUN TestSetupCryptoServicesDBStoreSuccess
> --- PASS: TestSetupCryptoServicesDBStoreSuccess (0.06s)
> === RUN TestSetupCryptoServicesMemoryStore
> --- PASS: TestSetupCryptoServicesMemoryStore (0.01s)
> === RUN TestSetupCryptoServicesInvalidStore
> --- PASS: TestSetupCryptoServicesInvalidStore (0.00s)
> === RUN TestSetupGRPCServerInvalidAddress
> --- PASS: TestSetupGRPCServerInvalidAddress (0.00s)
> === RUN TestSetupGRPCServerSuccess
> --- PASS: TestSetupGRPCServerSuccess (0.00s)
> === RUN TestBootstrap
> --- PASS: TestBootstrap (0.00s)
> === RUN TestGetEnv
> --- PASS: TestGetEnv (0.00s)
> === RUN TestPassphraseRetrieverInvalid
> --- PASS: TestPassphraseRetrieverInvalid (0.00s)
> === RUN TestSampleConfig
> --- PASS: TestSampleConfig (0.00s)
> PASS
> ok github.com/theupdateframework/notary/cmd/notary-signer 0.080s
> === RUN TestGenerateCertificate
> --- PASS: TestGenerateCertificate (0.02s)
> === RUN TestCryptoServiceWithNonEmptyGUN
> --- PASS: TestCryptoServiceWithNonEmptyGUN (0.81s)
> === RUN TestCryptoServiceWithEmptyGUN
> --- PASS: TestCryptoServiceWithEmptyGUN (0.85s)
> === RUN TestCryptoSignerInterfaceBehavior
> --- PASS: TestCryptoSignerInterfaceBehavior (0.00s)
> PASS
> ok github.com/theupdateframework/notary/cryptoservice 1.690s
> === RUN TestGetPassphraseForUsingDelegationKey
> --- PASS: TestGetPassphraseForUsingDelegationKey (0.00s)
> === RUN TestGetPassphraseLimitsShortPassphrases
> --- PASS: TestGetPassphraseLimitsShortPassphrases (0.00s)
> === RUN TestGetPassphraseLimitsMismatchingPassphrases
> --- PASS: TestGetPassphraseLimitsMismatchingPassphrases (0.00s)
> === RUN TestGetPassphraseForCreatingDelegationKey
> --- PASS: TestGetPassphraseForCreatingDelegationKey (0.00s)
> === RUN TestRolePromptingAndCaching
> --- PASS: TestRolePromptingAndCaching (0.00s)
> === RUN TestPromptRetrieverNeedsTerminal
> --- PASS: TestPromptRetrieverNeedsTerminal (0.00s)
> === RUN TestGetPassphrase
> --- PASS: TestGetPassphrase (0.00s)
> PASS
> ok github.com/theupdateframework/notary/passphrase 0.004s
> ? github.com/theupdateframework/notary/proto [no test files]
> === RUN TestValidationErrorFormat
> time="2018-12-29T12:20:49Z" level=info msg="invalid update: Update sent by the client is invalid.: &{ErrBadHierarchy Metadata hierarchy is incomplete: no snapshot was included in update and server does not hold current snapshot key for repository}" go.version=go1.10.7 http.request.contenttype="multipart/form-data; boundary=6e8f4c6aa6316800bc93af0d888b759384eac84434c1dddf1e1a7399992f" http.request.host="127.0.0.1:41705" http.request.id=8c4be764-cd7a-4063-b18c-815e790ac9dd http.request.method=POST http.request.remoteaddr="127.0.0.1:54656" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.contenttype="multipart/form-data; boundary=6e8f4c6aa6316800bc93af0d888b759384eac84434c1dddf1e1a7399992f" http.request.host="127.0.0.1:41705" http.request.id=8c4be764-cd7a-4063-b18c-815e790ac9dd http.request.method=POST http.request.remoteaddr="127.0.0.1:54656" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration=1.8879ms http.response.status=400 http.response.written=260
> --- PASS: TestValidationErrorFormat (0.03s)
> === RUN TestRunBadAddr
> --- PASS: TestRunBadAddr (0.00s)
> === RUN TestRunReservedPort
> --- PASS: TestRunReservedPort (0.00s)
> === RUN TestRepoPrefixMatches
> time="2018-12-29T12:20:49Z" level=info msg="updated docker.io/notary to timestamp version 1, checksum ca429e7dbdca6c782eea878cee6c08d44e4661a3778072cf5c60228720f977a8" docker.io/notary=gun go.version=go1.10.7 http.request.contenttype="multipart/form-data; boundary=b9db9492ebe0b548aabd8c6cd6419f77ab4bad367c0f31bb2efa5509cc4b" http.request.host="127.0.0.1:33971" http.request.id=ee2d8aa4-0b55-4df4-8a5b-4b6e8122bc69 http.request.method=POST http.request.remoteaddr="127.0.0.1:35068" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.contenttype="multipart/form-data; boundary=b9db9492ebe0b548aabd8c6cd6419f77ab4bad367c0f31bb2efa5509cc4b" http.request.host="127.0.0.1:33971" http.request.id=ee2d8aa4-0b55-4df4-8a5b-4b6e8122bc69 http.request.method=POST http.request.remoteaddr="127.0.0.1:35068" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration=2.300296ms http.response.status=0 http.response.written=0
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.host="127.0.0.1:33971" http.request.id=866648d3-8b9a-4add-86a3-141b3abac0fe http.request.method=GET http.request.remoteaddr="127.0.0.1:35068" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.json http.request.useragent=Go-http-client/1.1 http.response.duration="369.515µs" http.response.status=200 http.response.written=683
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.host="127.0.0.1:33971" http.request.id=272ca3b2-83f6-47c1-9c29-d34d13eb7265 http.request.method=GET http.request.remoteaddr="127.0.0.1:35068" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.664ce526368a410814df4ae3ebba8a61cef160ff25cbb9292a2a06e2ec76fbae.json http.request.useragent=Go-http-client/1.1 http.response.duration="28.787µs" http.response.status=200 http.response.written=683
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.host="127.0.0.1:33971" http.request.id=91647e5c-4b47-40ca-b5d3-7a165c614cf8 http.request.method=GET http.request.remoteaddr="127.0.0.1:35068" http.request.uri=/v2/docker.io/notary/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="287.506µs" http.response.status=200 http.response.written=181
> time="2018-12-29T12:20:49Z" level=info msg="trust data deleted for docker.io/notary" docker.io/notary=gun go.version=go1.10.7 http.request.host="127.0.0.1:33971" http.request.id=ed763f24-5cef-4f76-a12c-83153b43c0ef http.request.method=DELETE http.request.remoteaddr="127.0.0.1:35068" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.host="127.0.0.1:33971" http.request.id=ed763f24-5cef-4f76-a12c-83153b43c0ef http.request.method=DELETE http.request.remoteaddr="127.0.0.1:35068" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration="61.146µs" http.response.status=0 http.response.written=0
> --- PASS: TestRepoPrefixMatches (0.01s)
> === RUN TestRepoPrefixDoesNotMatch
> --- PASS: TestRepoPrefixDoesNotMatch (0.01s)
> === RUN TestMetricsEndpoint
> --- PASS: TestMetricsEndpoint (0.00s)
> === RUN TestGetKeysEndpoint
> time="2018-12-29T12:20:49Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.10.7 http.request.host="127.0.0.1:37099" http.request.id=ce0e2d0b-b014-43bb-be7a-cc8bcc64a23c http.request.method=GET http.request.remoteaddr="127.0.0.1:41914" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.host="127.0.0.1:37099" http.request.id=ce0e2d0b-b014-43bb-be7a-cc8bcc64a23c http.request.method=GET http.request.remoteaddr="127.0.0.1:41914" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="153.253µs" http.response.status=404 http.response.written=104
> time="2018-12-29T12:20:49Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.10.7 http.request.host="127.0.0.1:37099" http.request.id=0e3f2c85-7ae6-4a03-9a5a-be47e2cbd33f http.request.method=GET http.request.remoteaddr="127.0.0.1:41916" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.host="127.0.0.1:37099" http.request.id=0e3f2c85-7ae6-4a03-9a5a-be47e2cbd33f http.request.method=GET http.request.remoteaddr="127.0.0.1:41916" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="153.148µs" http.response.status=404 http.response.written=104
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.host="127.0.0.1:37099" http.request.id=960d0b8d-cd42-438a-9629-8badd6c15b79 http.request.method=GET http.request.remoteaddr="127.0.0.1:41918" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="132.568µs" http.response.status=200 http.response.written=103
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.host="127.0.0.1:37099" http.request.id=e94e63a7-843f-4d8a-81a7-861ea62c087b http.request.method=GET http.request.remoteaddr="127.0.0.1:41920" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="151.387µs" http.response.status=200 http.response.written=103
> time="2018-12-29T12:20:49Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.10.7 http.request.host="127.0.0.1:37099" http.request.id=3b308113-32b2-46f6-969f-ae24ea2b6864 http.request.method=GET http.request.remoteaddr="127.0.0.1:41922" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.host="127.0.0.1:37099" http.request.id=3b308113-32b2-46f6-969f-ae24ea2b6864 http.request.method=GET http.request.remoteaddr="127.0.0.1:41922" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="69.911µs" http.response.status=404 http.response.written=104
> --- PASS: TestGetKeysEndpoint (0.00s)
> === RUN TestGetRoleByHash
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.host="127.0.0.1:43527" http.request.id=3ebaae77-9109-4818-820f-b783a2632ccc http.request.method=GET http.request.remoteaddr="127.0.0.1:46558" http.request.uri=/v2/gun/_trust/tuf/timestamp.f57177bf0c911ae5a0a92fb7a5fd0ef133a241bf9c46d931ccf7890074fe0424.json http.request.useragent=Go-http-client/1.1 http.response.duration="53.217µs" http.response.status=200 http.response.written=114
> --- PASS: TestGetRoleByHash (0.00s)
> === RUN TestGetRoleByVersion
