[pkg-go] Bug#954692: notary: FTBFS: dh_auto_test: error: cd _build && go test -vet=off -v -p 4 github.com/theupdateframework/notary [...] github.com/theupdateframework/notary/version returned exit code 1
Lucas Nussbaum
lucas at debian.org
Sun Mar 22 13:45:57 GMT 2020
Source: notary
Version: 0.6.1~ds2-5
Severity: serious
Justification: FTBFS on amd64
Tags: bullseye sid ftbfs
Usertags: ftbfs-20200322 ftbfs-bullseye
Hi,
During a rebuild of all packages in sid, your package failed to build
on amd64.
Relevant part (hopefully):
> make[1]: Entering directory '/<<PKGBUILDDIR>>'
> dh_auto_build -- -tags "pkcs11"
> cd _build && go install -trimpath -v -p 4 -tags pkcs11 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version
> internal/race
> internal/cpu
> runtime/internal/sys
> runtime/internal/atomic
> sync/atomic
> runtime/internal/math
> math/bits
> unicode/utf8
> internal/bytealg
> unicode
> internal/testlog
> math
> encoding
> unicode/utf16
> runtime
> crypto/internal/subtle
> crypto/subtle
> vendor/golang.org/x/crypto/cryptobyte/asn1
> internal/nettrace
> container/list
> runtime/cgo
> vendor/golang.org/x/crypto/internal/subtle
> github.com/theupdateframework/notary/version
> github.com/lib/pq/oid
> internal/reflectlite
> sync
> internal/singleflight
> google.golang.org/grpc/internal/grpcsync
> math/rand
> sort
> errors
> io
> internal/oserror
> strconv
> syscall
> vendor/golang.org/x/net/dns/dnsmessage
> hash
> bytes
> crypto
> reflect
> strings
> bufio
> crypto/internal/randutil
> path
> regexp/syntax
> internal/syscall/unix
> time
> crypto/hmac
> golang.org/x/crypto/pbkdf2
> hash/crc32
> crypto/rc4
> vendor/golang.org/x/crypto/hkdf
> regexp
> vendor/golang.org/x/text/transform
> github.com/hashicorp/hcl/hcl/strconv
> internal/poll
> encoding/binary
> internal/fmtsort
> context
> text/tabwriter
> golang.org/x/text/transform
> html
> crypto/md5
> os
> encoding/base64
> golang.org/x/sys/unix
> crypto/cipher
> crypto/sha512
> crypto/aes
> github.com/theupdateframework/notary
> fmt
> crypto/sha256
> crypto/des
> crypto/sha1
> crypto/ed25519/internal/edwards25519
> encoding/json
> github.com/docker/go/canonical/json
> log
> math/big
> encoding/hex
> encoding/pem
> path/filepath
> github.com/sirupsen/logrus
> io/ioutil
> net
> net/url
> github.com/theupdateframework/notary/tuf/validation
> mime
> mime/quotedprintable
> crypto/rand
> crypto/elliptic
> github.com/docker/distribution/uuid
> encoding/asn1
> crypto/rsa
> crypto/dsa
> crypto/ed25519
> crypto/ecdsa
> crypto/x509/pkix
> vendor/golang.org/x/crypto/cryptobyte
> golang.org/x/crypto/ed25519
> compress/flate
> vendor/golang.org/x/crypto/chacha20
> vendor/golang.org/x/crypto/poly1305
> vendor/golang.org/x/sys/cpu
> compress/gzip
> vendor/golang.org/x/crypto/curve25519
> vendor/golang.org/x/crypto/chacha20poly1305
> vendor/golang.org/x/text/unicode/bidi
> vendor/golang.org/x/text/unicode/norm
> vendor/golang.org/x/net/http2/hpack
> vendor/golang.org/x/text/secure/bidirule
> net/http/internal
> github.com/miekg/pkcs11
> flag
> vendor/golang.org/x/net/idna
> encoding/csv
> github.com/fsnotify/fsnotify
> github.com/hashicorp/hcl/hcl/token
> github.com/pelletier/go-toml
> github.com/hashicorp/hcl/hcl/ast
> github.com/hashicorp/hcl/hcl/scanner
> github.com/hashicorp/hcl/hcl/parser
> github.com/hashicorp/hcl/json/token
> github.com/hashicorp/hcl/json/scanner
> github.com/hashicorp/hcl/json/parser
> github.com/hashicorp/hcl
> github.com/hashicorp/hcl/hcl/printer
> crypto/x509
> net/textproto
> vendor/golang.org/x/net/http/httpproxy
> github.com/mitchellh/mapstructure
> mime/multipart
> vendor/golang.org/x/net/http/httpguts
> github.com/spf13/afero/mem
> golang.org/x/text/unicode/norm
> github.com/theupdateframework/notary/tuf/data
> crypto/tls
> text/template/parse
> github.com/theupdateframework/notary/client/changelist
> github.com/theupdateframework/notary/tuf/utils
> text/template
> github.com/spf13/jwalterweatherman
> github.com/spf13/pflag
> net/http/httptrace
> html/template
> net/http
> github.com/subosito/gotenv
> gopkg.in/ini.v1
> github.com/spf13/cast
> gopkg.in/yaml.v2
> github.com/golang/protobuf/proto
> golang.org/x/net/context
> golang.org/x/net/internal/timeseries
> google.golang.org/grpc/grpclog
> google.golang.org/grpc/connectivity
> google.golang.org/grpc/credentials/internal
> google.golang.org/grpc/internal
> google.golang.org/grpc/metadata
> google.golang.org/grpc/serviceconfig
> google.golang.org/grpc/internal/grpcrand
> google.golang.org/grpc/resolver
> google.golang.org/grpc/codes
> google.golang.org/grpc/encoding
> google.golang.org/grpc/internal/backoff
> google.golang.org/grpc/internal/balancerload
> google.golang.org/grpc/internal/envconfig
> golang.org/x/text/unicode/bidi
> golang.org/x/net/http2/hpack
> google.golang.org/grpc/internal/syscall
> google.golang.org/grpc/keepalive
> google.golang.org/grpc/stats
> golang.org/x/text/secure/bidirule
> google.golang.org/grpc/tap
> github.com/golang/protobuf/ptypes/empty
> google.golang.org/grpc/credentials
> google.golang.org/grpc/encoding/proto
> github.com/golang/protobuf/ptypes/any
> github.com/golang/protobuf/ptypes/duration
> github.com/golang/protobuf/ptypes/timestamp
> google.golang.org/grpc/balancer
> google.golang.org/genproto/googleapis/rpc/status
> github.com/golang/protobuf/ptypes
> google.golang.org/grpc/balancer/base
> google.golang.org/grpc/binarylog/grpc_binarylog_v1
> google.golang.org/grpc/status
> github.com/theupdateframework/notary/storage
> github.com/magiconair/properties
> github.com/spf13/afero
> golang.org/x/net/trace
> github.com/theupdateframework/notary/trustmanager
> github.com/theupdateframework/notary/cryptoservice
> github.com/theupdateframework/notary/tuf/signed
> google.golang.org/grpc/balancer/roundrobin
> google.golang.org/grpc/internal/binarylog
> google.golang.org/grpc/internal/channelz
> github.com/spf13/viper
> github.com/theupdateframework/notary/trustmanager/yubikey
> github.com/theupdateframework/notary/trustpinning
> golang.org/x/net/idna
> github.com/theupdateframework/notary/tuf
> google.golang.org/grpc/peer
> google.golang.org/grpc/naming
> google.golang.org/grpc/resolver/dns
> golang.org/x/net/http/httpguts
> google.golang.org/grpc/resolver/passthrough
> net/http/httputil
> github.com/bugsnag/bugsnag-go/errors
> golang.org/x/net/http2
> github.com/theupdateframework/notary/client
> os/exec
> os/signal
> github.com/gorilla/mux
> github.com/bugsnag/panicwrap
> github.com/bugsnag/bugsnag-go
> github.com/docker/distribution/registry/api/errcode
> github.com/docker/distribution/context
> github.com/docker/distribution/registry/auth
> github.com/Shopify/logrus-bugsnag
> github.com/pkg/errors
> database/sql/driver
> github.com/opencontainers/go-digest
> github.com/docker/go-connections/tlsconfig
> github.com/docker/distribution/digestset
> github.com/opencontainers/image-spec/specs-go
> database/sql
> github.com/docker/distribution/reference
> github.com/opencontainers/image-spec/specs-go/v1
> github.com/docker/distribution/registry/client/auth/challenge
> google.golang.org/grpc/internal/transport
> github.com/docker/distribution
> github.com/docker/distribution/registry/api/v2
> github.com/docker/distribution/registry/client/transport
> expvar
> github.com/beorn7/perks/quantile
> github.com/cespare/xxhash
> github.com/go-sql-driver/mysql
> github.com/prometheus/client_model/go
> github.com/prometheus/client_golang/prometheus/internal
> github.com/matttproud/golang_protobuf_extensions/pbutil
> github.com/prometheus/common/internal/bitbucket.org/ww/goautoneg
> github.com/prometheus/common/model
> github.com/prometheus/procfs/internal/fs
> github.com/prometheus/procfs/internal/util
> github.com/prometheus/procfs
> google.golang.org/grpc
> github.com/prometheus/common/expfmt
> github.com/theupdateframework/notary/utils
> runtime/debug
> github.com/spf13/cobra
> golang.org/x/crypto/ssh/terminal
> github.com/theupdateframework/notary/passphrase
> github.com/prometheus/client_golang/prometheus
> github.com/docker/distribution/health
> golang.org/x/crypto/blowfish
> github.com/theupdateframework/notary/trustmanager/remoteks
> golang.org/x/crypto/bcrypt
> encoding/base32
> github.com/docker/distribution/registry/auth/htpasswd
> github.com/docker/libtrust
> github.com/theupdateframework/notary/cmd/escrow
> github.com/lib/pq/scram
> os/user
> github.com/docker/distribution/registry/auth/token
> github.com/prometheus/client_golang/prometheus/promhttp
> hash/fnv
> github.com/theupdateframework/notary/vendor/github.com/prometheus/client_golang/prometheus
> github.com/docker/go-metrics
> github.com/docker/distribution/metrics
> github.com/docker/distribution/registry/storage/cache
> github.com/theupdateframework/notary/server/errors
> github.com/jinzhu/inflection
> github.com/docker/distribution/registry/storage/cache/memory
> go/token
> github.com/docker/distribution/registry/client
> go/scanner
> github.com/docker/distribution/registry/client/auth
> go/ast
> github.com/theupdateframework/notary/cmd/notary
> github.com/lib/pq
> github.com/jinzhu/gorm
> github.com/cenkalti/backoff
> github.com/hailocab/go-hostpool
> gopkg.in/fatih/pool.v2
> gopkg.in/gorethink/gorethink.v3/encoding
> gopkg.in/gorethink/gorethink.v3/ql2
> gopkg.in/gorethink/gorethink.v3/types
> github.com/theupdateframework/notary/proto
> google.golang.org/grpc/health/grpc_health_v1
> gopkg.in/dancannon/gorethink.v3
> runtime/pprof
> github.com/theupdateframework/notary/signer/client
> runtime/trace
> github.com/theupdateframework/notary/signer
> net/http/pprof
> github.com/theupdateframework/notary/signer/api
> github.com/dvsekhvalnov/jose2go/base64url
> github.com/dvsekhvalnov/jose2go/arrays
> github.com/dvsekhvalnov/jose2go/compact
> github.com/dvsekhvalnov/jose2go/aes
> github.com/dvsekhvalnov/jose2go/kdf
> github.com/dvsekhvalnov/jose2go/keys/ecc
> github.com/dvsekhvalnov/jose2go/padding
> google.golang.org/grpc/health
> github.com/dvsekhvalnov/jose2go
> github.com/davecgh/go-spew/spew
> github.com/theupdateframework/notary/storage/rethinkdb
> github.com/pmezard/go-difflib/difflib
> net/http/httptest
> github.com/theupdateframework/notary/server/storage
> github.com/theupdateframework/notary/signer/keydbstore
> github.com/stretchr/testify/assert
> github.com/theupdateframework/notary/cmd/notary-signer
> github.com/theupdateframework/notary/server/snapshot
> github.com/theupdateframework/notary/server/timestamp
> github.com/theupdateframework/notary/server/handlers
> github.com/stretchr/testify/require
> github.com/theupdateframework/notary/server
> github.com/theupdateframework/notary/cmd/notary-server
> github.com/theupdateframework/notary/tuf/testutils/keys
> testing
> github.com/theupdateframework/notary/tuf/testutils
> github.com/theupdateframework/notary/tuf/testutils/interfaces
> make[1]: Leaving directory '/<<PKGBUILDDIR>>'
> dh_auto_test -O--builddirectory=/<<BUILDDIR>>/notary-0.6.1\~ds2/_build -O--buildsystem=golang
> cd _build && go test -vet=off -v -p 4 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version
> ? github.com/theupdateframework/notary [no test files]
> === RUN Test0Dot1Migration
> --- PASS: Test0Dot1Migration (0.05s)
> === RUN Test0Dot3Migration
> --- PASS: Test0Dot3Migration (0.03s)
> === RUN Test0Dot1RepoFormat
> time="2020-03-22T08:31:13Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: Test0Dot1RepoFormat (0.23s)
> === RUN Test0Dot3RepoFormat
> time="2020-03-22T08:31:13Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: Test0Dot3RepoFormat (0.18s)
> === RUN TestDownloading0Dot1RepoFormat
> --- PASS: TestDownloading0Dot1RepoFormat (0.01s)
> === RUN TestDownloading0Dot3RepoFormat
> --- PASS: TestDownloading0Dot3RepoFormat (0.00s)
> === RUN TestInitRepositoryManagedRolesIncludingRoot
> --- PASS: TestInitRepositoryManagedRolesIncludingRoot (0.01s)
> === RUN TestInitRepositoryManagedRolesInvalidRole
> --- PASS: TestInitRepositoryManagedRolesInvalidRole (0.01s)
> === RUN TestInitRepositoryManagedRolesIncludingTargets
> --- PASS: TestInitRepositoryManagedRolesIncludingTargets (0.00s)
> === RUN TestInitRepositoryManagedRolesIncludingTimestamp
> --- PASS: TestInitRepositoryManagedRolesIncludingTimestamp (0.01s)
> === RUN TestInitRepositoryWithCerts
> --- PASS: TestInitRepositoryWithCerts (0.02s)
> === RUN TestMatchKeyIDsWithPublicKeys
> --- PASS: TestMatchKeyIDsWithPublicKeys (0.01s)
> === RUN TestInitRepositoryNeedsRemoteTimestampKey
> --- PASS: TestInitRepositoryNeedsRemoteTimestampKey (0.01s)
> === RUN TestInitRepositoryNeedsRemoteSnapshotKey
> --- PASS: TestInitRepositoryNeedsRemoteSnapshotKey (0.01s)
> === RUN TestInitRepoServerOnlyManagesTimestampKey
> --- PASS: TestInitRepoServerOnlyManagesTimestampKey (0.14s)
> === RUN TestInitRepoServerManagesTimestampAndSnapshotKeys
> --- PASS: TestInitRepoServerManagesTimestampAndSnapshotKeys (0.13s)
> === RUN TestInitRepoAttemptsExceeded
> --- PASS: TestInitRepoAttemptsExceeded (0.12s)
> === RUN TestInitRepoPasswordInvalid
> --- PASS: TestInitRepoPasswordInvalid (0.01s)
> === RUN TestAddTargetToTargetRoleByDefault
> --- PASS: TestAddTargetToTargetRoleByDefault (0.04s)
> === RUN TestAddTargetToSpecifiedValidRoles
> --- PASS: TestAddTargetToSpecifiedValidRoles (0.04s)
> === RUN TestAddTargetToSpecifiedInvalidRoles
> --- PASS: TestAddTargetToSpecifiedInvalidRoles (0.04s)
> === RUN TestAddTargetWithInvalidTarget
> --- PASS: TestAddTargetWithInvalidTarget (0.02s)
> === RUN TestAddTargetErrorWritingChanges
> --- PASS: TestAddTargetErrorWritingChanges (0.02s)
> === RUN TestRemoveTargetToTargetRoleByDefault
> --- PASS: TestRemoveTargetToTargetRoleByDefault (0.03s)
> === RUN TestRemoveTargetFromSpecifiedValidRoles
> --- PASS: TestRemoveTargetFromSpecifiedValidRoles (0.05s)
> === RUN TestRemoveTargetToSpecifiedInvalidRoles
> --- PASS: TestRemoveTargetToSpecifiedInvalidRoles (0.05s)
> === RUN TestRemoveTargetErrorWritingChanges
> --- PASS: TestRemoveTargetErrorWritingChanges (0.02s)
> === RUN TestListTarget
> --- PASS: TestListTarget (0.43s)
> === RUN TestListTargetRestrictsDelegationPaths
> --- PASS: TestListTargetRestrictsDelegationPaths (0.08s)
> === RUN TestValidateRootKey
> --- PASS: TestValidateRootKey (0.05s)
> === RUN TestGetChangelist
> --- PASS: TestGetChangelist (0.04s)
> === RUN TestPublishBareRepo
> --- PASS: TestPublishBareRepo (0.44s)
> === RUN TestPublishUninitializedRepo
> time="2020-03-22T08:31:15Z" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time"
> --- PASS: TestPublishUninitializedRepo (0.06s)
> === RUN TestPublishClientHasSnapshotKey
> --- PASS: TestPublishClientHasSnapshotKey (0.32s)
> === RUN TestPublishAfterInitServerHasSnapshotKey
> --- PASS: TestPublishAfterInitServerHasSnapshotKey (0.35s)
> === RUN TestPublishAfterPullServerHasSnapshotKey
> --- PASS: TestPublishAfterPullServerHasSnapshotKey (0.13s)
> === RUN TestPublishNoOneHasSnapshotKey
> --- PASS: TestPublishNoOneHasSnapshotKey (0.08s)
> === RUN TestPublishSnapshotCorrupt
> --- PASS: TestPublishSnapshotCorrupt (0.20s)
> === RUN TestPublishTargetsCorrupt
> --- PASS: TestPublishTargetsCorrupt (0.11s)
> === RUN TestPublishRootCorrupt
> time="2020-03-22T08:31:17Z" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')"
> time="2020-03-22T08:31:17Z" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')"
> --- PASS: TestPublishRootCorrupt (0.13s)
> === RUN TestPublishSnapshotLocalKeysCreatedFirst
> --- PASS: TestPublishSnapshotLocalKeysCreatedFirst (0.01s)
> === RUN TestPublishDelegations
> --- PASS: TestPublishDelegations (0.19s)
> === RUN TestPublishDelegationsX509
> --- PASS: TestPublishDelegationsX509 (0.16s)
> === RUN TestPublishTargetsDelegationScopeFailIfNoKeys
> time="2020-03-22T08:31:17Z" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist"
> time="2020-03-22T08:31:17Z" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist"
> --- PASS: TestPublishTargetsDelegationScopeFailIfNoKeys (0.12s)
> === RUN TestPublishTargetsDelegationSuccessLocallyHasRoles
> --- PASS: TestPublishTargetsDelegationSuccessLocallyHasRoles (0.16s)
> === RUN TestPublishTargetsDelegationNoTargetsKeyNeeded
> --- PASS: TestPublishTargetsDelegationNoTargetsKeyNeeded (0.14s)
> === RUN TestPublishTargetsDelegationSuccessNeedsToDownloadRoles
> --- PASS: TestPublishTargetsDelegationSuccessNeedsToDownloadRoles (0.12s)
> === RUN TestPublishTargetsDelegationFromTwoRepos
> --- PASS: TestPublishTargetsDelegationFromTwoRepos (0.12s)
> === RUN TestPublishRemoveDelegationKeyFromDelegationRole
> time="2020-03-22T08:31:18Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:18Z" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: 4ca63af7d56142d32e60b1d3c7e56b797a640f6a4793882e2ca037727f497506"
> --- PASS: TestPublishRemoveDelegationKeyFromDelegationRole (0.10s)
> === RUN TestPublishRemoveDelegation
> time="2020-03-22T08:31:18Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2020-03-22T08:31:18Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2020-03-22T08:31:18Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:18Z" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: "
> --- PASS: TestPublishRemoveDelegation (0.08s)
> === RUN TestPublishSucceedsDespiteDelegationCorrupt
> --- PASS: TestPublishSucceedsDespiteDelegationCorrupt (0.09s)
> === RUN TestRotateKeyInvalidRole
> --- PASS: TestRotateKeyInvalidRole (0.06s)
> === RUN TestRemoteRotationError
> --- PASS: TestRemoteRotationError (0.02s)
> === RUN TestRemoteRotationEndpointError
> --- PASS: TestRemoteRotationEndpointError (0.03s)
> === RUN TestRemoteRotationNoRootKey
> --- PASS: TestRemoteRotationNoRootKey (0.05s)
> === RUN TestRemoteRotationNoInit
> time="2020-03-22T08:31:18Z" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time"
> --- PASS: TestRemoteRotationNoInit (0.05s)
> === RUN TestRotateBeforePublishFromRemoteKeyToLocalKey
> --- PASS: TestRotateBeforePublishFromRemoteKeyToLocalKey (0.14s)
> === RUN TestRotateKeyAfterPublishNoServerManagementChange
> --- PASS: TestRotateKeyAfterPublishNoServerManagementChange (0.42s)
> === RUN TestRotateKeyAfterPublishServerManagementChange
> --- PASS: TestRotateKeyAfterPublishServerManagementChange (0.48s)
> === RUN TestRotateRootKey
> --- PASS: TestRotateRootKey (0.16s)
> === RUN TestRotateRootMultiple
> --- PASS: TestRotateRootMultiple (0.13s)
> === RUN TestRotateRootKeyProvided
> --- PASS: TestRotateRootKeyProvided (0.16s)
> === RUN TestRotateRootKeyLegacySupport
> --- PASS: TestRotateRootKeyLegacySupport (0.14s)
> === RUN TestRemoteServerUnavailableNoLocalCache
> time="2020-03-22T08:31:20Z" level=error msg="Could not publish Repository since we could not update: unable to reach trust server at this time: 500."