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.host="127.0.0.1:40209" http.request.id=534cbcc7-3b60-4d06-af92-2343b6cd08f6 http.request.method=GET http.request.remoteaddr="127.0.0.1:50304" http.request.uri=/v2/gun/_trust/tuf/1.timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration="49.287µs" http.response.status=200 http.response.written=115
> --- PASS: TestGetRoleByVersion (0.00s)
> === RUN TestGetCurrentRole
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.host="127.0.0.1:38147" http.request.id=4fff5d0b-e4d6-403d-af74-ea4a98da4586 http.request.method=GET http.request.remoteaddr="127.0.0.1:58728" http.request.uri=/v2/gun/_trust/tuf/timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration="387.53µs" http.response.status=200 http.response.written=495
> --- PASS: TestGetCurrentRole (0.01s)
> === RUN TestRotateKeyEndpoint
> time="2018-12-29T12:20:49Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.10.7 http.request.contenttype=text/plain http.request.host="127.0.0.1:36787" http.request.id=2c9f7552-7cb9-4290-842a-ba09fdcc4a49 http.request.method=POST http.request.remoteaddr="127.0.0.1:57316" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.contenttype=text/plain http.request.host="127.0.0.1:36787" http.request.id=2c9f7552-7cb9-4290-842a-ba09fdcc4a49 http.request.method=POST http.request.remoteaddr="127.0.0.1:57316" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="100.309µs" http.response.status=404 http.response.written=104
> time="2018-12-29T12:20:49Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.10.7 http.request.contenttype=text/plain http.request.host="127.0.0.1:36787" http.request.id=0920a3b7-face-47c0-8f88-0c1827e3b0dc http.request.method=POST http.request.remoteaddr="127.0.0.1:57318" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.contenttype=text/plain http.request.host="127.0.0.1:36787" http.request.id=0920a3b7-face-47c0-8f88-0c1827e3b0dc http.request.method=POST http.request.remoteaddr="127.0.0.1:57318" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="94.312µs" http.response.status=404 http.response.written=104
> time="2018-12-29T12:20:49Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.10.7 http.request.contenttype=text/plain http.request.host="127.0.0.1:36787" http.request.id=0e2388f6-b226-48e6-9181-d0695e63a726 http.request.method=POST http.request.remoteaddr="127.0.0.1:57320" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.contenttype=text/plain http.request.host="127.0.0.1:36787" http.request.id=0e2388f6-b226-48e6-9181-d0695e63a726 http.request.method=POST http.request.remoteaddr="127.0.0.1:57320" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="59.163µs" http.response.status=404 http.response.written=104
> time="2018-12-29T12:20:49Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.10.7 http.request.contenttype=text/plain http.request.host="127.0.0.1:36787" http.request.id=e7849ea3-59c2-4df9-959b-17cba786fafc http.request.method=POST http.request.remoteaddr="127.0.0.1:57322" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.contenttype=text/plain http.request.host="127.0.0.1:36787" http.request.id=e7849ea3-59c2-4df9-959b-17cba786fafc http.request.method=POST http.request.remoteaddr="127.0.0.1:57322" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="54.373µs" http.response.status=404 http.response.written=104
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.contenttype=text/plain http.request.host="127.0.0.1:36787" http.request.id=b0a6c9ff-8e8d-4c6d-af30-46b639050550 http.request.method=POST http.request.remoteaddr="127.0.0.1:57324" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="169.561µs" http.response.status=200 http.response.written=103
> time="2018-12-29T12:20:49Z" level=info msg="response completed" go.version=go1.10.7 http.request.contenttype=text/plain http.request.host="127.0.0.1:36787" http.request.id=aa39f524-394f-444e-9e05-3b7b4d5f2447 http.request.method=POST http.request.remoteaddr="127.0.0.1:57326" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="151.887µs" http.response.status=200 http.response.written=103
> --- PASS: TestRotateKeyEndpoint (0.00s)
> PASS
> ok github.com/theupdateframework/notary/server 0.089s
> ? github.com/theupdateframework/notary/server/errors [no test files]
> === RUN Test_changefeed
> --- PASS: Test_changefeed (0.00s)
> === RUN Test_checkChangefeedInputs
> time="2018-12-29T12:20:50Z" level=error msg="500 GET unable to retrieve storage"
> time="2018-12-29T12:20:50Z" level=error msg="400 GET invalid pageSize: not_a_number"
> --- PASS: Test_checkChangefeedInputs (0.00s)
> === RUN TestMainHandlerGet
> time="2018-12-29T12:20:50Z" level=info msg="response completed" go.version=go1.10.7 http.request.host="127.0.0.1:33015" http.request.id=35fbfc42-de28-4680-8f0b-e60316f35bff http.request.method=GET http.request.remoteaddr="127.0.0.1:35318" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.duration="45.725µs" http.response.status=200 http.response.written=2
> --- PASS: TestMainHandlerGet (0.00s)
> === RUN TestMainHandlerNotGet
> time="2018-12-29T12:20:50Z" level=info msg="generic not found: You have requested a resource that does not exist.: <nil>" go.version=go1.10.7 http.request.host="127.0.0.1:33763" http.request.id=437fd76c-1b57-42f6-8eb1-f4ea0de09237 http.request.method=HEAD http.request.remoteaddr="127.0.0.1:57994" http.request.uri=/ http.request.useragent=Go-http-client/1.1
> time="2018-12-29T12:20:50Z" level=info msg="response completed" go.version=go1.10.7 http.request.host="127.0.0.1:33763" http.request.id=437fd76c-1b57-42f6-8eb1-f4ea0de09237 http.request.method=HEAD http.request.remoteaddr="127.0.0.1:57994" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="172.824µs" http.response.status=404 http.response.written=105
> --- PASS: TestMainHandlerNotGet (0.00s)
> === RUN TestKeyHandlersInvalidConfiguration
> time="2018-12-29T12:20:50Z" level=error msg="500 GET crypto service not configured" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=error msg="500 GET crypto service not configured" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=error msg="500 GET key algorithm not configured" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=error msg="500 GET key algorithm not configured" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=error msg="500 GET storage not configured" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=error msg="500 GET storage not configured" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=error msg="500 POST storage not configured" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=error msg="500 POST storage not configured" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=error msg="500 POST crypto service not configured" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=error msg="500 POST crypto service not configured" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=error msg="500 POST key algorithm not configured" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=error msg="500 POST key algorithm not configured" go.version=go1.10.7 gun=gun
> --- PASS: TestKeyHandlersInvalidConfiguration (0.00s)
> === RUN TestKeyHandlersNoRoleOrRepo
> time="2018-12-29T12:20:50Z" level=info msg="400 GET no gun in request" =gun go.version=go1.10.7
> time="2018-12-29T12:20:50Z" level=info msg="400 GET no gun in request" =gun go.version=go1.10.7
> time="2018-12-29T12:20:50Z" level=info msg="400 GET no role in request" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=info msg="400 GET no role in request" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=info msg="400 POST no gun in request" =gun go.version=go1.10.7
> time="2018-12-29T12:20:50Z" level=info msg="400 POST no gun in request" =gun go.version=go1.10.7
> time="2018-12-29T12:20:50Z" level=info msg="400 POST no role in request" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=info msg="400 POST no role in request" go.version=go1.10.7 gun=gun
> --- PASS: TestKeyHandlersNoRoleOrRepo (0.00s)
> === RUN TestKeyHandlersInvalidRole
> time="2018-12-29T12:20:50Z" level=info msg="400 GET root key: <nil>" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=info msg="400 GET targets key: <nil>" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=info msg="400 GET targets/a key: <nil>" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=info msg="400 GET invalidrole key: <nil>" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=info msg="400 POST root key: <nil>" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=info msg="400 POST targets key: <nil>" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=info msg="400 POST targets/a key: <nil>" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=info msg="400 POST invalidrole key: <nil>" go.version=go1.10.7 gun=gun
> --- PASS: TestKeyHandlersInvalidRole (0.00s)
> === RUN TestGetKeyHandlerCreatesOnce
> --- PASS: TestGetKeyHandlerCreatesOnce (0.00s)
> === RUN TestKeyHandlersInvalidKeyAlgo
> time="2018-12-29T12:20:50Z" level=error msg="500 GET timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=error msg="500 GET snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=error msg="500 POST timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.10.7 gun=gun
> time="2018-12-29T12:20:50Z" level=error msg="500 POST snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.10.7 gun=gun
> --- PASS: TestKeyHandlersInvalidKeyAlgo (0.00s)
> === RUN TestRotateKeyHandlerSuccessfulRotation
> --- PASS: TestRotateKeyHandlerSuccessfulRotation (0.00s)
> === RUN TestGetHandlerRoot
> time="2018-12-29T12:20:50Z" level=info msg="404 GET root role" go.version=go1.10.7 gun=gun
> --- PASS: TestGetHandlerRoot (0.02s)
> === RUN TestGetHandlerTimestamp
> --- PASS: TestGetHandlerTimestamp (0.00s)
> === RUN TestGetHandlerSnapshot
> --- PASS: TestGetHandlerSnapshot (0.00s)
> === RUN TestGetHandler404
> time="2018-12-29T12:20:50Z" level=info msg="404 GET root role" go.version=go1.10.7 gun=gun
> --- PASS: TestGetHandler404 (0.00s)
> === RUN TestGetHandlerNilData
> time="2018-12-29T12:20:50Z" level=info msg="404 GET root role" go.version=go1.10.7 gun=gun
> --- PASS: TestGetHandlerNilData (0.00s)
> === RUN TestGetHandlerNoStorage
> time="2018-12-29T12:20:50Z" level=error msg="500 GET: no storage exists" =gun go.version=go1.10.7
> --- PASS: TestGetHandlerNoStorage (0.00s)
> === RUN TestAtomicUpdateValidationFailurePropagated
> --- PASS: TestAtomicUpdateValidationFailurePropagated (0.01s)
> === RUN TestAtomicUpdateNonValidationFailureNotPropagated
> time="2018-12-29T12:20:50Z" level=info msg="400 POST error validating update" go.version=go1.10.7 testGUN=gun
> --- PASS: TestAtomicUpdateNonValidationFailureNotPropagated (0.01s)
> === RUN TestAtomicUpdateVersionErrorPropagated
> time="2018-12-29T12:20:50Z" level=info msg="400 POST old version error" go.version=go1.10.7 testGUN=gun
> --- PASS: TestAtomicUpdateVersionErrorPropagated (0.01s)
> === RUN TestGetMaybeServerSignedNoCrypto
> --- PASS: TestGetMaybeServerSignedNoCrypto (0.00s)
> === RUN TestGetMaybeServerSignedNoKey
> --- PASS: TestGetMaybeServerSignedNoKey (0.00s)
> === RUN TestValidateEmptyNew
> --- PASS: TestValidateEmptyNew (0.01s)
> === RUN TestValidateRootCanContainOnlyx509KeysWithRightGun
> --- PASS: TestValidateRootCanContainOnlyx509KeysWithRightGun (0.01s)
> === RUN TestValidatePrevTimestamp
> --- PASS: TestValidatePrevTimestamp (0.01s)
> === RUN TestValidatePreviousTimestampCorrupt
> time="2018-12-29T12:20:50Z" level=error msg="Failed to unmarshal existing timestamp for GUN docker.com/notary"
> --- PASS: TestValidatePreviousTimestampCorrupt (0.01s)
> === RUN TestValidateGetCurrentTimestampBroken
> --- PASS: TestValidateGetCurrentTimestampBroken (0.01s)
> === RUN TestValidateNoNewRoot
> --- PASS: TestValidateNoNewRoot (0.01s)
> === RUN TestValidateNoNewTargets
> --- PASS: TestValidateNoNewTargets (0.01s)
> === RUN TestValidateOnlySnapshot
> --- PASS: TestValidateOnlySnapshot (0.01s)
> === RUN TestValidateOldRoot
> --- PASS: TestValidateOldRoot (0.01s)
> === RUN TestValidateOldRootCorrupt
> --- PASS: TestValidateOldRootCorrupt (0.01s)
> === RUN TestValidateOldRootCorruptRootRole
> --- PASS: TestValidateOldRootCorruptRootRole (0.01s)
> === RUN TestValidateRootGetCurrentRootBroken
> --- PASS: TestValidateRootGetCurrentRootBroken (0.01s)
> === RUN TestValidateRootRotationWithOldSigs
> --- PASS: TestValidateRootRotationWithOldSigs (0.03s)
> === RUN TestValidateRootRotationMultipleKeysThreshold1
> --- PASS: TestValidateRootRotationMultipleKeysThreshold1 (0.02s)
> === RUN TestRootRotationNotSignedWithOldKeysForOldRole
> --- PASS: TestRootRotationNotSignedWithOldKeysForOldRole (0.02s)
> === RUN TestRootRotationVersionIncrement
> --- PASS: TestRootRotationVersionIncrement (0.02s)
> === RUN TestValidateNoRoot
> --- PASS: TestValidateNoRoot (0.01s)
> === RUN TestValidateSnapshotMissingNoSnapshotKey
> --- PASS: TestValidateSnapshotMissingNoSnapshotKey (0.01s)
> === RUN TestValidateSnapshotGenerateNoPrev
> --- PASS: TestValidateSnapshotGenerateNoPrev (0.01s)
> === RUN TestValidateSnapshotGenerateWithPrev
> --- PASS: TestValidateSnapshotGenerateWithPrev (0.01s)
> === RUN TestValidateSnapshotGeneratePrevCorrupt
> time="2018-12-29T12:20:50Z" level=error msg="Failed to unmarshal existing snapshot for GUN docker.com/notary"
> --- PASS: TestValidateSnapshotGeneratePrevCorrupt (0.01s)
> === RUN TestValidateSnapshotGenerateStoreGetCurrentSnapshotBroken
> --- PASS: TestValidateSnapshotGenerateStoreGetCurrentSnapshotBroken (0.01s)
> === RUN TestValidateSnapshotGenerateNoTargets
> --- PASS: TestValidateSnapshotGenerateNoTargets (0.02s)
> === RUN TestValidateSnapshotGenerate
> --- PASS: TestValidateSnapshotGenerate (0.01s)
> === RUN TestValidateRootNoTimestampKey
> --- PASS: TestValidateRootNoTimestampKey (0.00s)
> === RUN TestValidateRootInvalidTimestampKey
> --- PASS: TestValidateRootInvalidTimestampKey (0.00s)
> === RUN TestValidateRootInvalidTimestampThreshold
> --- PASS: TestValidateRootInvalidTimestampThreshold (0.01s)
> === RUN TestValidateRootInvalidZeroThreshold
> --- PASS: TestValidateRootInvalidZeroThreshold (0.03s)
> === RUN TestValidateRootRoleMissing
> --- PASS: TestValidateRootRoleMissing (0.01s)
> === RUN TestValidateTargetsRoleMissing
> --- PASS: TestValidateTargetsRoleMissing (0.01s)
> === RUN TestValidateSnapshotRoleMissing
> --- PASS: TestValidateSnapshotRoleMissing (0.01s)
> === RUN TestValidateRootSigMissing
> --- PASS: TestValidateRootSigMissing (0.01s)
> === RUN TestValidateTargetsSigMissing
> time="2018-12-29T12:20:50Z" level=error msg="ErrBadTargets: tuf: data has no signatures"
> --- PASS: TestValidateTargetsSigMissing (0.01s)
> === RUN TestValidateSnapshotSigMissing
> --- PASS: TestValidateSnapshotSigMissing (0.01s)
> === RUN TestValidateRootCorrupt
> --- PASS: TestValidateRootCorrupt (0.01s)
> === RUN TestValidateTargetsCorrupt
> time="2018-12-29T12:20:50Z" level=error msg="ErrBadTargets: invalid character '\\u0084' looking for beginning of value"
> --- PASS: TestValidateTargetsCorrupt (0.01s)
> === RUN TestValidateSnapshotCorrupt
> --- PASS: TestValidateSnapshotCorrupt (0.01s)
> === RUN TestValidateRootModifiedSize
> --- PASS: TestValidateRootModifiedSize (0.01s)
> === RUN TestValidateTargetsModifiedSize
> --- PASS: TestValidateTargetsModifiedSize (0.01s)
> === RUN TestValidateRootModifiedHash
> --- PASS: TestValidateRootModifiedHash (0.01s)
> === RUN TestValidateTargetsModifiedHash
> --- PASS: TestValidateTargetsModifiedHash (0.01s)
> === RUN TestGenerateSnapshotRootNotLoaded
> --- PASS: TestGenerateSnapshotRootNotLoaded (0.00s)
> === RUN TestGenerateSnapshotNoKey
> --- PASS: TestGenerateSnapshotNoKey (0.00s)
> === RUN TestLoadTargetsLoadsNothingIfNoUpdates
> --- PASS: TestLoadTargetsLoadsNothingIfNoUpdates (0.01s)
> === RUN TestValidateTargetsRequiresStoredParent
> time="2018-12-29T12:20:50Z" level=error msg="ErrBadTargets: targets must be loaded first"
> --- PASS: TestValidateTargetsRequiresStoredParent (0.01s)
> === RUN TestValidateTargetsParentInUpdate
> time="2018-12-29T12:20:50Z" level=error msg="ErrBadTargets: invalid character 'I' looking for beginning of value"
> --- PASS: TestValidateTargetsParentInUpdate (0.00s)
> === RUN TestValidateTargetsRoleNotInParent
> time="2018-12-29T12:20:50Z" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist"
> time="2018-12-29T12:20:50Z" level=error msg="ErrBadTargets: targets has already been loaded"
> time="2018-12-29T12:20:50Z" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist"
> --- PASS: TestValidateTargetsRoleNotInParent (0.01s)
> PASS
> ok github.com/theupdateframework/notary/server/handlers 0.554s
> === RUN TestSnapshotExpired
> --- PASS: TestSnapshotExpired (0.00s)
> === RUN TestSnapshotNotExpired
> --- PASS: TestSnapshotNotExpired (0.00s)
> === RUN TestGetSnapshotKeyCreate
> --- PASS: TestGetSnapshotKeyCreate (0.00s)
> === RUN TestGetSnapshotKeyCreateWithFailingStore
> time="2018-12-29T12:20:50Z" level=error msg="Error when retrieving root role for GUN gun: failing store failed"
> --- PASS: TestGetSnapshotKeyCreateWithFailingStore (0.00s)
> === RUN TestGetSnapshotKeyCreateWithCorruptedStore
> time="2018-12-29T12:20:50Z" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve snapshot key ID"
> --- PASS: TestGetSnapshotKeyCreateWithCorruptedStore (0.00s)
> === RUN TestGetSnapshotKeyCreateWithInvalidAlgo
> --- PASS: TestGetSnapshotKeyCreateWithInvalidAlgo (0.00s)
> === RUN TestGetSnapshotKeyExistingMetadata
> --- PASS: TestGetSnapshotKeyExistingMetadata (0.03s)
> === RUN TestGetSnapshotNoPreviousSnapshot
> time="2018-12-29T12:20:50Z" level=error msg="Failed to unmarshal existing snapshot for GUN gun"
> --- PASS: TestGetSnapshotNoPreviousSnapshot (0.00s)
> === RUN TestGetSnapshotReturnsPreviousSnapshotIfUnexpired
> --- PASS: TestGetSnapshotReturnsPreviousSnapshotIfUnexpired (0.00s)
> === RUN TestGetSnapshotOldSnapshotExpired
> --- PASS: TestGetSnapshotOldSnapshotExpired (0.00s)
> === RUN TestCannotMakeNewSnapshotIfNoRoot
> --- PASS: TestCannotMakeNewSnapshotIfNoRoot (0.00s)
> === RUN TestCreateSnapshotNoKeyInCrypto
> --- PASS: TestCreateSnapshotNoKeyInCrypto (0.00s)
> PASS
> ok github.com/theupdateframework/notary/server/snapshot 0.043s
> === RUN TestMemoryUpdateCurrentEmpty
> --- PASS: TestMemoryUpdateCurrentEmpty (0.00s)