> --- PASS: TestRemoteServerUnavailableNoLocalCache (0.00s)
> === RUN TestAddDelegationChangefileValid
> --- PASS: TestAddDelegationChangefileValid (0.02s)
> === RUN TestAddDelegationChangefileApplicable
> --- PASS: TestAddDelegationChangefileApplicable (0.01s)
> === RUN TestAddDelegationErrorWritingChanges
> --- PASS: TestAddDelegationErrorWritingChanges (0.01s)
> === RUN TestRemoveDelegationChangefileValid
> --- PASS: TestRemoveDelegationChangefileValid (0.02s)
> === RUN TestRemoveDelegationChangefileApplicable
> time="2020-03-22T08:31:20Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2020-03-22T08:31:20Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> --- PASS: TestRemoveDelegationChangefileApplicable (0.01s)
> === RUN TestClearAllPathsDelegationChangefileApplicable
> --- PASS: TestClearAllPathsDelegationChangefileApplicable (0.04s)
> === RUN TestFullAddDelegationChangefileApplicable
> --- PASS: TestFullAddDelegationChangefileApplicable (0.02s)
> === RUN TestFullRemoveDelegationChangefileApplicable
> --- PASS: TestFullRemoveDelegationChangefileApplicable (0.02s)
> === RUN TestRemoveDelegationErrorWritingChanges
> --- PASS: TestRemoveDelegationErrorWritingChanges (0.01s)
> === RUN TestBootstrapClientBadURL
> --- PASS: TestBootstrapClientBadURL (0.00s)
> === RUN TestClientInvalidURL
> --- PASS: TestClientInvalidURL (0.00s)
> === RUN TestPublishTargetsDelegationCanUseUserKeyWithArbitraryRole
> --- PASS: TestPublishTargetsDelegationCanUseUserKeyWithArbitraryRole (0.26s)
> === RUN TestDeleteRepo
> --- PASS: TestDeleteRepo (0.07s)
> === RUN TestDeleteRemoteRepo
> --- PASS: TestDeleteRemoteRepo (0.10s)
> === RUN TestListRoles
> --- PASS: TestListRoles (0.18s)
> === RUN TestGetAllTargetInfo
> --- PASS: TestGetAllTargetInfo (0.11s)
> === RUN TestUpdateSucceedsEvenIfCannotWriteNewRepo
> time="2020-03-22T08:31:21Z" level=error msg="could not save root to cache: Non-writable"
> --- PASS: TestUpdateSucceedsEvenIfCannotWriteNewRepo (0.08s)
> === RUN TestUpdateSucceedsEvenIfCannotWriteExistingRepo
> --- PASS: TestUpdateSucceedsEvenIfCannotWriteExistingRepo (0.28s)
> === RUN TestUpdateInOfflineMode
> time="2020-03-22T08:31:21Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> time="2020-03-22T08:31:21Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: TestUpdateInOfflineMode (0.03s)
> === RUN TestUpdateReplacesCorruptOrMissingMetadata
> time="2020-03-22T08:31:21Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:21Z" level=error msg="Metadata for root expired"
> --- PASS: TestUpdateReplacesCorruptOrMissingMetadata (0.51s)
> === RUN TestUpdateFailsIfServerRootKeyChangedWithoutMultiSign
> time="2020-03-22T08:31:22Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:22Z" level=error msg="Metadata for root expired"
> --- PASS: TestUpdateFailsIfServerRootKeyChangedWithoutMultiSign (0.05s)
> === RUN TestUpdateRemoteRootNotExistNoLocalCache
> --- PASS: TestUpdateRemoteRootNotExistNoLocalCache (0.02s)
> === RUN TestUpdateRemoteRootNotExistCanUseLocalCache
> --- PASS: TestUpdateRemoteRootNotExistCanUseLocalCache (0.06s)
> === RUN TestUpdateRemoteRootNotExistCannotUseLocalCache
> --- PASS: TestUpdateRemoteRootNotExistCannotUseLocalCache (0.04s)
> === RUN TestUpdateRemoteRoot50XNoLocalCache
> --- PASS: TestUpdateRemoteRoot50XNoLocalCache (0.01s)
> === RUN TestUpdateRemoteRoot50XCanUseLocalCache
> --- PASS: TestUpdateRemoteRoot50XCanUseLocalCache (0.04s)
> === RUN TestUpdateRemoteRoot50XCannotUseLocalCache
> --- PASS: TestUpdateRemoteRoot50XCannotUseLocalCache (0.06s)
> === RUN TestUpdateNonRootRemoteMissingMetadataNoLocalCache
> --- PASS: TestUpdateNonRootRemoteMissingMetadataNoLocalCache (0.10s)
> === RUN TestUpdateNonRootRemoteMissingMetadataCanUseLocalCache
> time="2020-03-22T08:31:22Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: TestUpdateNonRootRemoteMissingMetadataCanUseLocalCache (0.14s)
> === RUN TestUpdateNonRootRemoteMissingMetadataCannotUseLocalCache
> time="2020-03-22T08:31:22Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: TestUpdateNonRootRemoteMissingMetadataCannotUseLocalCache (0.17s)
> === RUN TestUpdateNonRootRemote50XNoLocalCache
> --- PASS: TestUpdateNonRootRemote50XNoLocalCache (0.10s)
> === RUN TestUpdateNonRootRemote50XCanUseLocalCache
> time="2020-03-22T08:31:22Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: TestUpdateNonRootRemote50XCanUseLocalCache (0.14s)
> === RUN TestUpdateNonRootRemote50XCannotUseLocalCache
> time="2020-03-22T08:31:23Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: TestUpdateNonRootRemote50XCannotUseLocalCache (0.22s)
> === RUN TestUpdateRemoteChecksumWrongNoLocalCache
> --- PASS: TestUpdateRemoteChecksumWrongNoLocalCache (0.15s)
> === RUN TestUpdateRemoteChecksumWrongCanUseLocalCache
> --- PASS: TestUpdateRemoteChecksumWrongCanUseLocalCache (0.27s)
> === RUN TestUpdateRemoteChecksumWrongCannotUseLocalCache
> --- PASS: TestUpdateRemoteChecksumWrongCannotUseLocalCache (0.27s)
> === RUN TestUpdateRootRemoteCorruptedNoLocalCache
> time="2020-03-22T08:31:24Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:24Z" level=error msg="Metadata for root expired"
> --- PASS: TestUpdateRootRemoteCorruptedNoLocalCache (0.44s)
> === RUN TestUpdateRootRemoteCorruptedCanUseLocalCache
> --- PASS: TestUpdateRootRemoteCorruptedCanUseLocalCache (0.78s)
> === RUN TestUpdateRootRemoteCorruptedCannotUseLocalCache
> time="2020-03-22T08:31:25Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:25Z" level=error msg="Metadata for root expired"
> --- PASS: TestUpdateRootRemoteCorruptedCannotUseLocalCache (1.02s)
> === RUN TestUpdateNonRootRemoteCorruptedNoLocalCache
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for targets expired"
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for targets expired"
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for snapshot expired"
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for snapshot expired"
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for timestamp expired"
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for timestamp expired"
> time="2020-03-22T08:31:26Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:26Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:26Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for targets/a expired"
> time="2020-03-22T08:31:26Z" level=warning msg="Error getting targets/a: targets/a expired at Thu Feb 21 08:31:26 UTC 2019"
> time="2020-03-22T08:31:26Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2020-03-22T08:31:26Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2020-03-22T08:31:26Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for targets/a/b expired"
> time="2020-03-22T08:31:26Z" level=warning msg="Error getting targets/a/b: targets/a/b expired at Thu Feb 21 08:31:26 UTC 2019"
> time="2020-03-22T08:31:27Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2020-03-22T08:31:27Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2020-03-22T08:31:27Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2020-03-22T08:31:27Z" level=error msg="Metadata for targets/b expired"
> time="2020-03-22T08:31:27Z" level=warning msg="Error getting targets/b: targets/b expired at Thu Feb 21 08:31:27 UTC 2019"
> --- PASS: TestUpdateNonRootRemoteCorruptedNoLocalCache (0.93s)
> === RUN TestUpdateNonRootRemoteCorruptedCanUseLocalCache
> time="2020-03-22T08:31:27Z" level=error msg="Metadata for timestamp expired"
> time="2020-03-22T08:31:27Z" level=error msg="Metadata for timestamp expired"
> --- PASS: TestUpdateNonRootRemoteCorruptedCanUseLocalCache (0.72s)
> === RUN TestUpdateNonRootRemoteCorruptedCannotUseLocalCache
> time="2020-03-22T08:31:27Z" level=error msg="Metadata for targets expired"
> time="2020-03-22T08:31:28Z" level=error msg="Metadata for snapshot expired"
> time="2020-03-22T08:31:28Z" level=error msg="Metadata for snapshot expired"
> time="2020-03-22T08:31:28Z" level=error msg="Metadata for timestamp expired"
> time="2020-03-22T08:31:28Z" level=error msg="Metadata for timestamp expired"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:28Z" level=error msg="Metadata for targets/a expired"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/a: targets/a expired at Thu Feb 21 08:31:28 UTC 2019"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2020-03-22T08:31:28Z" level=error msg="Metadata for targets/a/b expired"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/a/b: targets/a/b expired at Thu Feb 21 08:31:28 UTC 2019"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2020-03-22T08:31:28Z" level=error msg="Metadata for targets/b expired"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/b: targets/b expired at Thu Feb 21 08:31:28 UTC 2019"
> --- PASS: TestUpdateNonRootRemoteCorruptedCannotUseLocalCache (0.88s)
> === RUN TestUpdateLocalAndRemoteRootCorrupt
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> --- PASS: TestUpdateLocalAndRemoteRootCorrupt (0.96s)
> === RUN TestUpdateRemoteKeyRotated
> time="2020-03-22T08:31:29Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:29Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2020-03-22T08:31:29Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> --- PASS: TestUpdateRemoteKeyRotated (0.09s)
> === RUN TestValidateRootRotationWithOldRole
> --- PASS: TestValidateRootRotationWithOldRole (0.05s)
> === RUN TestRootRoleInvariant
> --- PASS: TestRootRoleInvariant (0.04s)
> === RUN TestBadIntermediateTransitions
> --- PASS: TestBadIntermediateTransitions (0.02s)
> === RUN TestExpiredIntermediateTransitions
> time="2020-03-22T08:31:29Z" level=warning msg="root is nearing expiry, you should re-sign the role metadata"
> --- PASS: TestExpiredIntermediateTransitions (0.02s)
> === RUN TestDownloadTargetsLarge
> --- PASS: TestDownloadTargetsLarge (2.19s)
> === RUN TestDownloadTargetsDeep
> --- PASS: TestDownloadTargetsDeep (0.01s)
> === RUN TestDownloadSnapshotLargeDelegationsMany
> --- PASS: TestDownloadSnapshotLargeDelegationsMany (1.71s)
> === RUN TestRootOnDiskTrustPinning
> --- PASS: TestRootOnDiskTrustPinning (0.01s)
> === RUN TestApplyTargetsChange
> --- PASS: TestApplyTargetsChange (0.00s)
> === RUN TestApplyAddTargetTwice
> --- PASS: TestApplyAddTargetTwice (0.00s)
> === RUN TestApplyChangelist
> --- PASS: TestApplyChangelist (0.00s)
> === RUN TestApplyChangelistMulti
> --- PASS: TestApplyChangelistMulti (0.00s)
> === RUN TestApplyTargetsDelegationCreateDelete
> --- PASS: TestApplyTargetsDelegationCreateDelete (0.00s)
> === RUN TestApplyTargetsDelegationCreate2SharedKey
> --- PASS: TestApplyTargetsDelegationCreate2SharedKey (0.00s)
> === RUN TestApplyTargetsDelegationCreateEdit
> --- PASS: TestApplyTargetsDelegationCreateEdit (0.00s)
> === RUN TestApplyTargetsDelegationEditNonExisting
> --- PASS: TestApplyTargetsDelegationEditNonExisting (0.00s)
> === RUN TestApplyTargetsDelegationCreateAlreadyExisting
> --- PASS: TestApplyTargetsDelegationCreateAlreadyExisting (0.00s)
> === RUN TestApplyTargetsDelegationAlreadyExistingMergePaths
> --- PASS: TestApplyTargetsDelegationAlreadyExistingMergePaths (0.00s)
> === RUN TestApplyTargetsDelegationInvalidRole
> --- PASS: TestApplyTargetsDelegationInvalidRole (0.00s)
> === RUN TestApplyTargetsDelegationInvalidJSONContent
> --- PASS: TestApplyTargetsDelegationInvalidJSONContent (0.00s)
> === RUN TestApplyTargetsDelegationInvalidAction
> --- PASS: TestApplyTargetsDelegationInvalidAction (0.00s)
> === RUN TestApplyTargetsChangeInvalidType
> --- PASS: TestApplyTargetsChangeInvalidType (0.00s)
> === RUN TestApplyTargetsDelegationCreate2Deep
> --- PASS: TestApplyTargetsDelegationCreate2Deep (0.00s)
> === RUN TestApplyTargetsDelegationParentDoesntExist
> --- PASS: TestApplyTargetsDelegationParentDoesntExist (0.00s)
> === RUN TestApplyChangelistCreatesDelegation
> --- PASS: TestApplyChangelistCreatesDelegation (0.00s)
> === RUN TestApplyChangelistTargetsToMultipleRoles
> --- PASS: TestApplyChangelistTargetsToMultipleRoles (0.00s)
> === RUN TestApplyChangelistTargetsFailsNonexistentRole
> time="2020-03-22T08:31:33Z" level=error msg="couldn't add target to targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist"
> time="2020-03-22T08:31:33Z" level=error msg="couldn't remove target from targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist"
> --- PASS: TestApplyChangelistTargetsFailsNonexistentRole (0.00s)
> === RUN TestChangeTargetMetaFailsInvalidRole
> time="2020-03-22T08:31:33Z" level=error msg="couldn't add target to ruhroh: tuf: invalid role ruhroh. does not exist"
> --- PASS: TestChangeTargetMetaFailsInvalidRole (0.00s)
> === RUN TestChangeTargetMetaFailsIfPrefixError
> time="2020-03-22T08:31:33Z" level=error msg="couldn't add target to targets/level1: Could not add all targets"
> --- PASS: TestChangeTargetMetaFailsIfPrefixError (0.00s)
> === RUN TestAllNearExpiry
> --- PASS: TestAllNearExpiry (0.00s)
> === RUN TestAllNotNearExpiry
> --- PASS: TestAllNotNearExpiry (0.00s)
> === RUN TestRotateRemoteKeyOffline
> --- PASS: TestRotateRemoteKeyOffline (0.00s)
> PASS
> ok github.com/theupdateframework/notary/client 20.362s
> === RUN TestTUFDelegation
> --- PASS: TestTUFDelegation (0.00s)
> === RUN TestMemChangelist
> --- PASS: TestMemChangelist (0.00s)
> === RUN TestMemChangeIterator
> --- PASS: TestMemChangeIterator (0.00s)
> === RUN TestMemChangelistRemove
> --- PASS: TestMemChangelistRemove (0.00s)
> === RUN TestAdd
> --- PASS: TestAdd (0.00s)
> === RUN TestErrorConditions
> time="2020-03-22T08:31:10Z" level=warning msg="invalid character '\\x05' looking for beginning of value"
> --- PASS: TestErrorConditions (0.00s)
> === RUN TestListOrder
> --- PASS: TestListOrder (0.00s)
> === RUN TestFileChangeIterator
> --- PASS: TestFileChangeIterator (0.00s)
> PASS
> ok github.com/theupdateframework/notary/client/changelist 0.017s
> === RUN TestParseConfigError
> --- PASS: TestParseConfigError (0.00s)
> === RUN TestSetupGRPCServer
> --- PASS: TestSetupGRPCServer (0.00s)
> === RUN TestSetupStorage
> --- PASS: TestSetupStorage (0.00s)
> === RUN TestSetupNetListener
> --- PASS: TestSetupNetListener (0.00s)
> PASS
> ok github.com/theupdateframework/notary/cmd/escrow 0.015s
> === RUN TestPurgeDelegationKeys
> Usage:
> delegation [command]
>
> Available Commands:
> add Add a keys to delegation using the provided public key X509 certificates.
> list Lists delegations for the Global Unique Name.
> purge Remove KeyID(s) from all delegation roles in the given GUN.
> remove Remove KeyID(s) from the specified Role delegation.
>
> Use "delegation [command] --help" for more information about a command.
> Usage:
> delegation [command]
>
> Available Commands:
> add Add a keys to delegation using the provided public key X509 certificates.
> list Lists delegations for the Global Unique Name.
> purge Remove KeyID(s) from all delegation roles in the given GUN.
> remove Remove KeyID(s) from the specified Role delegation.