> === RUN TestMemoryUpdateCurrentVersionCheckOldVersionExists
> --- PASS: TestMemoryUpdateCurrentVersionCheckOldVersionExists (0.00s)
> === RUN TestMemoryUpdateCurrentVersionCheckOldVersionNotExist
> --- PASS: TestMemoryUpdateCurrentVersionCheckOldVersionNotExist (0.00s)
> === RUN TestMemoryUpdateManyNoConflicts
> --- PASS: TestMemoryUpdateManyNoConflicts (0.00s)
> === RUN TestMemoryUpdateManyConflictRollback
> --- PASS: TestMemoryUpdateManyConflictRollback (0.00s)
> === RUN TestMemoryDeleteSuccess
> --- PASS: TestMemoryDeleteSuccess (0.00s)
> === RUN TestGetCurrent
> --- PASS: TestGetCurrent (0.00s)
> === RUN TestGetChecksumNotFound
> --- PASS: TestGetChecksumNotFound (0.00s)
> === RUN TestMemoryGetChanges
> --- PASS: TestMemoryGetChanges (0.00s)
> === RUN TestGetVersion
> --- PASS: TestGetVersion (0.00s)
> === RUN TestRDBTUFFileJSONUnmarshalling
> --- PASS: TestRDBTUFFileJSONUnmarshalling (0.00s)
> === RUN TestRDBTUFFileJSONUnmarshallingFailure
> --- PASS: TestRDBTUFFileJSONUnmarshallingFailure (0.00s)
> === RUN TestSQLUpdateCurrentEmpty
> --- PASS: TestSQLUpdateCurrentEmpty (0.07s)
> === RUN TestSQLUpdateCurrentVersionCheckOldVersionExists
> --- PASS: TestSQLUpdateCurrentVersionCheckOldVersionExists (0.03s)
> === RUN TestSQLUpdateCurrentVersionCheckOldVersionNotExist
> --- PASS: TestSQLUpdateCurrentVersionCheckOldVersionNotExist (0.03s)
> === RUN TestSQLUpdateManyNoConflicts
> --- PASS: TestSQLUpdateManyNoConflicts (0.05s)
> === RUN TestSQLUpdateManyConflictRollback
> --- PASS: TestSQLUpdateManyConflictRollback (0.03s)
> === RUN TestSQLDelete
> --- PASS: TestSQLDelete (0.04s)
> === RUN TestSQLDBCheckHealthTableMissing
> --- PASS: TestSQLDBCheckHealthTableMissing (0.02s)
> === RUN TestSQLDBCheckHealthDBConnectionFail
> --- PASS: TestSQLDBCheckHealthDBConnectionFail (0.02s)
> === RUN TestSQLDBCheckHealthSucceeds
> --- PASS: TestSQLDBCheckHealthSucceeds (0.02s)
> === RUN TestSQLDBGetChecksum
> --- PASS: TestSQLDBGetChecksum (0.03s)
> === RUN TestSQLDBGetChecksumNotFound
> --- PASS: TestSQLDBGetChecksumNotFound (0.02s)
> === RUN TestSQLTUFMetaStoreGetCurrent
> --- PASS: TestSQLTUFMetaStoreGetCurrent (0.07s)
> === RUN TestSQLGetChanges
> --- PASS: TestSQLGetChanges (0.07s)
> === RUN TestSQLDBGetVersion
> --- PASS: TestSQLDBGetVersion (0.02s)
> PASS
> ok github.com/theupdateframework/notary/server/storage 0.504s
> === RUN TestTimestampExpired
> --- PASS: TestTimestampExpired (0.00s)
> === RUN TestTimestampNotExpired
> --- PASS: TestTimestampNotExpired (0.00s)
> === RUN TestGetTimestampKey
> --- PASS: TestGetTimestampKey (0.00s)
> === RUN TestGetTimestampNoPreviousTimestamp
> time="2018-12-29T12:20:52Z" level=error msg="Failed to unmarshal existing timestamp"
> --- PASS: TestGetTimestampNoPreviousTimestamp (0.06s)
> === RUN TestGetTimestampReturnsPreviousTimestampIfUnexpired
> --- PASS: TestGetTimestampReturnsPreviousTimestampIfUnexpired (0.00s)
> === RUN TestGetTimestampOldTimestampExpired
> --- PASS: TestGetTimestampOldTimestampExpired (0.00s)
> === RUN TestCannotMakeNewTimestampIfNoRootOrSnapshot
> time="2018-12-29T12:20:52Z" level=error msg="Failed to create a new timestamp"
> time="2018-12-29T12:20:52Z" level=error msg="Failed to create a new timestamp"
> --- PASS: TestCannotMakeNewTimestampIfNoRootOrSnapshot (0.01s)
> === RUN TestCreateTimestampNoKeyInCrypto
> time="2018-12-29T12:20:52Z" level=error msg="Failed to create a new timestamp"
> --- PASS: TestCreateTimestampNoKeyInCrypto (0.00s)
> === RUN TestGetTimestampKeyCreateWithFailingStore
> time="2018-12-29T12:20:52Z" level=error msg="Error when retrieving root role for GUN gun: failing store failed"
> --- PASS: TestGetTimestampKeyCreateWithFailingStore (0.00s)
> === RUN TestGetTimestampKeyCreateWithCorruptedStore
> time="2018-12-29T12:20:52Z" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve timestamp key ID"
> --- PASS: TestGetTimestampKeyCreateWithCorruptedStore (0.00s)
> === RUN TestGetTimestampKeyCreateWithInvalidAlgo
> --- PASS: TestGetTimestampKeyCreateWithInvalidAlgo (0.00s)
> === RUN TestGetTimestampKeyExistingMetadata
> --- PASS: TestGetTimestampKeyExistingMetadata (0.01s)
> PASS
> ok github.com/theupdateframework/notary/server/timestamp 0.107s
> === RUN TestHealthCheckKMUnhealthy
> --- PASS: TestHealthCheckKMUnhealthy (0.00s)
> === RUN TestHealthCheckSignerUnhealthy
> --- PASS: TestHealthCheckSignerUnhealthy (0.00s)
> === RUN TestHealthCheckKMTimeout
> --- PASS: TestHealthCheckKMTimeout (0.00s)
> === RUN TestHealthCheckSignerTimeout
> --- PASS: TestHealthCheckSignerTimeout (0.00s)
> === RUN TestHealthCheckKMHealthy
> --- PASS: TestHealthCheckKMHealthy (0.00s)
> === RUN TestHealthCheckSignerHealthy
> --- PASS: TestHealthCheckSignerHealthy (0.00s)
> === RUN TestHealthCheckKMConnectionDied
> --- PASS: TestHealthCheckKMConnectionDied (0.00s)
> === RUN TestHealthCheckSignerConnectionDied
> --- PASS: TestHealthCheckSignerConnectionDied (0.00s)
> === RUN TestHealthCheckForOverallStatus
> --- PASS: TestHealthCheckForOverallStatus (0.00s)
> === RUN TestHealthCheckNonexistentService
> --- PASS: TestHealthCheckNonexistentService (0.00s)
> === RUN TestGetPrivateKeyAndSignWithExistingKey
> time="2018-12-29T12:20:53Z" level=info msg="Sign: Signed message! with KeyID b4f951fe4d1bc2ac750f0d2e4dbddfc21ef0f037fb45f49953d96ede5b31bb5a" go.version=go1.10.7
> --- PASS: TestGetPrivateKeyAndSignWithExistingKey (0.03s)
> === RUN TestCannotSignWithKeyThatDoesntExist
> time="2018-12-29T12:20:53Z" level=error msg="Sign: key 59315e8cb9d710341a41a5aecfe6f023c065a9258c80573eea710594ee341818 not found" go.version=go1.10.7
> --- PASS: TestCannotSignWithKeyThatDoesntExist (0.00s)
> === RUN TestCryptoSignerInterfaceBehavior
> time="2018-12-29T12:20:53Z" level=error msg="GetKeyInfo: key nonexistent not found" go.version=go1.10.7
> time="2018-12-29T12:20:53Z" level=error msg="GetKeyInfo: key nonexistent not found" go.version=go1.10.7
> time="2018-12-29T12:20:53Z" level=info msg="CreateKey: Created KeyID ea68d6ceb243d108ecd72003d17533481ebb0bba33faec47fa21cf9aac827a41" go.version=go1.10.7
> time="2018-12-29T12:20:53Z" level=info msg="CreateKey: Created KeyID 8cc6e0b0d88b5b17777043eda58647d2e610a01d2e4f2901010ff6a9cc11860c" go.version=go1.10.7
> time="2018-12-29T12:20:53Z" level=error msg="GetKeyInfo: key ea68d6ceb243d108ecd72003d17533481ebb0bba33faec47fa21cf9aac827a41 not found" go.version=go1.10.7
> time="2018-12-29T12:20:53Z" level=error msg="GetKeyInfo: key 8cc6e0b0d88b5b17777043eda58647d2e610a01d2e4f2901010ff6a9cc11860c not found" go.version=go1.10.7
> --- PASS: TestCryptoSignerInterfaceBehavior (0.01s)
> PASS
> ok github.com/theupdateframework/notary/signer 0.053s
> ? github.com/theupdateframework/notary/signer/api [no test files]
> ? github.com/theupdateframework/notary/signer/client [no test files]
> === RUN TestGetSuccessPopulatesCache
> --- PASS: TestGetSuccessPopulatesCache (0.03s)
> === RUN TestAddKeyPopulatesCacheIfSuccessful
> --- PASS: TestAddKeyPopulatesCacheIfSuccessful (0.01s)
> === RUN TestDeleteKeyRemovesKeyFromCache
> --- PASS: TestDeleteKeyRemovesKeyFromCache (0.01s)
> === RUN TestRDBPrivateKeyJSONUnmarshalling
> --- PASS: TestRDBPrivateKeyJSONUnmarshalling (0.00s)
> === RUN TestRDBPrivateKeyJSONUnmarshallingFailure
> --- PASS: TestRDBPrivateKeyJSONUnmarshallingFailure (0.00s)
> === RUN TestNewSQLKeyDBStorePropagatesDBError
> `nodb` is not officially supported, running under compatibility mode.
> --- PASS: TestNewSQLKeyDBStorePropagatesDBError (0.00s)
> === RUN TestSQLDBHealthCheckMissingTable
> --- PASS: TestSQLDBHealthCheckMissingTable (0.02s)
> === RUN TestSQLDBHealthCheckNoConnection
> --- PASS: TestSQLDBHealthCheckNoConnection (0.01s)
> === RUN TestSQLKeyCanOnlyBeAddedOnce
>
>
> [35m(UNIQUE constraint failed: private_keys.key_id)[0m
> [33m[2018-12-29 12:20:54][0m [31;1m [0m
> --- PASS: TestSQLKeyCanOnlyBeAddedOnce (0.11s)
> === RUN TestSQLCreateDelete
> --- PASS: TestSQLCreateDelete (0.12s)
> === RUN TestSQLKeyRotation
> --- PASS: TestSQLKeyRotation (0.16s)
> === RUN TestSQLSigningMarksKeyActive
> time="2018-12-29T12:20:55Z" level=error msg="Key 495ef01081346e90172348fe1b3d371e75084bea0606659509e8d46718fdbedb was just used to sign hash successful, db closed, error when trying to mark key as active: sql: database is closed"
>
>
> [35m(sql: database is closed)[0m
> [33m[2018-12-29 12:20:55][0m [31;1m [0m
> --- PASS: TestSQLSigningMarksKeyActive (0.19s)
> === RUN TestSQLCreateKey
> --- PASS: TestSQLCreateKey (0.17s)
> === RUN TestSQLUnimplementedInterfaceBehavior
> --- PASS: TestSQLUnimplementedInterfaceBehavior (0.08s)
> PASS
> ok github.com/theupdateframework/notary/signer/keydbstore 0.917s
> === RUN TestSet
> --- PASS: TestSet (0.00s)
> === RUN TestSetWithNoParentDirectory
> --- PASS: TestSetWithNoParentDirectory (0.00s)
> === RUN TestSetRemovesExistingFileBeforeWriting
> --- PASS: TestSetRemovesExistingFileBeforeWriting (0.00s)
> === RUN TestGetSized
> --- PASS: TestGetSized (0.00s)
> === RUN TestGetSizedSet
> --- PASS: TestGetSizedSet (0.00s)
> === RUN TestRemove
> --- PASS: TestRemove (0.00s)
> === RUN TestRemoveAll
> --- PASS: TestRemoveAll (0.00s)
> === RUN TestAddFile