>
> Use "delegation [command] --help" for more information about a command.
> Removal of the following keys from all delegations in gun staged for next publish:
> - abc
> --- PASS: TestPurgeDelegationKeys (0.00s)
> === RUN TestAddInvalidDelegationName
> --- PASS: TestAddInvalidDelegationName (0.02s)
> === RUN TestAddInvalidDelegationCert
> --- PASS: TestAddInvalidDelegationCert (0.00s)
> === RUN TestAddInvalidShortPubkeyCert
> --- PASS: TestAddInvalidShortPubkeyCert (0.01s)
> === RUN TestRemoveInvalidDelegationName
> --- PASS: TestRemoveInvalidDelegationName (0.00s)
> === RUN TestRemoveAllInvalidDelegationName
> --- PASS: TestRemoveAllInvalidDelegationName (0.00s)
> === RUN TestAddInvalidNumArgs
> Usage:
> delegation [command]
>
> Available Commands:
> add Add a keys to delegation using the provided public key X509 certificates.
> list Lists delegations for the Global Unique Name.
> purge Remove KeyID(s) from all delegation roles in the given GUN.
> remove Remove KeyID(s) from the specified Role delegation.
>
> Use "delegation [command] --help" for more information about a command.
> --- PASS: TestAddInvalidNumArgs (0.00s)
> === RUN TestListInvalidNumArgs
> Usage:
> delegation [command]
>
> Available Commands:
> add Add a keys to delegation using the provided public key X509 certificates.
> list Lists delegations for the Global Unique Name.
> purge Remove KeyID(s) from all delegation roles in the given GUN.
> remove Remove KeyID(s) from the specified Role delegation.
>
> Use "delegation [command] --help" for more information about a command.
> --- PASS: TestListInvalidNumArgs (0.00s)
> === RUN TestRemoveInvalidNumArgs
> Usage:
> delegation [command]
>
> Available Commands:
> add Add a keys to delegation using the provided public key X509 certificates.
> list Lists delegations for the Global Unique Name.
> purge Remove KeyID(s) from all delegation roles in the given GUN.
> remove Remove KeyID(s) from the specified Role delegation.
>
> Use "delegation [command] --help" for more information about a command.
> --- PASS: TestRemoveInvalidNumArgs (0.00s)
> === RUN TestInitWithRootKey
> --- PASS: TestInitWithRootKey (0.13s)
> === RUN TestInitWithRootCert
> --- PASS: TestInitWithRootCert (0.07s)
> === RUN TestClientTUFInteraction
> --- PASS: TestClientTUFInteraction (0.14s)
> === RUN TestClientDeleteTUFInteraction
> time="2020-03-22T08:31:13Z" level=error msg="could not reach https://invalid-server: Get \"https://invalid-server/v2/\": dial tcp: lookup invalid-server on 172.31.0.2:53: no such host"
> --- PASS: TestClientDeleteTUFInteraction (0.18s)
> === RUN TestClientTUFAddByHashInteraction
> --- PASS: TestClientTUFAddByHashInteraction (0.33s)
> === RUN TestClientDelegationsInteraction
> time="2020-03-22T08:31:14Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2020-03-22T08:31:14Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> --- PASS: TestClientDelegationsInteraction (0.60s)
> === RUN TestClientDelegationsPublishing
> --- PASS: TestClientDelegationsPublishing (0.47s)
> === RUN TestClientKeyGenerationRotation
> --- PASS: TestClientKeyGenerationRotation (0.81s)
> === RUN TestKeyRotation
> --- PASS: TestKeyRotation (0.11s)
> === RUN TestKeyRotationNonRoot
> --- PASS: TestKeyRotationNonRoot (0.17s)
> === RUN TestDefaultRootKeyGeneration
> --- PASS: TestDefaultRootKeyGeneration (0.01s)
> === RUN TestLogLevelFlags
> --- PASS: TestLogLevelFlags (0.00s)
> === RUN TestClientKeyPassphraseChange
> --- PASS: TestClientKeyPassphraseChange (0.17s)
> === RUN TestPurgeSingleKey
> Removal of the following keys from all delegations in gun staged for next publish:
> - c3cbde94df3b421a82caf8a07dc88d459b42c6ab2b183dc68da9d71c1408c684
> --- PASS: TestPurgeSingleKey (0.12s)
> === RUN TestWitness
> time="2020-03-22T08:31:16Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation"
> time="2020-03-22T08:31:16Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation"
> time="2020-03-22T08:31:17Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation"
> time="2020-03-22T08:31:17Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation"
> time="2020-03-22T08:31:17Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2020-03-22T08:31:17Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2020-03-22T08:31:17Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation"
> --- PASS: TestWitness (0.40s)
> === RUN TestClientTUFInitWithAutoPublish
> time="2020-03-22T08:31:17Z" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get \"https://notary-server-on-the-moon:12306/v2/\": dial tcp: lookup notary-server-on-the-moon on 172.31.0.2:53: no such host"
> --- PASS: TestClientTUFInitWithAutoPublish (0.18s)
> === RUN TestClientTUFAddWithAutoPublish
> time="2020-03-22T08:31:17Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> time="2020-03-22T08:31:17Z" level=error msg="Could not publish Repository since we could not update: client is offline"
> time="2020-03-22T08:31:17Z" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get \"https://notary-server-on-the-moon:12306/v2/\": dial tcp: lookup notary-server-on-the-moon on 172.31.0.2:53: no such host"
> time="2020-03-22T08:31:17Z" level=error msg="Could not publish Repository since we could not update: client is offline"
> --- PASS: TestClientTUFAddWithAutoPublish (0.09s)
> === RUN TestClientTUFRemoveWithAutoPublish
> --- PASS: TestClientTUFRemoveWithAutoPublish (0.27s)
> === RUN TestClientDelegationAddWithAutoPublish
> --- PASS: TestClientDelegationAddWithAutoPublish (0.11s)
> === RUN TestClientDelegationRemoveWithAutoPublish
> time="2020-03-22T08:31:17Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2020-03-22T08:31:17Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> --- PASS: TestClientDelegationRemoveWithAutoPublish (0.18s)
> === RUN TestClientTUFAddByHashWithAutoPublish
> --- PASS: TestClientTUFAddByHashWithAutoPublish (0.09s)
> === RUN TestClientKeyImport
> time="2020-03-22T08:31:18Z" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header"
> time="2020-03-22T08:31:18Z" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to"
> --- PASS: TestClientKeyImport (0.04s)
> === RUN TestAddDelImportKeyPublishFlow
> time="2020-03-22T08:31:18Z" level=error msg="couldn't add target to targets/releases: could not find necessary signing keys, at least one of these keys must be available: 0570f9fdca00bdaf62f3f79bf84e70748ba2c8bff926f20dd996bac49e6164fc"
> --- PASS: TestAddDelImportKeyPublishFlow (0.23s)
> === RUN TestExportImportFlow
> --- PASS: TestExportImportFlow (0.06s)
> === RUN TestDelegationKeyImportExport
> --- PASS: TestDelegationKeyImportExport (0.01s)
> === RUN TestImportKeysNoYubikey
> --- PASS: TestImportKeysNoYubikey (0.01s)
> === RUN TestExportImportKeysNoYubikey
> --- PASS: TestExportImportKeysNoYubikey (0.01s)
> === RUN TestRemoveIfNoKey
> --- PASS: TestRemoveIfNoKey (0.00s)
> === RUN TestRemoveOneKeyAbort
> --- PASS: TestRemoveOneKeyAbort (0.02s)
> === RUN TestRemoveOneKeyConfirm
> --- PASS: TestRemoveOneKeyConfirm (0.01s)
> === RUN TestRemoveMultikeysInvalidInput
> --- PASS: TestRemoveMultikeysInvalidInput (0.02s)
> === RUN TestRemoveMultikeysAbortChoice
> --- PASS: TestRemoveMultikeysAbortChoice (0.01s)
> === RUN TestRemoveMultikeysRemoveOnlyChosenKey
> --- PASS: TestRemoveMultikeysRemoveOnlyChosenKey (0.01s)
> === RUN TestRotateKeyInvalidRoles
> time="2020-03-22T08:31:18Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> time="2020-03-22T08:31:18Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> time="2020-03-22T08:31:18Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> time="2020-03-22T08:31:18Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> --- PASS: TestRotateKeyInvalidRoles (0.01s)
> === RUN TestRotateKeyTargetCannotBeServerManaged
> time="2020-03-22T08:31:18Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> --- PASS: TestRotateKeyTargetCannotBeServerManaged (0.00s)
> === RUN TestRotateKeyTimestampCannotBeLocallyManaged
> time="2020-03-22T08:31:18Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> --- PASS: TestRotateKeyTimestampCannotBeLocallyManaged (0.00s)
> === RUN TestRotateKeyNoGUN
> Usage:
> --- PASS: TestRotateKeyNoGUN (0.00s)
> === RUN TestRotateKeyRemoteServerManagesKey
> Successfully rotated snapshot key for repository docker.com/notary
> Successfully rotated timestamp key for repository docker.com/notary
> --- PASS: TestRotateKeyRemoteServerManagesKey (0.12s)
> === RUN TestRotateKeyBothKeys
> Successfully rotated targets key for repository docker.com/notary
> Successfully rotated snapshot key for repository docker.com/notary
> --- PASS: TestRotateKeyBothKeys (0.10s)
> === RUN TestRotateKeyRootIsInteractive
> --- PASS: TestRotateKeyRootIsInteractive (0.04s)
> === RUN TestChangeKeyPassphraseInvalidID
> --- PASS: TestChangeKeyPassphraseInvalidID (0.00s)
> === RUN TestChangeKeyPassphraseInvalidNumArgs
> Usage:
> --- PASS: TestChangeKeyPassphraseInvalidNumArgs (0.00s)
> === RUN TestChangeKeyPassphraseNonexistentID
> --- PASS: TestChangeKeyPassphraseNonexistentID (0.00s)
> === RUN TestExportKeys
> --- PASS: TestExportKeys (0.00s)
> === RUN TestExportKeysByGUN
> --- PASS: TestExportKeysByGUN (0.00s)
> === RUN TestExportKeysByID
> --- PASS: TestExportKeysByID (0.00s)
> === RUN TestExportKeysBadFlagCombo
> --- PASS: TestExportKeysBadFlagCombo (0.00s)
> === RUN TestImportKeysNonexistentFile
> --- PASS: TestImportKeysNonexistentFile (0.00s)
> === RUN TestKeyGeneration
> time="2020-03-22T08:31:18Z" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to"
> --- PASS: TestKeyGeneration (0.02s)
> === RUN TestNotaryConfigFileDefault
> --- PASS: TestNotaryConfigFileDefault (0.00s)
> === RUN TestRemoteServerDefault
> --- PASS: TestRemoteServerDefault (0.00s)
> === RUN TestRemoteServerUsesConfigFile
> --- PASS: TestRemoteServerUsesConfigFile (0.00s)
> === RUN TestRemoteServerCommandLineFlagOverridesConfig
> --- PASS: TestRemoteServerCommandLineFlagOverridesConfig (0.00s)
> === RUN TestInvalidAddHashCommands
> --- PASS: TestInvalidAddHashCommands (0.00s)
> === RUN TestConfigParsingErrorsPropagatedByCommands
> --- PASS: TestConfigParsingErrorsPropagatedByCommands (0.00s)
> === RUN TestInsufficientArgumentsReturnsErrorAndPrintsUsage
> --- PASS: TestInsufficientArgumentsReturnsErrorAndPrintsUsage (0.01s)
> === RUN TestBareCommandPrintsUsageAndNoError
> --- PASS: TestBareCommandPrintsUsageAndNoError (0.00s)
> === RUN TestConfigFileTLSCannotBeRelativeToCWD
> --- PASS: TestConfigFileTLSCannotBeRelativeToCWD (0.00s)
> === RUN TestConfigFileTLSCanBeRelativeToConfigOrAbsolute
> --- PASS: TestConfigFileTLSCanBeRelativeToConfigOrAbsolute (0.02s)
> === RUN TestConfigFileOverridenByCmdLineFlags
> --- PASS: TestConfigFileOverridenByCmdLineFlags (0.03s)
> === RUN TestConfigFileTrustPinning
> --- PASS: TestConfigFileTrustPinning (0.00s)
> === RUN TestPassphraseRetrieverCaching
> --- PASS: TestPassphraseRetrieverCaching (0.00s)
> === RUN TestPassphraseRetrieverDelegationRoleCaching
> --- PASS: TestPassphraseRetrieverDelegationRoleCaching (0.00s)
> === RUN TestTruncateWithEllipsis
> --- PASS: TestTruncateWithEllipsis (0.00s)
> === RUN TestKeyInfoSorter
> --- PASS: TestKeyInfoSorter (0.00s)
> === RUN TestPrettyPrintZeroKeys
> --- PASS: TestPrettyPrintZeroKeys (0.00s)
> === RUN TestPrettyPrintRootAndSigningKeys
> --- PASS: TestPrettyPrintRootAndSigningKeys (0.05s)
> === RUN TestPrettyPrintZeroTargets
> --- PASS: TestPrettyPrintZeroTargets (0.00s)
> === RUN TestPrettyPrintSortedTargets
> --- PASS: TestPrettyPrintSortedTargets (0.00s)
> === RUN TestPrettyPrintZeroRoles
> --- PASS: TestPrettyPrintZeroRoles (0.00s)
> === RUN TestPrettyPrintSortedRoles
> --- PASS: TestPrettyPrintSortedRoles (0.00s)
> === RUN TestImportRootCert
> --- PASS: TestImportRootCert (0.00s)
> === RUN TestTokenAuth
> time="2020-03-22T08:31:18Z" level=error msg="could not reach https://localhost:9999: Get \"https://localhost:9999/v2/\": dial tcp [::1]:9999: connect: connection refused"
> --- PASS: TestTokenAuth (0.00s)
> === RUN TestAdminTokenAuth
> time="2020-03-22T08:31:18Z" level=error msg="could not reach https://localhost:9999: Get \"https://localhost:9999/v2/\": dial tcp [::1]:9999: connect: connection refused"
> --- PASS: TestAdminTokenAuth (0.00s)
> === RUN TestTokenAuth200Status
> --- PASS: TestTokenAuth200Status (0.00s)
> === RUN TestAdminTokenAuth200Status
> --- PASS: TestAdminTokenAuth200Status (0.01s)
> === RUN TestTokenAuth401Status
> --- PASS: TestTokenAuth401Status (0.00s)
> === RUN TestAdminTokenAuth401Status
> --- PASS: TestAdminTokenAuth401Status (0.00s)
> === RUN TestTokenAuthNon200Non401Status
> time="2020-03-22T08:31:18Z" level=error msg="could not reach http://127.0.0.1:34917: 404"
> --- PASS: TestTokenAuthNon200Non401Status (0.00s)
> === RUN TestAdminTokenAuthNon200Non401Status
> time="2020-03-22T08:31:18Z" level=error msg="could not reach http://127.0.0.1:46311: 404"
> --- PASS: TestAdminTokenAuthNon200Non401Status (0.00s)
> === RUN TestConfigureRepo
> --- PASS: TestConfigureRepo (0.00s)
> === RUN TestConfigureRepoRW
> Enter username: time="2020-03-22T08:31:18Z" level=error msg="error processing username input: EOF"
> --- PASS: TestConfigureRepoRW (0.00s)
> === RUN TestConfigureRepoAdmin
> Enter username: time="2020-03-22T08:31:18Z" level=error msg="error processing username input: EOF"
> --- PASS: TestConfigureRepoAdmin (0.00s)
> === RUN TestStatusUnstageAndReset
> Successfully reset specified changes for repository gun
> Addition of target "test1" by sha256 hash to repository "gun" staged for next publish.
> Addition of target "test2" by sha256 hash to repository "gun" staged for next publish.
> Addition of target "test3" by sha256 hash to repository "gun" staged for next publish.
> Addition of target "test4" by sha256 hash to repository "gun" staged for next publish.
> --- PASS: TestStatusUnstageAndReset (0.01s)
> === RUN TestGetTrustPinningErrors
> Pushing changes to gun
> --- PASS: TestGetTrustPinningErrors (0.00s)
> === RUN TestPasswordStore
> Enter username: time="2020-03-22T08:31:18Z" level=error msg="error processing username input: EOF"
> --- PASS: TestPasswordStore (0.00s)
> === RUN TestPasswordStoreWithEnvvar
> time="2020-03-22T08:31:18Z" level=error msg="Authentication string with zero-legnth username"
> time="2020-03-22T08:31:18Z" level=error msg="Could not base64-decode authentication string"
> --- PASS: TestPasswordStoreWithEnvvar (0.00s)
> === RUN TestGetPayload
> --- PASS: TestGetPayload (0.00s)
> === RUN TestFeedback
> --- PASS: TestFeedback (0.00s)
> === RUN TestHomeExpand
> --- PASS: TestHomeExpand (0.00s)
> PASS
> ok github.com/theupdateframework/notary/cmd/notary 5.620s
> === RUN TestBootstrap
> --- PASS: TestBootstrap (0.00s)
> === RUN TestGetAddrAndTLSConfigInvalidTLS
> --- PASS: TestGetAddrAndTLSConfigInvalidTLS (0.00s)
> === RUN TestGetAddrAndTLSConfigNoHTTPAddr
> --- PASS: TestGetAddrAndTLSConfigNoHTTPAddr (0.00s)
> === RUN TestGetAddrAndTLSConfigSuccessWithTLS
> --- PASS: TestGetAddrAndTLSConfigSuccessWithTLS (0.00s)
> === RUN TestGetAddrAndTLSConfigSuccessWithoutTLS
> --- PASS: TestGetAddrAndTLSConfigSuccessWithoutTLS (0.00s)
> === RUN TestGetAddrAndTLSConfigWithClientTLS
> --- PASS: TestGetAddrAndTLSConfigWithClientTLS (0.00s)
> === RUN TestGetInvalidTrustService
> --- PASS: TestGetInvalidTrustService (0.00s)
> === RUN TestGetLocalTrustService
> time="2020-03-22T08:31:15Z" level=info msg="Using local signing service, which requires ED25519. Ignoring all other trust_service parameters, including keyAlgorithm"
> --- PASS: TestGetLocalTrustService (0.00s)
> === RUN TestGetTrustServiceInvalidKeyAlgorithm
> --- PASS: TestGetTrustServiceInvalidKeyAlgorithm (0.00s)
> === RUN TestGetTrustServiceTLSMissingCertOrKey
> --- PASS: TestGetTrustServiceTLSMissingCertOrKey (0.00s)
> === RUN TestGetTrustServiceNoTLSConfig
> time="2020-03-22T08:31:15Z" level=info msg="Using remote signing service"
> --- PASS: TestGetTrustServiceNoTLSConfig (0.00s)
> === RUN TestGetTrustServiceTLSSuccess
> time="2020-03-22T08:31:15Z" level=info msg="Using remote signing service"
> --- PASS: TestGetTrustServiceTLSSuccess (0.00s)
> === RUN TestGetTrustServiceTLSFailure
> --- PASS: TestGetTrustServiceTLSFailure (0.00s)
> === RUN TestGetStoreInvalid
> time="2020-03-22T08:31:15Z" level=info msg="Using asdf backend"
> --- PASS: TestGetStoreInvalid (0.00s)
> === RUN TestGetStoreDBStore
> time="2020-03-22T08:31:15Z" level=info msg="Using sqlite3 backend"
> --- PASS: TestGetStoreDBStore (0.00s)
> === RUN TestGetStoreRethinkDBStoreConnectionFails
> time="2020-03-22T08:31:15Z" level=info msg="Using rethinkdb backend"
> --- PASS: TestGetStoreRethinkDBStoreConnectionFails (0.00s)
> === RUN TestGetMemoryStore
> time="2020-03-22T08:31:15Z" level=info msg="Using memory backend"
> --- PASS: TestGetMemoryStore (0.00s)
> === RUN TestGetCacheConfig
> --- PASS: TestGetCacheConfig (0.00s)
> === RUN TestGetGUNPRefixes
> --- PASS: TestGetGUNPRefixes (0.00s)
> === RUN TestSampleConfig
> time="2020-03-22T08:31:15Z" level=info msg="Using remote signing service"
> time="2020-03-22T08:31:15Z" level=info msg="Using sqlite3 backend"
> --- PASS: TestSampleConfig (0.00s)
> PASS
> ok github.com/theupdateframework/notary/cmd/notary-server 0.018s
> === RUN TestGetAddrAndTLSConfigInvalidTLS
> --- PASS: TestGetAddrAndTLSConfigInvalidTLS (0.00s)
> === RUN TestGetAddrAndTLSConfigNoGRPCAddr
> --- PASS: TestGetAddrAndTLSConfigNoGRPCAddr (0.00s)
> === RUN TestGetAddrAndTLSConfigSuccess
> --- PASS: TestGetAddrAndTLSConfigSuccess (0.00s)
> === RUN TestSetupCryptoServicesDBStoreNoDefaultAlias
> --- PASS: TestSetupCryptoServicesDBStoreNoDefaultAlias (0.00s)
> === RUN TestSetupCryptoServicesRethinkDBStoreNoDefaultAlias
> --- PASS: TestSetupCryptoServicesRethinkDBStoreNoDefaultAlias (0.00s)
> === RUN TestSetupCryptoServicesRethinkDBStoreConnectionFails
> TestSetupCryptoServicesRethinkDBStoreConnectionFails: main_test.go:121: DM - skipping malfunctioning test, fails on sbuild
> --- SKIP: TestSetupCryptoServicesRethinkDBStoreConnectionFails (0.00s)
> === RUN TestSetupCryptoServicesDBStoreSuccess
> --- PASS: TestSetupCryptoServicesDBStoreSuccess (0.08s)
> === RUN TestSetupCryptoServicesMemoryStore
> --- PASS: TestSetupCryptoServicesMemoryStore (0.01s)
> === RUN TestSetupCryptoServicesInvalidStore
> --- PASS: TestSetupCryptoServicesInvalidStore (0.00s)
> === RUN TestSetupGRPCServerInvalidAddress
> --- PASS: TestSetupGRPCServerInvalidAddress (0.00s)
> === RUN TestSetupGRPCServerSuccess
> --- PASS: TestSetupGRPCServerSuccess (0.00s)
> === RUN TestBootstrap
> --- PASS: TestBootstrap (0.00s)
> === RUN TestGetEnv
> --- PASS: TestGetEnv (0.00s)
> === RUN TestPassphraseRetrieverInvalid
> --- PASS: TestPassphraseRetrieverInvalid (0.00s)
> === RUN TestSampleConfig
> --- PASS: TestSampleConfig (0.00s)
> PASS
> ok github.com/theupdateframework/notary/cmd/notary-signer 0.108s
> === RUN TestGenerateCertificate
> --- PASS: TestGenerateCertificate (0.01s)
> === RUN TestCryptoServiceWithNonEmptyGUN
> --- PASS: TestCryptoServiceWithNonEmptyGUN (0.72s)
> === RUN TestCryptoServiceWithEmptyGUN
> --- PASS: TestCryptoServiceWithEmptyGUN (0.78s)
> === RUN TestCryptoSignerInterfaceBehavior
> --- PASS: TestCryptoSignerInterfaceBehavior (0.00s)
> PASS
> ok github.com/theupdateframework/notary/cryptoservice 1.515s
> === RUN TestGetPassphraseForUsingDelegationKey
> --- PASS: TestGetPassphraseForUsingDelegationKey (0.00s)
> === RUN TestGetPassphraseLimitsShortPassphrases
> --- PASS: TestGetPassphraseLimitsShortPassphrases (0.00s)
> === RUN TestGetPassphraseLimitsMismatchingPassphrases
> --- PASS: TestGetPassphraseLimitsMismatchingPassphrases (0.00s)
> === RUN TestGetPassphraseForCreatingDelegationKey
> --- PASS: TestGetPassphraseForCreatingDelegationKey (0.00s)
> === RUN TestRolePromptingAndCaching
> --- PASS: TestRolePromptingAndCaching (0.00s)
> === RUN TestPromptRetrieverNeedsTerminal
> --- PASS: TestPromptRetrieverNeedsTerminal (0.00s)
> === RUN TestGetPassphrase
> --- PASS: TestGetPassphrase (0.00s)
> PASS
> ok github.com/theupdateframework/notary/passphrase 0.009s
> ? github.com/theupdateframework/notary/proto [no test files]
> === RUN TestValidationErrorFormat
> time="2020-03-22T08:31:18Z" level=info msg="invalid update: Update sent by the client is invalid.: &{ErrBadHierarchy Metadata hierarchy is incomplete: no snapshot was included in update and server does not hold current snapshot key for repository}" go.version=go1.14.1 http.request.contenttype="multipart/form-data; boundary=83e263a6dd944aef8af58f36b41d833c4a804aeff2a19ee5eb60b57e9af1" http.request.host="127.0.0.1:42045" http.request.id=a6146bdc-ee67-4804-a789-ad7fbe4debcc http.request.method=POST http.request.remoteaddr="127.0.0.1:54548" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.contenttype="multipart/form-data; boundary=83e263a6dd944aef8af58f36b41d833c4a804aeff2a19ee5eb60b57e9af1" http.request.host="127.0.0.1:42045" http.request.id=a6146bdc-ee67-4804-a789-ad7fbe4debcc http.request.method=POST http.request.remoteaddr="127.0.0.1:54548" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration=2.181672ms http.response.status=400 http.response.written=260
> --- PASS: TestValidationErrorFormat (0.03s)
> === RUN TestRunBadAddr
> --- PASS: TestRunBadAddr (0.00s)
> === RUN TestRunReservedPort
> --- PASS: TestRunReservedPort (0.00s)
> === RUN TestRepoPrefixMatches
> time="2020-03-22T08:31:18Z" level=info msg="updated docker.io/notary to timestamp version 1, checksum d7fda26fe63fd458ede329abe90f77130e21a51daad393dbca4fe173626dd8ac" docker.io/notary=gun go.version=go1.14.1 http.request.contenttype="multipart/form-data; boundary=5fcd1260b7577836381c4b02f27b78d824347dd1fbea30cf5f432e907bdc" http.request.host="127.0.0.1:34835" http.request.id=26b1a91e-de92-4d8b-b5e4-914949a43a16 http.request.method=POST http.request.remoteaddr="127.0.0.1:52458" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.contenttype="multipart/form-data; boundary=5fcd1260b7577836381c4b02f27b78d824347dd1fbea30cf5f432e907bdc" http.request.host="127.0.0.1:34835" http.request.id=26b1a91e-de92-4d8b-b5e4-914949a43a16 http.request.method=POST http.request.remoteaddr="127.0.0.1:52458" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration=1.853309ms http.response.status=0 http.response.written=0
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:34835" http.request.id=ab985889-d8c1-4f9d-b09f-e708fde628c7 http.request.method=GET http.request.remoteaddr="127.0.0.1:52458" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.json http.request.useragent=Go-http-client/1.1 http.response.duration="246.746µs" http.response.status=200 http.response.written=683
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:34835" http.request.id=02fe480d-38a1-4660-94db-443f4b298e1c http.request.method=GET http.request.remoteaddr="127.0.0.1:52458" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.7eb810365073c69c61e2194dc562662d5b698d5ca5d71a11f557fb0735f5eefc.json http.request.useragent=Go-http-client/1.1 http.response.duration="19.001µs" http.response.status=200 http.response.written=683
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:34835" http.request.id=73f44121-43a8-44cd-957e-21f9f736614b http.request.method=GET http.request.remoteaddr="127.0.0.1:52458" http.request.uri=/v2/docker.io/notary/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="286.126µs" http.response.status=200 http.response.written=181
> time="2020-03-22T08:31:18Z" level=info msg="trust data deleted for docker.io/notary" docker.io/notary=gun go.version=go1.14.1 http.request.host="127.0.0.1:34835" http.request.id=58611095-e218-4993-bb11-d6ba383084c1 http.request.method=DELETE http.request.remoteaddr="127.0.0.1:52458" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:34835" http.request.id=58611095-e218-4993-bb11-d6ba383084c1 http.request.method=DELETE http.request.remoteaddr="127.0.0.1:52458" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration="46.278µs" http.response.status=0 http.response.written=0