> --- PASS: TestAddFile (0.00s)
> === RUN TestRemoveFile
> --- PASS: TestRemoveFile (0.00s)
> === RUN TestListFiles
> --- PASS: TestListFiles (0.00s)
> === RUN TestGetPath
> --- PASS: TestGetPath (0.00s)
> === RUN TestGetPathProtection
> --- PASS: TestGetPathProtection (0.00s)
> === RUN TestGetData
> --- PASS: TestGetData (0.00s)
> === RUN TestCreateDirectory
> --- PASS: TestCreateDirectory (0.00s)
> === RUN TestCreatePrivateDirectory
> --- PASS: TestCreatePrivateDirectory (0.00s)
> === RUN TestFileStoreConsistency
> --- PASS: TestFileStoreConsistency (0.00s)
> === RUN TestHTTPStoreGetSized
> --- PASS: TestHTTPStoreGetSized (0.00s)
> === RUN TestHTTPStoreGetAllMeta
> --- PASS: TestHTTPStoreGetAllMeta (0.00s)
> === RUN TestSetSingleAndSetMultiMeta
> --- PASS: TestSetSingleAndSetMultiMeta (0.00s)
> === RUN Test404Error
> --- PASS: Test404Error (0.00s)
> === RUN Test50XErrors
> --- PASS: Test50XErrors (0.00s)
> === RUN Test400Error
> --- PASS: Test400Error (0.00s)
> === RUN TestTranslateErrorsParse400Errors
> --- PASS: TestTranslateErrorsParse400Errors (0.00s)
> === RUN TestTranslateErrorsWhenCannotParse400
> --- PASS: TestTranslateErrorsWhenCannotParse400 (0.00s)
> === RUN TestTranslateErrorsLimitsErrorSize
> --- PASS: TestTranslateErrorsLimitsErrorSize (0.00s)
> === RUN TestHTTPStoreRemoveAll
> --- PASS: TestHTTPStoreRemoveAll (0.00s)
> === RUN TestHTTPStoreRotateKey
> --- PASS: TestHTTPStoreRotateKey (0.00s)
> === RUN TestHTTPStoreGetKey
> --- PASS: TestHTTPStoreGetKey (0.00s)
> === RUN TestHTTPStoreGetRotateKeySizeLimited
> --- PASS: TestHTTPStoreGetRotateKeySizeLimited (0.01s)
> === RUN TestHTTPOffline
> --- PASS: TestHTTPOffline (0.00s)
> === RUN TestErrServerUnavailable
> --- PASS: TestErrServerUnavailable (0.00s)
> === RUN TestNetworkError
> time="2018-12-29T12:20:54Z" level=error msg="unescape network error message failed: invalid URL escape \"%GA\""
> --- PASS: TestNetworkError (0.00s)
> === RUN TestMemoryStoreMetadataOperations
> --- PASS: TestMemoryStoreMetadataOperations (0.00s)
> === RUN TestMemoryStoreGetSized
> --- PASS: TestMemoryStoreGetSized (0.00s)
> === RUN TestOfflineStore
> --- PASS: TestOfflineStore (0.00s)
> === RUN TestErrOffline
> --- PASS: TestErrOffline (0.00s)
> === RUN TestMemoryStoreMetadata
> --- PASS: TestMemoryStoreMetadata (0.00s)
> PASS
> ok github.com/theupdateframework/notary/storage 0.023s
> ? github.com/theupdateframework/notary/storage/rethinkdb [no test files]
> === RUN TestExportKeys
> --- PASS: TestExportKeys (0.00s)
> === RUN TestExportKeysByGUN
> --- PASS: TestExportKeysByGUN (0.00s)
> === RUN TestExportKeysByID
> --- PASS: TestExportKeysByID (0.00s)
> === RUN TestExport2InOneFile
> --- PASS: TestExport2InOneFile (0.00s)
> === RUN TestImportKeys
> --- PASS: TestImportKeys (0.00s)
> === RUN TestImportNoPath
> --- PASS: TestImportNoPath (0.01s)
> === RUN TestNonRootPathInference
> --- PASS: TestNonRootPathInference (0.00s)
> === RUN TestBlockHeaderPrecedenceRoleAndGun
> --- PASS: TestBlockHeaderPrecedenceRoleAndGun (0.00s)
> === RUN TestBlockHeaderPrecedenceGunFromPath
> --- PASS: TestBlockHeaderPrecedenceGunFromPath (0.00s)
> === RUN TestImportKeys2InOneFile
> --- PASS: TestImportKeys2InOneFile (0.00s)
> === RUN TestImportKeys2InOneFileNoPath
> --- PASS: TestImportKeys2InOneFileNoPath (0.01s)
> === RUN TestEncryptedKeyImportFail
> time="2018-12-29T12:20:55Z" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header"
> --- PASS: TestEncryptedKeyImportFail (0.03s)
> === RUN TestEncryptedKeyImportSuccess
> --- PASS: TestEncryptedKeyImportSuccess (0.01s)
> === RUN TestEncryption
> --- PASS: TestEncryption (0.01s)
> === RUN TestAddKey
> --- PASS: TestAddKey (0.02s)
> === RUN TestKeyStoreInternalState
> --- PASS: TestKeyStoreInternalState (0.01s)
> === RUN TestGet
> --- PASS: TestGet (0.02s)
> === RUN TestGetLegacyKey
> --- PASS: TestGetLegacyKey (0.00s)
> === RUN TestListKeys
> --- PASS: TestListKeys (0.03s)
> === RUN TestAddGetKeyMemStore
> --- PASS: TestAddGetKeyMemStore (0.01s)
> === RUN TestAddGetKeyInfoMemStore
> --- PASS: TestAddGetKeyInfoMemStore (0.02s)
> === RUN TestGetDecryptedWithTamperedCipherText
> time="2018-12-29T12:20:55Z" level=error msg="PEM block is empty"
> --- PASS: TestGetDecryptedWithTamperedCipherText (0.01s)
> === RUN TestGetDecryptedWithInvalidPassphrase
> --- PASS: TestGetDecryptedWithInvalidPassphrase (0.02s)
> === RUN TestGetDecryptedWithConsistentlyInvalidPassphrase
> --- PASS: TestGetDecryptedWithConsistentlyInvalidPassphrase (0.06s)
> === RUN TestRemoveKey
> --- PASS: TestRemoveKey (0.03s)
> === RUN TestKeysAreCached
> --- PASS: TestKeysAreCached (0.01s)
> PASS
> ok github.com/theupdateframework/notary/trustmanager 0.308s
> === RUN TestRemoteStore
> time="2018-12-29T12:20:56Z" level=info msg="listing files from localhost:9888"
> time="2018-12-29T12:20:56Z" level=info msg="listing files from localhost:9888"
> --- PASS: TestRemoteStore (0.03s)
> === RUN TestErrors
> time="2018-12-29T12:20:56Z" level=error msg="failed to store: test error"
> --- PASS: TestErrors (0.03s)
> client_test.go:99: server errored %!s(<nil>)
> === RUN TestNewGRPCStorage
> --- PASS: TestNewGRPCStorage (0.00s)
> === RUN TestGRPCStorage
> --- PASS: TestGRPCStorage (0.00s)
> PASS
> ok github.com/theupdateframework/notary/trustmanager/remoteks 0.064s
> ? github.com/theupdateframework/notary/trustmanager/yubikey [no test files]
> === RUN TestWildcardMatch
> --- PASS: TestWildcardMatch (0.00s)
> === RUN TestValidateRoot
> 2018/12/29 12:20:58 [INFO] generate received request
> 2018/12/29 12:20:58 [INFO] received CSR
> 2018/12/29 12:20:58 [INFO] generating key: ecdsa-256
> 2018/12/29 12:20:58 [INFO] encoded CSR
> 2018/12/29 12:20:58 [INFO] signed certificate with serial number 45185332588344922231864539850858683734584407336
> 2018/12/29 12:20:58 [INFO] received CSR
> 2018/12/29 12:20:58 [INFO] generating key: ecdsa-256
> 2018/12/29 12:20:58 [INFO] encoded CSR
> 2018/12/29 12:20:58 [INFO] signed certificate with serial number 121517827157730433141322849477567883697444292518
> 2018/12/29 12:20:58 [INFO] received CSR
> 2018/12/29 12:20:58 [INFO] generating key: ecdsa-256
> 2018/12/29 12:20:58 [INFO] encoded CSR
> 2018/12/29 12:20:58 [INFO] signed certificate with serial number 170911467481353189188493540735697086196811489108
> --- PASS: TestValidateRoot (0.03s)
> === RUN TestValidateRootWithoutTOFUS
> --- PASS: TestValidateRootWithoutTOFUS (0.00s)
> === RUN TestValidateRootWithPinnedCert
> --- PASS: TestValidateRootWithPinnedCert (0.00s)
> === RUN TestValidateRootWithPinnedCertAndIntermediates
> --- PASS: TestValidateRootWithPinnedCertAndIntermediates (0.01s)
> === RUN TestValidateRootFailuresWithPinnedCert
> --- PASS: TestValidateRootFailuresWithPinnedCert (0.00s)
> === RUN TestValidateRootWithPinnedCA
> time="2018-12-29T12:20:58Z" level=warning msg="certificate with CN notary-signer is near expiry"
> time="2018-12-29T12:20:58Z" level=warning msg="certificate with CN notary-signer is near expiry"
> time="2018-12-29T12:20:58Z" level=warning msg="certificate with CN notary-signer is near expiry"
> time="2018-12-29T12:20:58Z" level=warning msg="certificate with CN notary-signer is near expiry"
> --- PASS: TestValidateRootWithPinnedCA (0.04s)
> === RUN TestValidateSuccessfulRootRotation
> --- PASS: TestValidateSuccessfulRootRotation (0.04s)
> === RUN TestValidateRootRotationMissingOrigSig
> --- PASS: TestValidateRootRotationMissingOrigSig (0.04s)
> === RUN TestValidateRootRotationMissingNewSig
> --- PASS: TestValidateRootRotationMissingNewSig (0.05s)
> === RUN TestValidateRootRotationTrustPinning
> --- PASS: TestValidateRootRotationTrustPinning (0.04s)
> === RUN TestValidateRootRotationTrustPinningInvalidCA
> --- PASS: TestValidateRootRotationTrustPinningInvalidCA (0.03s)
> === RUN TestParsePEMPublicKey
> time="2018-12-29T12:20:58Z" level=warning msg="certificate with CN notary is near expiry"
> --- PASS: TestParsePEMPublicKey (0.01s)
> === RUN TestCheckingCertExpiry
> time="2018-12-29T12:20:58Z" level=warning msg="certificate with CN notary is near expiry"
> --- PASS: TestCheckingCertExpiry (0.01s)
> === RUN TestValidateRootWithExpiredIntermediate
> --- PASS: TestValidateRootWithExpiredIntermediate (0.01s)
> === RUN TestCheckingWildcardCert
> --- PASS: TestCheckingWildcardCert (0.01s)
> === RUN TestWildcardMatching
> --- PASS: TestWildcardMatching (0.00s)
> PASS
> ok github.com/theupdateframework/notary/trustpinning 0.326s
> === RUN TestInitSnapshotNoTargets
> --- PASS: TestInitSnapshotNoTargets (0.00s)
> === RUN TestInitRepo
> --- PASS: TestInitRepo (0.00s)
> === RUN TestUpdateDelegations
> --- PASS: TestUpdateDelegations (0.00s)
> === RUN TestPurgeDelegationsKeyFromTop
> time="2018-12-29T12:20:58Z" level=warning msg="role targets/sybil has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2018-12-29T12:20:58Z" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> --- PASS: TestPurgeDelegationsKeyFromTop (0.00s)
> === RUN TestPurgeDelegationsKeyFromDeep
> time="2018-12-29T12:20:58Z" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> --- PASS: TestPurgeDelegationsKeyFromDeep (0.00s)
> === RUN TestPurgeDelegationsKeyBadWildRole