> --- PASS: TestRepoPrefixMatches (0.01s)
> === RUN TestRepoPrefixDoesNotMatch
> --- PASS: TestRepoPrefixDoesNotMatch (0.02s)
> === RUN TestMetricsEndpoint
> --- PASS: TestMetricsEndpoint (0.00s)
> === RUN TestGetKeysEndpoint
> time="2020-03-22T08:31:18Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.14.1 http.request.host="127.0.0.1:36357" http.request.id=bc7664bb-8633-4fb5-9fc4-4ac0f4903727 http.request.method=GET http.request.remoteaddr="127.0.0.1:33834" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:36357" http.request.id=bc7664bb-8633-4fb5-9fc4-4ac0f4903727 http.request.method=GET http.request.remoteaddr="127.0.0.1:33834" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="99.508µs" http.response.status=404 http.response.written=104
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:36357" http.request.id=48b95c12-0834-4b22-9aa3-1d8d5527693d http.request.method=GET http.request.remoteaddr="127.0.0.1:33838" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="175.468µs" http.response.status=200 http.response.written=103
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:36357" http.request.id=2f61b884-962e-4290-92b2-6a2207320651 http.request.method=GET http.request.remoteaddr="127.0.0.1:33842" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="110.253µs" http.response.status=200 http.response.written=103
> time="2020-03-22T08:31:18Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.14.1 http.request.host="127.0.0.1:36357" http.request.id=97cc0cc5-35c6-4c65-81c2-395d66ff5f36 http.request.method=GET http.request.remoteaddr="127.0.0.1:33844" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:36357" http.request.id=97cc0cc5-35c6-4c65-81c2-395d66ff5f36 http.request.method=GET http.request.remoteaddr="127.0.0.1:33844" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="86.039µs" http.response.status=404 http.response.written=104
> time="2020-03-22T08:31:18Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.14.1 http.request.host="127.0.0.1:36357" http.request.id=60fb59b0-b150-4bef-b5ec-93ce0f5b7cb6 http.request.method=GET http.request.remoteaddr="127.0.0.1:33846" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:36357" http.request.id=60fb59b0-b150-4bef-b5ec-93ce0f5b7cb6 http.request.method=GET http.request.remoteaddr="127.0.0.1:33846" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="89.065µs" http.response.status=404 http.response.written=104
> --- PASS: TestGetKeysEndpoint (0.01s)
> === RUN TestGetRoleByHash
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:39767" http.request.id=610450b9-261b-4e8f-aa6f-d5cd9cfd81ec http.request.method=GET http.request.remoteaddr="127.0.0.1:56018" http.request.uri=/v2/gun/_trust/tuf/timestamp.1dbad64a72a276191ee32ccdd4cb7c70f17e54376486d9875333a16c300e72dc.json http.request.useragent=Go-http-client/1.1 http.response.duration="41.673µs" http.response.status=200 http.response.written=114
> --- PASS: TestGetRoleByHash (0.00s)
> === RUN TestGetRoleByVersion
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:46021" http.request.id=b230d509-00d7-4771-8a39-fac5b0987384 http.request.method=GET http.request.remoteaddr="127.0.0.1:41598" http.request.uri=/v2/gun/_trust/tuf/1.timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration="65.893µs" http.response.status=200 http.response.written=115
> --- PASS: TestGetRoleByVersion (0.00s)
> === RUN TestGetCurrentRole
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:37271" http.request.id=6932b429-a0be-48b3-845d-21832120f96e http.request.method=GET http.request.remoteaddr="127.0.0.1:36418" http.request.uri=/v2/gun/_trust/tuf/timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration="269.859µs" http.response.status=200 http.response.written=495
> --- PASS: TestGetCurrentRole (0.00s)
> === RUN TestRotateKeyEndpoint
> time="2020-03-22T08:31:18Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=67117e65-2049-4144-9c1f-8e76f11a9999 http.request.method=POST http.request.remoteaddr="127.0.0.1:58266" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=67117e65-2049-4144-9c1f-8e76f11a9999 http.request.method=POST http.request.remoteaddr="127.0.0.1:58266" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="117.967µs" http.response.status=404 http.response.written=104
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=e41551b2-e974-4c01-99d9-0bc1d3c7870b http.request.method=POST http.request.remoteaddr="127.0.0.1:58268" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="184.431µs" http.response.status=200 http.response.written=103
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=da269f53-7e02-4452-b343-5510c1a3900e http.request.method=POST http.request.remoteaddr="127.0.0.1:58270" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="165.379µs" http.response.status=200 http.response.written=103
> time="2020-03-22T08:31:18Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=9ced0bdf-afec-4808-bfb4-10be57b50e16 http.request.method=POST http.request.remoteaddr="127.0.0.1:58272" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=9ced0bdf-afec-4808-bfb4-10be57b50e16 http.request.method=POST http.request.remoteaddr="127.0.0.1:58272" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="83.411µs" http.response.status=404 http.response.written=104
> time="2020-03-22T08:31:18Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=75ef5f00-626d-4a2b-920d-2542f62d7523 http.request.method=POST http.request.remoteaddr="127.0.0.1:58280" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=75ef5f00-626d-4a2b-920d-2542f62d7523 http.request.method=POST http.request.remoteaddr="127.0.0.1:58280" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="72.22µs" http.response.status=404 http.response.written=104
> time="2020-03-22T08:31:18Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=c5ea3343-7b36-48dd-bce2-f9ec512b2471 http.request.method=POST http.request.remoteaddr="127.0.0.1:58282" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=c5ea3343-7b36-48dd-bce2-f9ec512b2471 http.request.method=POST http.request.remoteaddr="127.0.0.1:58282" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="77.395µs" http.response.status=404 http.response.written=104
> --- PASS: TestRotateKeyEndpoint (0.01s)
> PASS
> ok github.com/theupdateframework/notary/server 0.099s
> ? github.com/theupdateframework/notary/server/errors [no test files]
> === RUN Test_changefeed
> --- PASS: Test_changefeed (0.00s)
> === RUN Test_checkChangefeedInputs
> time="2020-03-22T08:31:18Z" level=error msg="500 GET unable to retrieve storage"
> time="2020-03-22T08:31:18Z" level=error msg="400 GET invalid pageSize: not_a_number"
> --- PASS: Test_checkChangefeedInputs (0.00s)
> === RUN TestMainHandlerGet
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:42363" http.request.id=6051da3c-8110-41af-b846-477ea3973296 http.request.method=GET http.request.remoteaddr="127.0.0.1:56348" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.duration="63.317µs" http.response.status=200 http.response.written=2
> --- PASS: TestMainHandlerGet (0.00s)
> === RUN TestMainHandlerNotGet
> time="2020-03-22T08:31:18Z" level=info msg="generic not found: You have requested a resource that does not exist.: <nil>" go.version=go1.14.1 http.request.host="127.0.0.1:40991" http.request.id=34774eb9-10dc-4c04-8dc5-45c76d34308d http.request.method=HEAD http.request.remoteaddr="127.0.0.1:49790" http.request.uri=/ http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:40991" http.request.id=34774eb9-10dc-4c04-8dc5-45c76d34308d http.request.method=HEAD http.request.remoteaddr="127.0.0.1:49790" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="166.266µs" http.response.status=404 http.response.written=105
> --- PASS: TestMainHandlerNotGet (0.00s)
> === RUN TestKeyHandlersInvalidConfiguration
> time="2020-03-22T08:31:18Z" level=error msg="500 GET storage not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 GET storage not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 GET crypto service not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 GET crypto service not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 GET key algorithm not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 GET key algorithm not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 POST storage not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 POST storage not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 POST crypto service not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 POST crypto service not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 POST key algorithm not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 POST key algorithm not configured" go.version=go1.14.1 gun=gun
> --- PASS: TestKeyHandlersInvalidConfiguration (0.00s)
> === RUN TestKeyHandlersNoRoleOrRepo
> time="2020-03-22T08:31:18Z" level=info msg="400 GET no gun in request" =gun go.version=go1.14.1
> time="2020-03-22T08:31:18Z" level=info msg="400 GET no gun in request" =gun go.version=go1.14.1
> time="2020-03-22T08:31:18Z" level=info msg="400 GET no role in request" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 GET no role in request" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 POST no gun in request" =gun go.version=go1.14.1
> time="2020-03-22T08:31:18Z" level=info msg="400 POST no gun in request" =gun go.version=go1.14.1
> time="2020-03-22T08:31:18Z" level=info msg="400 POST no role in request" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 POST no role in request" go.version=go1.14.1 gun=gun
> --- PASS: TestKeyHandlersNoRoleOrRepo (0.00s)
> === RUN TestKeyHandlersInvalidRole
> time="2020-03-22T08:31:18Z" level=info msg="400 GET root key: <nil>" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 GET targets key: <nil>" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 GET targets/a key: <nil>" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 GET invalidrole key: <nil>" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 POST root key: <nil>" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 POST targets key: <nil>" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 POST targets/a key: <nil>" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 POST invalidrole key: <nil>" go.version=go1.14.1 gun=gun
> --- PASS: TestKeyHandlersInvalidRole (0.00s)
> === RUN TestGetKeyHandlerCreatesOnce
> --- PASS: TestGetKeyHandlerCreatesOnce (0.00s)
> === RUN TestKeyHandlersInvalidKeyAlgo
> time="2020-03-22T08:31:18Z" level=error msg="500 GET timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 GET snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 POST timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 POST snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.14.1 gun=gun
> --- PASS: TestKeyHandlersInvalidKeyAlgo (0.00s)
> === RUN TestRotateKeyHandlerSuccessfulRotation
> --- PASS: TestRotateKeyHandlerSuccessfulRotation (0.00s)
> === RUN TestGetHandlerRoot
> time="2020-03-22T08:31:18Z" level=info msg="404 GET root role" go.version=go1.14.1 gun=gun
> --- PASS: TestGetHandlerRoot (0.01s)
> === RUN TestGetHandlerTimestamp
> --- PASS: TestGetHandlerTimestamp (0.01s)
> === RUN TestGetHandlerSnapshot
> --- PASS: TestGetHandlerSnapshot (0.00s)
> === RUN TestGetHandler404
> time="2020-03-22T08:31:18Z" level=info msg="404 GET root role" go.version=go1.14.1 gun=gun
> --- PASS: TestGetHandler404 (0.00s)
> === RUN TestGetHandlerNilData
> time="2020-03-22T08:31:18Z" level=info msg="404 GET root role" go.version=go1.14.1 gun=gun
> --- PASS: TestGetHandlerNilData (0.00s)
> === RUN TestGetHandlerNoStorage
> time="2020-03-22T08:31:18Z" level=error msg="500 GET: no storage exists" =gun go.version=go1.14.1
> --- PASS: TestGetHandlerNoStorage (0.00s)
> === RUN TestAtomicUpdateValidationFailurePropagated
> --- PASS: TestAtomicUpdateValidationFailurePropagated (0.02s)
> === RUN TestAtomicUpdateNonValidationFailureNotPropagated
> time="2020-03-22T08:31:18Z" level=info msg="400 POST error validating update" go.version=go1.14.1 testGUN=gun
> --- PASS: TestAtomicUpdateNonValidationFailureNotPropagated (0.01s)
> === RUN TestAtomicUpdateVersionErrorPropagated
> time="2020-03-22T08:31:18Z" level=info msg="400 POST old version error" go.version=go1.14.1 testGUN=gun
> --- PASS: TestAtomicUpdateVersionErrorPropagated (0.02s)
> === RUN TestGetMaybeServerSignedNoCrypto
> --- PASS: TestGetMaybeServerSignedNoCrypto (0.00s)
> === RUN TestGetMaybeServerSignedNoKey
> --- PASS: TestGetMaybeServerSignedNoKey (0.00s)
> === RUN TestValidateEmptyNew
> --- PASS: TestValidateEmptyNew (0.01s)
> === RUN TestValidateRootCanContainOnlyx509KeysWithRightGun
> --- PASS: TestValidateRootCanContainOnlyx509KeysWithRightGun (0.01s)
> === RUN TestValidatePrevTimestamp
> --- PASS: TestValidatePrevTimestamp (0.01s)
> === RUN TestValidatePreviousTimestampCorrupt
> time="2020-03-22T08:31:18Z" level=error msg="Failed to unmarshal existing timestamp for GUN docker.com/notary"
> --- PASS: TestValidatePreviousTimestampCorrupt (0.01s)
> === RUN TestValidateGetCurrentTimestampBroken
> --- PASS: TestValidateGetCurrentTimestampBroken (0.01s)
> === RUN TestValidateNoNewRoot
> --- PASS: TestValidateNoNewRoot (0.01s)
> === RUN TestValidateNoNewTargets
> --- PASS: TestValidateNoNewTargets (0.02s)
> === RUN TestValidateOnlySnapshot
> --- PASS: TestValidateOnlySnapshot (0.01s)
> === RUN TestValidateOldRoot
> --- PASS: TestValidateOldRoot (0.02s)
> === RUN TestValidateOldRootCorrupt
> --- PASS: TestValidateOldRootCorrupt (0.01s)
> === RUN TestValidateOldRootCorruptRootRole
> --- PASS: TestValidateOldRootCorruptRootRole (0.01s)
> === RUN TestValidateRootGetCurrentRootBroken
> --- PASS: TestValidateRootGetCurrentRootBroken (0.01s)
> === RUN TestValidateRootRotationWithOldSigs
> --- PASS: TestValidateRootRotationWithOldSigs (0.03s)
> === RUN TestValidateRootRotationMultipleKeysThreshold1
> --- PASS: TestValidateRootRotationMultipleKeysThreshold1 (0.02s)
> === RUN TestRootRotationNotSignedWithOldKeysForOldRole
> --- PASS: TestRootRotationNotSignedWithOldKeysForOldRole (0.02s)
> === RUN TestRootRotationVersionIncrement
> --- PASS: TestRootRotationVersionIncrement (0.02s)
> === RUN TestValidateNoRoot
> --- PASS: TestValidateNoRoot (0.02s)
> === RUN TestValidateSnapshotMissingNoSnapshotKey
> --- PASS: TestValidateSnapshotMissingNoSnapshotKey (0.02s)
> === RUN TestValidateSnapshotGenerateNoPrev
> --- PASS: TestValidateSnapshotGenerateNoPrev (0.02s)
> === RUN TestValidateSnapshotGenerateWithPrev
> --- PASS: TestValidateSnapshotGenerateWithPrev (0.02s)
> === RUN TestValidateSnapshotGeneratePrevCorrupt
> time="2020-03-22T08:31:18Z" level=error msg="Failed to unmarshal existing snapshot for GUN docker.com/notary"
> --- PASS: TestValidateSnapshotGeneratePrevCorrupt (0.01s)
> === RUN TestValidateSnapshotGenerateStoreGetCurrentSnapshotBroken
> --- PASS: TestValidateSnapshotGenerateStoreGetCurrentSnapshotBroken (0.02s)
> === RUN TestValidateSnapshotGenerateNoTargets
> --- PASS: TestValidateSnapshotGenerateNoTargets (0.01s)
> === RUN TestValidateSnapshotGenerate
> --- PASS: TestValidateSnapshotGenerate (0.02s)
> === RUN TestValidateRootNoTimestampKey
> --- PASS: TestValidateRootNoTimestampKey (0.00s)
> === RUN TestValidateRootInvalidTimestampKey
> --- PASS: TestValidateRootInvalidTimestampKey (0.00s)
> === RUN TestValidateRootInvalidTimestampThreshold
> --- PASS: TestValidateRootInvalidTimestampThreshold (0.01s)
> === RUN TestValidateRootInvalidZeroThreshold
> --- PASS: TestValidateRootInvalidZeroThreshold (0.03s)
> === RUN TestValidateRootRoleMissing
> --- PASS: TestValidateRootRoleMissing (0.01s)
> === RUN TestValidateTargetsRoleMissing
> --- PASS: TestValidateTargetsRoleMissing (0.01s)
> === RUN TestValidateSnapshotRoleMissing
> --- PASS: TestValidateSnapshotRoleMissing (0.01s)
> === RUN TestValidateRootSigMissing
> --- PASS: TestValidateRootSigMissing (0.01s)
> === RUN TestValidateTargetsSigMissing
> time="2020-03-22T08:31:19Z" level=error msg="ErrBadTargets: tuf: data has no signatures"
> --- PASS: TestValidateTargetsSigMissing (0.01s)
> === RUN TestValidateSnapshotSigMissing
> --- PASS: TestValidateSnapshotSigMissing (0.01s)
> === RUN TestValidateRootCorrupt
> --- PASS: TestValidateRootCorrupt (0.01s)
> === RUN TestValidateTargetsCorrupt
> time="2020-03-22T08:31:19Z" level=error msg="ErrBadTargets: invalid character '\\u0084' looking for beginning of value"
> --- PASS: TestValidateTargetsCorrupt (0.01s)
> === RUN TestValidateSnapshotCorrupt
> --- PASS: TestValidateSnapshotCorrupt (0.02s)
> === RUN TestValidateRootModifiedSize
> --- PASS: TestValidateRootModifiedSize (0.01s)
> === RUN TestValidateTargetsModifiedSize
> --- PASS: TestValidateTargetsModifiedSize (0.01s)
> === RUN TestValidateRootModifiedHash
> --- PASS: TestValidateRootModifiedHash (0.01s)
> === RUN TestValidateTargetsModifiedHash
> --- PASS: TestValidateTargetsModifiedHash (0.01s)
> === RUN TestGenerateSnapshotRootNotLoaded
> --- PASS: TestGenerateSnapshotRootNotLoaded (0.00s)
> === RUN TestGenerateSnapshotNoKey
> --- PASS: TestGenerateSnapshotNoKey (0.00s)
> === RUN TestLoadTargetsLoadsNothingIfNoUpdates
> --- PASS: TestLoadTargetsLoadsNothingIfNoUpdates (0.01s)
> === RUN TestValidateTargetsRequiresStoredParent
> time="2020-03-22T08:31:19Z" level=error msg="ErrBadTargets: targets must be loaded first"
> --- PASS: TestValidateTargetsRequiresStoredParent (0.00s)
> === RUN TestValidateTargetsParentInUpdate
> time="2020-03-22T08:31:19Z" level=error msg="ErrBadTargets: invalid character 'I' looking for beginning of value"
> --- PASS: TestValidateTargetsParentInUpdate (0.00s)
> === RUN TestValidateTargetsRoleNotInParent
> time="2020-03-22T08:31:19Z" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist"
> time="2020-03-22T08:31:19Z" level=error msg="ErrBadTargets: targets has already been loaded"
> time="2020-03-22T08:31:19Z" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist"
> --- PASS: TestValidateTargetsRoleNotInParent (0.01s)
> PASS
> ok github.com/theupdateframework/notary/server/handlers 0.637s
> === RUN TestSnapshotExpired
> --- PASS: TestSnapshotExpired (0.00s)
> === RUN TestSnapshotNotExpired
> --- PASS: TestSnapshotNotExpired (0.00s)
> === RUN TestGetSnapshotKeyCreate
> --- PASS: TestGetSnapshotKeyCreate (0.00s)
> === RUN TestGetSnapshotKeyCreateWithFailingStore
> time="2020-03-22T08:31:19Z" level=error msg="Error when retrieving root role for GUN gun: failing store failed"
> --- PASS: TestGetSnapshotKeyCreateWithFailingStore (0.00s)
> === RUN TestGetSnapshotKeyCreateWithCorruptedStore
> time="2020-03-22T08:31:19Z" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve snapshot key ID"
> --- PASS: TestGetSnapshotKeyCreateWithCorruptedStore (0.00s)
> === RUN TestGetSnapshotKeyCreateWithInvalidAlgo
> --- PASS: TestGetSnapshotKeyCreateWithInvalidAlgo (0.00s)
> === RUN TestGetSnapshotKeyExistingMetadata
> --- PASS: TestGetSnapshotKeyExistingMetadata (0.03s)
> === RUN TestGetSnapshotNoPreviousSnapshot
> time="2020-03-22T08:31:19Z" level=error msg="Failed to unmarshal existing snapshot for GUN gun"
> --- PASS: TestGetSnapshotNoPreviousSnapshot (0.00s)
> === RUN TestGetSnapshotReturnsPreviousSnapshotIfUnexpired
> --- PASS: TestGetSnapshotReturnsPreviousSnapshotIfUnexpired (0.00s)
> === RUN TestGetSnapshotOldSnapshotExpired
> --- PASS: TestGetSnapshotOldSnapshotExpired (0.00s)
> === RUN TestCannotMakeNewSnapshotIfNoRoot
> --- PASS: TestCannotMakeNewSnapshotIfNoRoot (0.00s)
> === RUN TestCreateSnapshotNoKeyInCrypto
> --- PASS: TestCreateSnapshotNoKeyInCrypto (0.00s)
> PASS
> ok github.com/theupdateframework/notary/server/snapshot 0.065s
> === RUN TestMemoryUpdateCurrentEmpty
> --- PASS: TestMemoryUpdateCurrentEmpty (0.00s)
> === RUN TestMemoryUpdateCurrentVersionCheckOldVersionExists
> --- PASS: TestMemoryUpdateCurrentVersionCheckOldVersionExists (0.00s)
> === RUN TestMemoryUpdateCurrentVersionCheckOldVersionNotExist
> --- PASS: TestMemoryUpdateCurrentVersionCheckOldVersionNotExist (0.00s)
> === RUN TestMemoryUpdateManyNoConflicts
> --- PASS: TestMemoryUpdateManyNoConflicts (0.00s)
> === RUN TestMemoryUpdateManyConflictRollback
> --- PASS: TestMemoryUpdateManyConflictRollback (0.00s)
> === RUN TestMemoryDeleteSuccess
> --- PASS: TestMemoryDeleteSuccess (0.00s)
> === RUN TestGetCurrent
> --- PASS: TestGetCurrent (0.00s)
> === RUN TestGetChecksumNotFound
> --- PASS: TestGetChecksumNotFound (0.00s)
> === RUN TestMemoryGetChanges
> --- PASS: TestMemoryGetChanges (0.00s)
> === RUN TestGetVersion
> --- PASS: TestGetVersion (0.00s)
> === RUN TestRDBTUFFileJSONUnmarshalling
> --- PASS: TestRDBTUFFileJSONUnmarshalling (0.00s)
> === RUN TestRDBTUFFileJSONUnmarshallingFailure