> --- PASS: TestPurgeDelegationsKeyBadWildRole (0.00s)
> === RUN TestUpdateDelegationsParentMissing
> --- PASS: TestUpdateDelegationsParentMissing (0.00s)
> === RUN TestUpdateDelegationsMissingParentKey
> --- PASS: TestUpdateDelegationsMissingParentKey (0.00s)
> === RUN TestUpdateDelegationsInvalidRole
> --- PASS: TestUpdateDelegationsInvalidRole (0.00s)
> === RUN TestUpdateDelegationsRoleThatIsMissingDelegationKey
> --- PASS: TestUpdateDelegationsRoleThatIsMissingDelegationKey (0.00s)
> === RUN TestUpdateDelegationsNotEnoughKeys
> time="2018-12-29T12:20:58Z" level=warning msg="role targets/role has fewer keys than its threshold of 2; it will not be usable until keys are added to it"
> --- PASS: TestUpdateDelegationsNotEnoughKeys (0.00s)
> === RUN TestUpdateDelegationsAddKeyToRole
> --- PASS: TestUpdateDelegationsAddKeyToRole (0.00s)
> === RUN TestDeleteDelegations
> --- PASS: TestDeleteDelegations (0.00s)
> === RUN TestDeleteDelegationsRoleNotExistBecauseNoParentMeta
> --- PASS: TestDeleteDelegationsRoleNotExistBecauseNoParentMeta (0.00s)
> === RUN TestDeleteDelegationsRoleNotExist
> --- PASS: TestDeleteDelegationsRoleNotExist (0.00s)
> === RUN TestDeleteDelegationsInvalidRole
> --- PASS: TestDeleteDelegationsInvalidRole (0.00s)
> === RUN TestDeleteDelegationsParentMissing
> --- PASS: TestDeleteDelegationsParentMissing (0.00s)
> === RUN TestDeleteDelegationsMissingParentSigningKey
> --- PASS: TestDeleteDelegationsMissingParentSigningKey (0.00s)
> === RUN TestDeleteDelegationsMidSliceRole
> --- PASS: TestDeleteDelegationsMidSliceRole (0.00s)
> === RUN TestGetDelegationRoleAndMetadataExistDelegationExists
> --- PASS: TestGetDelegationRoleAndMetadataExistDelegationExists (0.00s)
> === RUN TestGetDelegationRoleAndMetadataExistDelegationDoesntExists
> --- PASS: TestGetDelegationRoleAndMetadataExistDelegationDoesntExists (0.00s)
> === RUN TestGetDelegationRoleAndMetadataDoesntExists
> --- PASS: TestGetDelegationRoleAndMetadataDoesntExists (0.00s)
> === RUN TestGetDelegationParentMissing
> --- PASS: TestGetDelegationParentMissing (0.00s)
> === RUN TestAddTargetsRoleAndMetadataExist
> --- PASS: TestAddTargetsRoleAndMetadataExist (0.00s)
> === RUN TestAddTargetsRoleExistsAndMetadataDoesntExist
> --- PASS: TestAddTargetsRoleExistsAndMetadataDoesntExist (0.00s)
> === RUN TestAddTargetsRoleDoesntExist
> --- PASS: TestAddTargetsRoleDoesntExist (0.00s)
> === RUN TestAddTargetsNoSigningKeys
> --- PASS: TestAddTargetsNoSigningKeys (0.00s)
> === RUN TestRemoveExistingAndNonexistingTargets
> --- PASS: TestRemoveExistingAndNonexistingTargets (0.00s)
> === RUN TestRemoveTargetsRoleDoesntExist
> --- PASS: TestRemoveTargetsRoleDoesntExist (0.00s)
> === RUN TestRemoveTargetsNoSigningKeys
> --- PASS: TestRemoveTargetsNoSigningKeys (0.00s)
> === RUN TestAddBaseKeysToRoot
> --- PASS: TestAddBaseKeysToRoot (0.00s)
> === RUN TestRemoveBaseKeysFromRoot
> --- PASS: TestRemoveBaseKeysFromRoot (0.00s)
> === RUN TestReplaceBaseKeysInRoot
> --- PASS: TestReplaceBaseKeysInRoot (0.01s)
> === RUN TestGetAllRoles
> --- PASS: TestGetAllRoles (0.00s)
> === RUN TestGetBaseRoles
> --- PASS: TestGetBaseRoles (0.00s)
> === RUN TestGetBaseRolesInvalidName
> --- PASS: TestGetBaseRolesInvalidName (0.00s)
> === RUN TestGetDelegationValidRoles
> --- PASS: TestGetDelegationValidRoles (0.00s)
> === RUN TestGetDelegationRolesInvalidName
> --- PASS: TestGetDelegationRolesInvalidName (0.00s)
> === RUN TestGetDelegationRolesInvalidPaths
> --- PASS: TestGetDelegationRolesInvalidPaths (0.00s)
> === RUN TestDelegationRolesParent
> --- PASS: TestDelegationRolesParent (0.00s)
> === RUN TestGetBaseRoleEmptyRepo
> --- PASS: TestGetBaseRoleEmptyRepo (0.00s)
> === RUN TestGetBaseRoleKeyMissing
> --- PASS: TestGetBaseRoleKeyMissing (0.00s)
> === RUN TestGetDelegationRoleKeyMissing
> --- PASS: TestGetDelegationRoleKeyMissing (0.00s)
> === RUN TestSignRootOldKeyCertExists
> --- PASS: TestSignRootOldKeyCertExists (0.05s)
> === RUN TestSignRootOldKeyCertMissing
> --- PASS: TestSignRootOldKeyCertMissing (0.03s)
> === RUN TestRootKeyRotation
> --- PASS: TestRootKeyRotation (0.07s)
> === RUN TestBuilderLoadsValidRolesOnly
> --- PASS: TestBuilderLoadsValidRolesOnly (0.00s)
> === RUN TestBuilderOnlyAcceptsRootFirstWhenLoading
> --- PASS: TestBuilderOnlyAcceptsRootFirstWhenLoading (0.00s)
> === RUN TestBuilderOnlyAcceptsDelegationsAfterParent
> --- PASS: TestBuilderOnlyAcceptsDelegationsAfterParent (0.00s)
> === RUN TestMarkingIsValid
> --- PASS: TestMarkingIsValid (0.00s)
> === RUN TestBuilderLoadInvalidDelegations
> --- PASS: TestBuilderLoadInvalidDelegations (0.00s)
> === RUN TestBuilderLoadInvalidDelegationsOldVersion
> --- PASS: TestBuilderLoadInvalidDelegationsOldVersion (0.01s)
> === RUN TestBuilderAcceptRoleOnce
> --- PASS: TestBuilderAcceptRoleOnce (0.00s)
> === RUN TestBuilderStopsAcceptingOrProducingDataOnceDone
> --- PASS: TestBuilderStopsAcceptingOrProducingDataOnceDone (0.00s)
> === RUN TestGenerateSnapshotInvalidOperations
> --- PASS: TestGenerateSnapshotInvalidOperations (0.04s)
> === RUN TestGenerateTimestampInvalidOperations
> --- PASS: TestGenerateTimestampInvalidOperations (0.03s)
> === RUN TestGetConsistentInfo
> --- PASS: TestGetConsistentInfo (0.01s)
> === RUN TestTimestampPreAndPostChecksumming
> --- PASS: TestTimestampPreAndPostChecksumming (0.01s)
> === RUN TestSnapshotLoadedFirstChecksumsOthers
> --- PASS: TestSnapshotLoadedFirstChecksumsOthers (0.01s)
> === RUN TestSnapshotLoadedAfterChecksumsOthersRetroactively
> --- PASS: TestSnapshotLoadedAfterChecksumsOthersRetroactively (0.02s)
> PASS
> ok github.com/theupdateframework/notary/tuf 0.329s
> === RUN TestMergeStrSlicesExclusive
> --- PASS: TestMergeStrSlicesExclusive (0.00s)
> === RUN TestMergeStrSlicesOverlap
> --- PASS: TestMergeStrSlicesOverlap (0.00s)
> === RUN TestMergeStrSlicesEqual
> --- PASS: TestMergeStrSlicesEqual (0.00s)
> === RUN TestSubtractStrSlicesExclusive
> --- PASS: TestSubtractStrSlicesExclusive (0.00s)
> === RUN TestSubtractStrSlicesOverlap
> --- PASS: TestSubtractStrSlicesOverlap (0.00s)
> === RUN TestSubtractStrSlicesEqual
> --- PASS: TestSubtractStrSlicesEqual (0.00s)
> === RUN TestAddRemoveKeys
> --- PASS: TestAddRemoveKeys (0.00s)
> === RUN TestAddRemovePaths
> --- PASS: TestAddRemovePaths (0.00s)
> === RUN TestAddPathNil
> --- PASS: TestAddPathNil (0.00s)
> === RUN TestErrNoSuchRole
> --- PASS: TestErrNoSuchRole (0.00s)
> === RUN TestErrInvalidRole
> --- PASS: TestErrInvalidRole (0.00s)
> === RUN TestIsDelegation
> --- PASS: TestIsDelegation (0.00s)
> === RUN TestIsWildDelegation
> --- PASS: TestIsWildDelegation (0.00s)
> === RUN TestValidRoleFunction
> --- PASS: TestValidRoleFunction (0.00s)
> === RUN TestIsBaseRole
> --- PASS: TestIsBaseRole (0.00s)
> === RUN TestBaseRoleEquals
> --- PASS: TestBaseRoleEquals (0.00s)
> === RUN TestRootToSignedMarshalsSignedPortionWithCanonicalJSON
> --- PASS: TestRootToSignedMarshalsSignedPortionWithCanonicalJSON (0.00s)
> === RUN TestRootToSignCopiesSignatures
> --- PASS: TestRootToSignCopiesSignatures (0.00s)
> === RUN TestRootToSignedMarshallingErrorsPropagated
> --- PASS: TestRootToSignedMarshallingErrorsPropagated (0.00s)
> === RUN TestRootMarshalJSONMarshalsSignedWithRegularJSON
> --- PASS: TestRootMarshalJSONMarshalsSignedWithRegularJSON (0.00s)
> === RUN TestRootMarshalJSONMarshallingErrorsPropagated
> --- PASS: TestRootMarshalJSONMarshallingErrorsPropagated (0.00s)
> === RUN TestRootFromSignedUnmarshallingErrorsPropagated
> --- PASS: TestRootFromSignedUnmarshallingErrorsPropagated (0.00s)
> === RUN TestRootFromSignedCopiesSignatures
> --- PASS: TestRootFromSignedCopiesSignatures (0.00s)
> === RUN TestRootFromSignedValidatesRoleData
> --- PASS: TestRootFromSignedValidatesRoleData (0.00s)
> === RUN TestRootFromSignedValidatesRoleType
> --- PASS: TestRootFromSignedValidatesRoleType (0.00s)
> === RUN TestRootFromSignedValidatesVersion
> --- PASS: TestRootFromSignedValidatesVersion (0.00s)
> === RUN TestSnapshotToSignedMarshalsSignedPortionWithCanonicalJSON
> --- PASS: TestSnapshotToSignedMarshalsSignedPortionWithCanonicalJSON (0.00s)
> === RUN TestSnapshotToSignCopiesSignatures
> --- PASS: TestSnapshotToSignCopiesSignatures (0.00s)
> === RUN TestSnapshotToSignedMarshallingErrorsPropagated
> --- PASS: TestSnapshotToSignedMarshallingErrorsPropagated (0.00s)
> === RUN TestSnapshotMarshalJSONMarshalsSignedWithRegularJSON
> --- PASS: TestSnapshotMarshalJSONMarshalsSignedWithRegularJSON (0.00s)
> === RUN TestSnapshotMarshalJSONMarshallingErrorsPropagated
> --- PASS: TestSnapshotMarshalJSONMarshallingErrorsPropagated (0.00s)
> === RUN TestSnapshotFromSignedUnmarshallingErrorsPropagated
> --- PASS: TestSnapshotFromSignedUnmarshallingErrorsPropagated (0.00s)
> === RUN TestSnapshotFromSignedCopiesSignatures
> --- PASS: TestSnapshotFromSignedCopiesSignatures (0.00s)
> === RUN TestSnapshotFromSignedValidatesMeta
> --- PASS: TestSnapshotFromSignedValidatesMeta (0.00s)
> === RUN TestSnapshotFromSignedValidatesRoleType
> --- PASS: TestSnapshotFromSignedValidatesRoleType (0.00s)
> === RUN TestSnapshotFromSignedValidatesVersion
> --- PASS: TestSnapshotFromSignedValidatesVersion (0.00s)
> === RUN TestSnapshotGetMeta
> --- PASS: TestSnapshotGetMeta (0.00s)
> === RUN TestTargetsToSignedMarshalsSignedPortionWithCanonicalJSON
> --- PASS: TestTargetsToSignedMarshalsSignedPortionWithCanonicalJSON (0.00s)
> === RUN TestTargetsToSignCopiesSignatures
> --- PASS: TestTargetsToSignCopiesSignatures (0.00s)
> === RUN TestTargetsToSignedMarshallingErrorsPropagated
> --- PASS: TestTargetsToSignedMarshallingErrorsPropagated (0.00s)
> === RUN TestTargetsMarshalJSONMarshalsSignedWithRegularJSON
> --- PASS: TestTargetsMarshalJSONMarshalsSignedWithRegularJSON (0.00s)
> === RUN TestTargetsMarshalJSONMarshallingErrorsPropagated
> --- PASS: TestTargetsMarshalJSONMarshallingErrorsPropagated (0.00s)
> === RUN TestTargetsFromSignedUnmarshallingErrorsPropagated
> --- PASS: TestTargetsFromSignedUnmarshallingErrorsPropagated (0.00s)
> === RUN TestTargetsFromSignedCopiesSignatures
> --- PASS: TestTargetsFromSignedCopiesSignatures (0.00s)
> === RUN TestTargetsFromSignedValidatesDelegations
> --- PASS: TestTargetsFromSignedValidatesDelegations (0.00s)
> === RUN TestTargetsFromSignedValidatesRoleType
> --- PASS: TestTargetsFromSignedValidatesRoleType (0.00s)
> === RUN TestTargetsFromSignedValidatesRoleName
> --- PASS: TestTargetsFromSignedValidatesRoleName (0.00s)
> === RUN TestTargetsFromSignedValidatesVersion
> --- PASS: TestTargetsFromSignedValidatesVersion (0.00s)
> === RUN TestTimestampToSignedMarshalsSignedPortionWithCanonicalJSON
> --- PASS: TestTimestampToSignedMarshalsSignedPortionWithCanonicalJSON (0.00s)
> === RUN TestTimestampToSignCopiesSignatures
> --- PASS: TestTimestampToSignCopiesSignatures (0.00s)
> === RUN TestTimestampToSignedMarshallingErrorsPropagated
> --- PASS: TestTimestampToSignedMarshallingErrorsPropagated (0.00s)
> === RUN TestTimestampMarshalJSONMarshalsSignedWithRegularJSON
> --- PASS: TestTimestampMarshalJSONMarshalsSignedWithRegularJSON (0.00s)
> === RUN TestTimestampMarshalJSONMarshallingErrorsPropagated
> --- PASS: TestTimestampMarshalJSONMarshallingErrorsPropagated (0.00s)
> === RUN TestTimestampFromSignedUnmarshallingErrorsPropagated
> --- PASS: TestTimestampFromSignedUnmarshallingErrorsPropagated (0.00s)
> === RUN TestTimestampFromSignedCopiesSignatures
> --- PASS: TestTimestampFromSignedCopiesSignatures (0.00s)
> === RUN TestTimestampFromSignedValidatesMeta
> --- PASS: TestTimestampFromSignedValidatesMeta (0.00s)
> === RUN TestTimestampFromSignedValidatesRoleType
> --- PASS: TestTimestampFromSignedValidatesRoleType (0.00s)
> === RUN TestTimestampFromSignedValidatesVersion
> --- PASS: TestTimestampFromSignedValidatesVersion (0.00s)
> === RUN TestTimestampGetSnapshot
> --- PASS: TestTimestampGetSnapshot (0.00s)
> === RUN TestGenerateFileMetaDefault
> --- PASS: TestGenerateFileMetaDefault (0.00s)
> === RUN TestGenerateFileMetaExplicit
> --- PASS: TestGenerateFileMetaExplicit (0.00s)
> === RUN TestSignatureUnmarshalJSON
> --- PASS: TestSignatureUnmarshalJSON (0.00s)
> === RUN TestCheckHashes
> --- PASS: TestCheckHashes (0.00s)
> === RUN TestCheckValidHashStructures
> --- PASS: TestCheckValidHashStructures (0.00s)
> === RUN TestCompareMultiHashes
> --- PASS: TestCompareMultiHashes (0.00s)
> === RUN TestFileMetaEquals
> --- PASS: TestFileMetaEquals (0.00s)
> PASS
> ok github.com/theupdateframework/notary/tuf/data 0.024s
> === RUN TestListKeys
> --- PASS: TestListKeys (0.00s)
> === RUN TestGetKeys
> --- PASS: TestGetKeys (0.00s)
> === RUN TestBasicSign
> --- PASS: TestBasicSign (0.00s)
> === RUN TestReSign
> --- PASS: TestReSign (0.00s)
> === RUN TestMultiSign
> --- PASS: TestMultiSign (0.00s)
> === RUN TestSignReturnsNoSigs
> --- PASS: TestSignReturnsNoSigs (0.00s)
> === RUN TestSignWithX509
> --- PASS: TestSignWithX509 (0.00s)
> === RUN TestSignRemovesValidSigByInvalidKey
> --- PASS: TestSignRemovesValidSigByInvalidKey (0.00s)
> === RUN TestSignRemovesInvalidSig
> --- PASS: TestSignRemovesInvalidSig (0.00s)
> === RUN TestSignMinSignatures
> --- PASS: TestSignMinSignatures (0.00s)
> === RUN TestSignFailingKeys
> --- PASS: TestSignFailingKeys (0.02s)
> === RUN TestErrInsufficientSignaturesMessaging
> --- PASS: TestErrInsufficientSignaturesMessaging (0.00s)
> === RUN TestRSAPSSVerifier
> --- PASS: TestRSAPSSVerifier (0.01s)
> === RUN TestRSAPSSx509Verifier
> --- PASS: TestRSAPSSx509Verifier (0.00s)
> === RUN TestRSAPSSVerifierWithInvalidKeyType
> --- PASS: TestRSAPSSVerifierWithInvalidKeyType (0.00s)
> === RUN TestRSAPSSVerifierWithInvalidKeyLength
> --- PASS: TestRSAPSSVerifierWithInvalidKeyLength (0.03s)
> === RUN TestRSAPSSVerifierWithInvalidKey
> --- PASS: TestRSAPSSVerifierWithInvalidKey (0.00s)
> === RUN TestRSAPSSVerifierWithInvalidSignature
> --- PASS: TestRSAPSSVerifierWithInvalidSignature (0.01s)
> === RUN TestRSAPKCS1v15Verifier
> --- PASS: TestRSAPKCS1v15Verifier (0.01s)
> === RUN TestRSAPKCS1v15x509Verifier
> --- PASS: TestRSAPKCS1v15x509Verifier (0.00s)
> === RUN TestRSAPKCS1v15VerifierWithInvalidKeyType
> --- PASS: TestRSAPKCS1v15VerifierWithInvalidKeyType (0.00s)
> === RUN TestRSAPKCS1v15VerifierWithInvalidKey
> --- PASS: TestRSAPKCS1v15VerifierWithInvalidKey (0.00s)
> === RUN TestRSAPKCS1v15VerifierWithInvalidSignature
> time="2018-12-29T12:21:00Z" level=error msg="Failed verification: crypto/rsa: verification error"
> --- PASS: TestRSAPKCS1v15VerifierWithInvalidSignature (0.01s)
> === RUN TestECDSAVerifier
> --- PASS: TestECDSAVerifier (0.00s)
> === RUN TestECDSAVerifierOtherCurves
> --- PASS: TestECDSAVerifierOtherCurves (0.18s)
> === RUN TestECDSAx509Verifier
> --- PASS: TestECDSAx509Verifier (0.00s)
> === RUN TestECDSAVerifierWithInvalidKeyType
> --- PASS: TestECDSAVerifierWithInvalidKeyType (0.00s)
> === RUN TestECDSAVerifierWithInvalidKey
> --- PASS: TestECDSAVerifierWithInvalidKey (0.00s)
> === RUN TestECDSAVerifierWithInvalidSignature
> --- PASS: TestECDSAVerifierWithInvalidSignature (0.00s)
> === RUN TestED25519VerifierInvalidKeyType
> --- PASS: TestED25519VerifierInvalidKeyType (0.00s)
> === RUN TestRSAPyCryptoVerifierInvalidKeyType
> --- PASS: TestRSAPyCryptoVerifierInvalidKeyType (0.00s)
> === RUN TestPyCryptoRSAPSSCompat
> --- PASS: TestPyCryptoRSAPSSCompat (0.00s)
> === RUN TestPyNaCled25519Compat
> --- PASS: TestPyNaCled25519Compat (0.00s)
> === RUN TestRoleNoKeys
> --- PASS: TestRoleNoKeys (0.00s)
> === RUN TestNotEnoughSigs
> --- PASS: TestNotEnoughSigs (0.00s)
> === RUN TestNoSigs
> --- PASS: TestNoSigs (0.00s)
> === RUN TestExactlyEnoughSigs
> --- PASS: TestExactlyEnoughSigs (0.00s)
> === RUN TestIsValidNotExported
> --- PASS: TestIsValidNotExported (0.00s)
> === RUN TestMoreThanEnoughSigs
> --- PASS: TestMoreThanEnoughSigs (0.00s)
> === RUN TestValidSigWithIncorrectKeyID
> --- PASS: TestValidSigWithIncorrectKeyID (0.00s)
> === RUN TestDuplicateSigs
> --- PASS: TestDuplicateSigs (0.00s)
> === RUN TestUnknownKeyBelowThreshold
> --- PASS: TestUnknownKeyBelowThreshold (0.00s)
> === RUN TestVerifyVersion
> --- PASS: TestVerifyVersion (0.00s)
> === RUN TestVerifyExpiry
> time="2018-12-29T12:21:00Z" level=error msg="Metadata for root expired"
> --- PASS: TestVerifyExpiry (0.00s)
> === RUN TestVerifyPublicKeyMatchesPrivateKeyHappyCase
> --- PASS: TestVerifyPublicKeyMatchesPrivateKeyHappyCase (0.00s)
> === RUN TestVerifyPublicKeyMatchesPrivateKeyFails
> --- PASS: TestVerifyPublicKeyMatchesPrivateKeyFails (0.00s)
> PASS
> ok github.com/theupdateframework/notary/tuf/signed 0.280s
> === RUN TestNewSwizzler
> --- PASS: TestNewSwizzler (0.03s)
> === RUN TestSwizzlerSetInvalidJSON
> --- PASS: TestSwizzlerSetInvalidJSON (0.01s)
> === RUN TestSwizzlerAddExtraSpace
> --- PASS: TestSwizzlerAddExtraSpace (0.00s)
> === RUN TestSwizzlerSetInvalidSigned
> --- PASS: TestSwizzlerSetInvalidSigned (0.01s)
> === RUN TestSwizzlerSetInvalidSignedMeta
> --- PASS: TestSwizzlerSetInvalidSignedMeta (0.00s)
> === RUN TestSwizzlerSetInvalidMetadataType
> --- PASS: TestSwizzlerSetInvalidMetadataType (0.00s)
> === RUN TestSwizzlerInvalidateMetadataSignatures
> --- PASS: TestSwizzlerInvalidateMetadataSignatures (0.00s)
> === RUN TestSwizzlerRemoveMetadata
> --- PASS: TestSwizzlerRemoveMetadata (0.01s)
> === RUN TestSwizzlerSignMetadataWithInvalidKey
> --- PASS: TestSwizzlerSignMetadataWithInvalidKey (0.00s)
> === RUN TestSwizzlerOffsetMetadataVersion
> --- PASS: TestSwizzlerOffsetMetadataVersion (0.00s)
> === RUN TestSwizzlerExpireMetadata
> --- PASS: TestSwizzlerExpireMetadata (0.00s)
> === RUN TestSwizzlerSetThresholdBaseRole
> --- PASS: TestSwizzlerSetThresholdBaseRole (0.00s)
> === RUN TestSwizzlerSetThresholdDelegatedRole
> --- PASS: TestSwizzlerSetThresholdDelegatedRole (0.00s)
> === RUN TestSwizzlerChangeRootKey
> --- PASS: TestSwizzlerChangeRootKey (0.01s)
> === RUN TestSwizzlerUpdateSnapshotHashesSpecifiedRoles
> --- PASS: TestSwizzlerUpdateSnapshotHashesSpecifiedRoles (0.01s)
> === RUN TestSwizzlerUpdateSnapshotHashesNoSpecifiedRoles
> --- PASS: TestSwizzlerUpdateSnapshotHashesNoSpecifiedRoles (0.01s)
> === RUN TestSwizzlerUpdateTimestamp
> --- PASS: TestSwizzlerUpdateTimestamp (0.00s)
> === RUN TestMissingSigningKey
> --- PASS: TestMissingSigningKey (0.00s)
> === RUN TestSwizzlerMutateRoot
> --- PASS: TestSwizzlerMutateRoot (0.01s)
> === RUN TestSwizzlerMutateTimestamp
> --- PASS: TestSwizzlerMutateTimestamp (0.00s)
> === RUN TestSwizzlerMutateSnapshot
> --- PASS: TestSwizzlerMutateSnapshot (0.00s)
> === RUN TestSwizzlerMutateTargets
> --- PASS: TestSwizzlerMutateTargets (0.01s)
> === RUN TestSwizzlerRotateKeyBaseRole
> --- PASS: TestSwizzlerRotateKeyBaseRole (0.00s)
> === RUN TestSwizzlerRotateKeyDelegationRole
> --- PASS: TestSwizzlerRotateKeyDelegationRole (0.00s)
> PASS
> ok github.com/theupdateframework/notary/tuf/testutils 0.180s
> ? github.com/theupdateframework/notary/tuf/testutils/interfaces [no test files]
> ? github.com/theupdateframework/notary/tuf/testutils/keys [no test files]
> === RUN TestConvertTUFKeyToPKCS8
> --- PASS: TestConvertTUFKeyToPKCS8 (0.06s)
> === RUN TestParsePKCS8ToTufKey
> --- PASS: TestParsePKCS8ToTufKey (0.19s)
> === RUN TestPEMtoPEM
> --- PASS: TestPEMtoPEM (0.00s)
> === RUN TestRoleListLen
> --- PASS: TestRoleListLen (0.00s)
> === RUN TestRoleListLess
> --- PASS: TestRoleListLess (0.00s)
> === RUN TestRoleListSwap
> --- PASS: TestRoleListSwap (0.00s)
> === RUN TestRoleListSort
> --- PASS: TestRoleListSort (0.00s)
> === RUN TestCreateStack
> --- PASS: TestCreateStack (0.00s)
> === RUN TestPush
> --- PASS: TestPush (0.00s)
> === RUN TestPop
> --- PASS: TestPop (0.00s)
> === RUN TestPopEmpty
> --- PASS: TestPopEmpty (0.00s)
> === RUN TestPopString
> --- PASS: TestPopString (0.00s)
> === RUN TestPopStringWrongType
> --- PASS: TestPopStringWrongType (0.00s)
> === RUN TestPopStringEmpty
> --- PASS: TestPopStringEmpty (0.00s)
> === RUN TestEmpty
> --- PASS: TestEmpty (0.00s)
> === RUN TestUnusedDelegationKeys
> --- PASS: TestUnusedDelegationKeys (0.00s)
> === RUN TestRemoveUnusedKeys
> --- PASS: TestRemoveUnusedKeys (0.00s)
> === RUN TestFindRoleIndexFound
> --- PASS: TestFindRoleIndexFound (0.00s)
> === RUN TestFindRoleIndexNotFound
> --- PASS: TestFindRoleIndexNotFound (0.00s)
> === RUN TestCertsToKeys
> --- PASS: TestCertsToKeys (0.00s)
> === RUN TestNewCertificate
> --- PASS: TestNewCertificate (0.00s)
> === RUN TestKeyOperations
> --- PASS: TestKeyOperations (0.04s)
> === RUN TestRSAX509PublickeyID
> --- PASS: TestRSAX509PublickeyID (0.00s)
> === RUN TestECDSAX509PublickeyID
> --- PASS: TestECDSAX509PublickeyID (0.00s)
> === RUN TestExtractPrivateKeyAttributes
> --- PASS: TestExtractPrivateKeyAttributes (0.00s)
> === RUN TestParsePEMPrivateKeyLegacy
> --- PASS: TestParsePEMPrivateKeyLegacy (0.00s)
> === RUN TestValidateCertificateWithSHA1
> --- PASS: TestValidateCertificateWithSHA1 (0.00s)
> === RUN TestValidateCertificateWithExpiredCert
> --- PASS: TestValidateCertificateWithExpiredCert (0.00s)
> === RUN TestValidateCertificateWithInvalidExpiry
> --- PASS: TestValidateCertificateWithInvalidExpiry (0.00s)
> === RUN TestValidateCertificateWithShortKey
> --- PASS: TestValidateCertificateWithShortKey (0.04s)
> PASS
> ok github.com/theupdateframework/notary/tuf/utils 0.348s
> === RUN TestNewSerializableErrorNonValidationError
> --- PASS: TestNewSerializableErrorNonValidationError (0.00s)
> === RUN TestNewSerializableErrorValidationError
> --- PASS: TestNewSerializableErrorValidationError (0.00s)
> === RUN TestUnmarshalSerialiableErrorSuccessfully
> --- PASS: TestUnmarshalSerialiableErrorSuccessfully (0.00s)
> === RUN TestUnmarshalUnknownErrorName
> --- PASS: TestUnmarshalUnknownErrorName (0.00s)
> === RUN TestUnmarshalInvalidError
> --- PASS: TestUnmarshalInvalidError (0.00s)
> === RUN TestUnmarshalNoName
> --- PASS: TestUnmarshalNoName (0.00s)
> === RUN TestUnmarshalInvalidJSON
> --- PASS: TestUnmarshalInvalidJSON (0.00s)
> PASS
> ok github.com/theupdateframework/notary/tuf/validation 0.003s
> === RUN TestSetSignalTrap
> --- PASS: TestSetSignalTrap (0.00s)
> === RUN TestLogLevelSignalHandle
> Attempt to increase log level failed, will remain at debug level, error: log level can not be set higher than Debug
> Successfully setting log level to debug
> Successfully setting log level to info
> Successfully setting log level to warning
> Successfully setting log level to error
> Successfully setting log level to fatal
> Successfully setting log level to info
> Successfully setting log level to warning
> Successfully setting log level to error
> Successfully setting log level to fatal
> Successfully setting log level to panic
> Attempt to decrease log level failed, will remain at panic level, error: log level can not be set lower than Panic
> --- PASS: TestLogLevelSignalHandle (0.00s)
> === RUN TestParseInvalidLogLevel
> --- PASS: TestParseInvalidLogLevel (0.00s)
> === RUN TestParseNoLogLevel
> --- PASS: TestParseNoLogLevel (0.00s)
> === RUN TestParseLogLevel
> --- PASS: TestParseLogLevel (0.00s)
> === RUN TestParseLogLevelWithEnvironmentVariables
> --- PASS: TestParseLogLevelWithEnvironmentVariables (0.00s)
> === RUN TestParseInvalidBugsnag
> --- PASS: TestParseInvalidBugsnag (0.00s)
> === RUN TestParseNoBugsnag
> --- PASS: TestParseNoBugsnag (0.00s)
> === RUN TestParseBugsnag
> --- PASS: TestParseBugsnag (0.00s)
> === RUN TestParseBugsnagWithEnvironmentVariables
> --- PASS: TestParseBugsnagWithEnvironmentVariables (0.00s)
> === RUN TestParseInvalidStorageBackend
> --- PASS: TestParseInvalidStorageBackend (0.00s)
> === RUN TestParseInvalidSQLStorageNoDBSource
> --- PASS: TestParseInvalidSQLStorageNoDBSource (0.00s)
> === RUN TestParseInvalidDBSourceInSQLStorage
> --- PASS: TestParseInvalidDBSourceInSQLStorage (0.00s)
> === RUN TestParseSQLStorageDBStore
> --- PASS: TestParseSQLStorageDBStore (0.00s)
> === RUN TestParseRethinkStorageDBStoreInvalidBackend
> --- PASS: TestParseRethinkStorageDBStoreInvalidBackend (0.00s)
> === RUN TestParseRethinkStorageDBStoreEmptyDBUrl
> --- PASS: TestParseRethinkStorageDBStoreEmptyDBUrl (0.00s)
> === RUN TestParseRethinkStorageDBStoreEmptyDBName
> --- PASS: TestParseRethinkStorageDBStoreEmptyDBName (0.00s)
> === RUN TestParseRethinkStorageDBStoreEmptyCA
> --- PASS: TestParseRethinkStorageDBStoreEmptyCA (0.00s)
> === RUN TestParseRethinkStorageDBStoreEmptyCertAndKey
> --- PASS: TestParseRethinkStorageDBStoreEmptyCertAndKey (0.00s)
> === RUN TestParseRethinkStorageDBStoreEmptyUsername
> --- PASS: TestParseRethinkStorageDBStoreEmptyUsername (0.00s)
> === RUN TestParseSQLStorageWithEnvironmentVariables
> --- PASS: TestParseSQLStorageWithEnvironmentVariables (0.00s)
> === RUN TestParseTLSNoTLSWhenRequired
> --- PASS: TestParseTLSNoTLSWhenRequired (0.00s)
> === RUN TestParseTLSPartialTLS
> --- PASS: TestParseTLSPartialTLS (0.00s)
> === RUN TestParseTLSNoTLSNotRequired
> --- PASS: TestParseTLSNoTLSNotRequired (0.00s)
> === RUN TestParseTLSWithTLS
> --- PASS: TestParseTLSWithTLS (0.00s)
> === RUN TestParseTLSWithTLSRelativeToConfigFile
> --- PASS: TestParseTLSWithTLSRelativeToConfigFile (0.00s)
> === RUN TestParseTLSWithEnvironmentVariables
> --- PASS: TestParseTLSWithEnvironmentVariables (0.00s)
> === RUN TestParseViperWithInvalidFile
> --- PASS: TestParseViperWithInvalidFile (0.00s)
> === RUN TestParseViperWithValidFile
> --- PASS: TestParseViperWithValidFile (0.00s)
> === RUN TestAdjustLogLevel
> --- PASS: TestAdjustLogLevel (0.00s)
> === RUN TestRootHandlerFactory
> --- PASS: TestRootHandlerFactory (0.00s)
> === RUN TestRootHandlerError
> --- PASS: TestRootHandlerError (0.00s)
> === RUN TestWrapWithCacheHeaderNilCacheControlConfig
> --- PASS: TestWrapWithCacheHeaderNilCacheControlConfig (0.00s)
> === RUN TestWrapWithCacheHeaderNon200Response
> --- PASS: TestWrapWithCacheHeaderNon200Response (0.00s)
> === RUN TestWrapWithCacheHeaderPublicCacheControlNoCacheHeaders
> --- PASS: TestWrapWithCacheHeaderPublicCacheControlNoCacheHeaders (0.00s)
> === RUN TestWrapWithCacheHeaderPublicCacheControlLastModifiedHeader
> --- PASS: TestWrapWithCacheHeaderPublicCacheControlLastModifiedHeader (0.00s)
> === RUN TestWrapWithCacheHeaderPublicCacheControlCacheControlHeader
> --- PASS: TestWrapWithCacheHeaderPublicCacheControlCacheControlHeader (0.00s)
> === RUN TestWrapWithCacheHeaderNoCacheControlNoCacheHeaders
> --- PASS: TestWrapWithCacheHeaderNoCacheControlNoCacheHeaders (0.00s)
> === RUN TestWrapWithCacheHeaderNoCacheControlLastModifiedHeader
> --- PASS: TestWrapWithCacheHeaderNoCacheControlLastModifiedHeader (0.00s)
> === RUN TestWrapWithCacheHeaderNoCacheControlCacheControlHeader
> --- PASS: TestWrapWithCacheHeaderNoCacheControlCacheControlHeader (0.00s)
> === RUN TestBuildCatalogRecord
> --- PASS: TestBuildCatalogRecord (0.00s)
> === RUN TestDoAuthNonWildcardImage
> --- PASS: TestDoAuthNonWildcardImage (0.00s)
> === RUN TestDoAuthWildcardImage
> --- PASS: TestDoAuthWildcardImage (0.00s)
> PASS
> ok github.com/theupdateframework/notary/utils 0.010s
> ? github.com/theupdateframework/notary/version [no test files]
> dh_auto_test: cd _build && go test -vet=off -v -p 2 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version returned exit code 1
The full build log is available from:
http://aws-logs.debian.net/2018/12/29/notary_0.6.1~ds1-2_unstable.log
A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!
About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.
More information about the Pkg-go-maintainers
mailing list