> --- PASS: TestRDBTUFFileJSONUnmarshallingFailure (0.00s)
> === RUN TestSQLUpdateCurrentEmpty
> --- PASS: TestSQLUpdateCurrentEmpty (0.09s)
> === RUN TestSQLUpdateCurrentVersionCheckOldVersionExists
> --- PASS: TestSQLUpdateCurrentVersionCheckOldVersionExists (0.04s)
> === RUN TestSQLUpdateCurrentVersionCheckOldVersionNotExist
> --- PASS: TestSQLUpdateCurrentVersionCheckOldVersionNotExist (0.05s)
> === RUN TestSQLUpdateManyNoConflicts
> --- PASS: TestSQLUpdateManyNoConflicts (0.07s)
> === RUN TestSQLUpdateManyConflictRollback
> --- PASS: TestSQLUpdateManyConflictRollback (0.05s)
> === RUN TestSQLDelete
> --- PASS: TestSQLDelete (0.15s)
> === RUN TestSQLDBCheckHealthTableMissing
> --- PASS: TestSQLDBCheckHealthTableMissing (0.07s)
> === RUN TestSQLDBCheckHealthDBConnectionFail
> --- PASS: TestSQLDBCheckHealthDBConnectionFail (0.04s)
> === RUN TestSQLDBCheckHealthSucceeds
> --- PASS: TestSQLDBCheckHealthSucceeds (0.03s)
> === RUN TestSQLDBGetChecksum
> --- PASS: TestSQLDBGetChecksum (0.06s)
> === RUN TestSQLDBGetChecksumNotFound
> --- PASS: TestSQLDBGetChecksumNotFound (0.04s)
> === RUN TestSQLTUFMetaStoreGetCurrent
> --- PASS: TestSQLTUFMetaStoreGetCurrent (0.11s)
> === RUN TestSQLGetChanges
> --- PASS: TestSQLGetChanges (0.11s)
> === RUN TestSQLDBGetVersion
> --- PASS: TestSQLDBGetVersion (0.04s)
> PASS
> ok github.com/theupdateframework/notary/server/storage 0.965s
> === RUN TestTimestampExpired
> --- PASS: TestTimestampExpired (0.00s)
> === RUN TestTimestampNotExpired
> --- PASS: TestTimestampNotExpired (0.00s)
> === RUN TestGetTimestampKey
> --- PASS: TestGetTimestampKey (0.00s)
> === RUN TestGetTimestampNoPreviousTimestamp
> time="2020-03-22T08:31:20Z" level=error msg="Failed to unmarshal existing timestamp"
> --- PASS: TestGetTimestampNoPreviousTimestamp (0.01s)
> === RUN TestGetTimestampReturnsPreviousTimestampIfUnexpired
> --- PASS: TestGetTimestampReturnsPreviousTimestampIfUnexpired (0.00s)
> === RUN TestGetTimestampOldTimestampExpired
> --- PASS: TestGetTimestampOldTimestampExpired (0.00s)
> === RUN TestCannotMakeNewTimestampIfNoRootOrSnapshot
> time="2020-03-22T08:31:20Z" level=error msg="Failed to create a new timestamp"
> time="2020-03-22T08:31:20Z" level=error msg="Failed to create a new timestamp"
> --- PASS: TestCannotMakeNewTimestampIfNoRootOrSnapshot (0.00s)
> === RUN TestCreateTimestampNoKeyInCrypto
> time="2020-03-22T08:31:20Z" level=error msg="Failed to create a new timestamp"
> --- PASS: TestCreateTimestampNoKeyInCrypto (0.00s)
> === RUN TestGetTimestampKeyCreateWithFailingStore
> time="2020-03-22T08:31:20Z" level=error msg="Error when retrieving root role for GUN gun: failing store failed"
> --- PASS: TestGetTimestampKeyCreateWithFailingStore (0.00s)
> === RUN TestGetTimestampKeyCreateWithCorruptedStore
> time="2020-03-22T08:31:20Z" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve timestamp key ID"
> --- PASS: TestGetTimestampKeyCreateWithCorruptedStore (0.00s)
> === RUN TestGetTimestampKeyCreateWithInvalidAlgo
> --- PASS: TestGetTimestampKeyCreateWithInvalidAlgo (0.00s)
> === RUN TestGetTimestampKeyExistingMetadata
> --- PASS: TestGetTimestampKeyExistingMetadata (0.00s)
> PASS
> ok github.com/theupdateframework/notary/server/timestamp 0.038s
> === RUN TestHealthCheckKMUnhealthy
> --- PASS: TestHealthCheckKMUnhealthy (0.00s)
> === RUN TestHealthCheckSignerUnhealthy
> --- PASS: TestHealthCheckSignerUnhealthy (0.00s)
> === RUN TestHealthCheckKMTimeout
> --- PASS: TestHealthCheckKMTimeout (0.00s)
> === RUN TestHealthCheckSignerTimeout
> --- PASS: TestHealthCheckSignerTimeout (0.00s)
> === RUN TestHealthCheckKMHealthy
> --- PASS: TestHealthCheckKMHealthy (0.00s)
> === RUN TestHealthCheckSignerHealthy
> --- PASS: TestHealthCheckSignerHealthy (0.00s)
> === RUN TestHealthCheckKMConnectionDied
> --- PASS: TestHealthCheckKMConnectionDied (0.00s)
> === RUN TestHealthCheckSignerConnectionDied
> --- PASS: TestHealthCheckSignerConnectionDied (0.00s)
> === RUN TestHealthCheckForOverallStatus
> --- PASS: TestHealthCheckForOverallStatus (0.00s)
> === RUN TestHealthCheckNonexistentService
> --- PASS: TestHealthCheckNonexistentService (0.00s)
> === RUN TestGetPrivateKeyAndSignWithExistingKey
> time="2020-03-22T08:31:20Z" level=info msg="Sign: Signed message! with KeyID 6bcde84ce673f08c969c96ebe10eb005583b5cf3cf26345a02a82482ca091cd4" go.version=go1.14.1
> --- PASS: TestGetPrivateKeyAndSignWithExistingKey (0.05s)
> === RUN TestCannotSignWithKeyThatDoesntExist
> time="2020-03-22T08:31:20Z" level=error msg="Sign: key 37763809d0ee2895e0037a5d716b1e03984babd9d33796b137af33264e0852c1 not found" go.version=go1.14.1
> --- PASS: TestCannotSignWithKeyThatDoesntExist (0.00s)
> === RUN TestCryptoSignerInterfaceBehavior
> time="2020-03-22T08:31:20Z" level=error msg="GetKeyInfo: key nonexistent not found" go.version=go1.14.1
> time="2020-03-22T08:31:20Z" level=error msg="GetKeyInfo: key nonexistent not found" go.version=go1.14.1
> time="2020-03-22T08:31:20Z" level=info msg="CreateKey: Created KeyID d81c546d41724791ea9f09ef9624870de0287281bf270cd28ce12372cbda4b9f" go.version=go1.14.1
> time="2020-03-22T08:31:20Z" level=info msg="CreateKey: Created KeyID a4c0a41427efdb206e8032d5b1dafabf3720a14ce98418694d361d4b5cd36077" go.version=go1.14.1
> time="2020-03-22T08:31:20Z" level=error msg="GetKeyInfo: key d81c546d41724791ea9f09ef9624870de0287281bf270cd28ce12372cbda4b9f not found" go.version=go1.14.1
> time="2020-03-22T08:31:20Z" level=error msg="GetKeyInfo: key a4c0a41427efdb206e8032d5b1dafabf3720a14ce98418694d361d4b5cd36077 not found" go.version=go1.14.1
> --- PASS: TestCryptoSignerInterfaceBehavior (0.01s)
> PASS
> ok github.com/theupdateframework/notary/signer 0.111s
> ? github.com/theupdateframework/notary/signer/api [no test files]
> ? github.com/theupdateframework/notary/signer/client [no test files]
> === RUN TestGetSuccessPopulatesCache
> --- PASS: TestGetSuccessPopulatesCache (0.02s)
> === RUN TestAddKeyPopulatesCacheIfSuccessful
> --- PASS: TestAddKeyPopulatesCacheIfSuccessful (0.00s)
> === RUN TestDeleteKeyRemovesKeyFromCache
> --- PASS: TestDeleteKeyRemovesKeyFromCache (0.01s)
> === RUN TestRDBPrivateKeyJSONUnmarshalling
> --- PASS: TestRDBPrivateKeyJSONUnmarshalling (0.00s)
> === RUN TestRDBPrivateKeyJSONUnmarshallingFailure
> --- PASS: TestRDBPrivateKeyJSONUnmarshallingFailure (0.00s)
> === RUN TestNewSQLKeyDBStorePropagatesDBError
> `nodb` is not officially supported, running under compatibility mode.
> --- PASS: TestNewSQLKeyDBStorePropagatesDBError (0.00s)
> === RUN TestSQLDBHealthCheckMissingTable
> --- PASS: TestSQLDBHealthCheckMissingTable (0.03s)
> === RUN TestSQLDBHealthCheckNoConnection
> --- PASS: TestSQLDBHealthCheckNoConnection (0.03s)
> === RUN TestSQLKeyCanOnlyBeAddedOnce
>
>
> [35m(UNIQUE constraint failed: private_keys.key_id)[0m
> [33m[2020-03-22 08:31:22][0m [31;1m [0m
> --- PASS: TestSQLKeyCanOnlyBeAddedOnce (0.17s)
> === RUN TestSQLCreateDelete
> --- PASS: TestSQLCreateDelete (0.18s)
> === RUN TestSQLKeyRotation
> --- PASS: TestSQLKeyRotation (0.18s)
> === RUN TestSQLSigningMarksKeyActive
> time="2020-03-22T08:31:22Z" level=error msg="Key cfbfdb459dfb9543229a49e9f890307e74a83ab79c6e4ee2592a0e0fabdfdd52 was just used to sign hash successful, db closed, error when trying to mark key as active: sql: database is closed"
>
>
> [35m(sql: database is closed)[0m
> [33m[2020-03-22 08:31:22][0m [31;1m [0m
> --- PASS: TestSQLSigningMarksKeyActive (0.33s)
> === RUN TestSQLCreateKey
> --- PASS: TestSQLCreateKey (0.20s)
> === RUN TestSQLUnimplementedInterfaceBehavior
> --- PASS: TestSQLUnimplementedInterfaceBehavior (0.13s)
> PASS
> ok github.com/theupdateframework/notary/signer/keydbstore 1.283s
> === RUN TestSet
> --- PASS: TestSet (0.00s)
> === RUN TestSetWithNoParentDirectory
> --- PASS: TestSetWithNoParentDirectory (0.00s)
> === RUN TestSetRemovesExistingFileBeforeWriting
> --- PASS: TestSetRemovesExistingFileBeforeWriting (0.00s)
> === RUN TestGetSized
> --- PASS: TestGetSized (0.00s)
> === RUN TestGetSizedSet
> --- PASS: TestGetSizedSet (0.00s)
> === RUN TestRemove
> --- PASS: TestRemove (0.00s)
> === RUN TestRemoveAll
> --- PASS: TestRemoveAll (0.00s)
> === RUN TestAddFile
> --- PASS: TestAddFile (0.00s)
> === RUN TestRemoveFile
> --- PASS: TestRemoveFile (0.01s)
> === RUN TestListFiles
> --- PASS: TestListFiles (0.00s)
> === RUN TestGetPath
> --- PASS: TestGetPath (0.00s)
> === RUN TestGetPathProtection
> --- PASS: TestGetPathProtection (0.00s)
> === RUN TestGetData
> --- PASS: TestGetData (0.00s)
> === RUN TestCreateDirectory
> --- PASS: TestCreateDirectory (0.00s)
> === RUN TestCreatePrivateDirectory
> --- PASS: TestCreatePrivateDirectory (0.00s)
> === RUN TestFileStoreConsistency
> --- PASS: TestFileStoreConsistency (0.00s)
> === RUN TestHTTPStoreGetSized
> --- PASS: TestHTTPStoreGetSized (0.00s)
> === RUN TestHTTPStoreGetAllMeta
> --- PASS: TestHTTPStoreGetAllMeta (0.00s)
> === RUN TestSetSingleAndSetMultiMeta
> --- PASS: TestSetSingleAndSetMultiMeta (0.00s)
> === RUN Test404Error
> --- PASS: Test404Error (0.00s)
> === RUN Test50XErrors
> --- PASS: Test50XErrors (0.00s)
> === RUN Test400Error
> --- PASS: Test400Error (0.00s)
> === RUN TestTranslateErrorsParse400Errors
> --- PASS: TestTranslateErrorsParse400Errors (0.00s)
> === RUN TestTranslateErrorsWhenCannotParse400
> --- PASS: TestTranslateErrorsWhenCannotParse400 (0.00s)
> === RUN TestTranslateErrorsLimitsErrorSize
> --- PASS: TestTranslateErrorsLimitsErrorSize (0.00s)
> === RUN TestHTTPStoreRemoveAll
> --- PASS: TestHTTPStoreRemoveAll (0.00s)
> === RUN TestHTTPStoreRotateKey
> --- PASS: TestHTTPStoreRotateKey (0.00s)
> === RUN TestHTTPStoreGetKey
> --- PASS: TestHTTPStoreGetKey (0.00s)
> === RUN TestHTTPStoreGetRotateKeySizeLimited
> --- PASS: TestHTTPStoreGetRotateKeySizeLimited (0.00s)
> === RUN TestHTTPOffline
> --- PASS: TestHTTPOffline (0.00s)
> === RUN TestErrServerUnavailable
> --- PASS: TestErrServerUnavailable (0.00s)
> === RUN TestNetworkError
> TestNetworkError: httpstore_test.go:396:
> Error Trace: httpstore_test.go:396
> Error: Not equal:
> expected: "GET https://auth.docker.io: abc:def:ghi"
> actual : "GET \"https://auth.docker.io\": abc:def:ghi"
>
> Diff:
> --- Expected
> +++ Actual
> @@ -1 +1 @@
> -GET https://auth.docker.io: abc:def:ghi
> +GET "https://auth.docker.io": abc:def:ghi
> Test: TestNetworkError
> --- FAIL: TestNetworkError (0.00s)
> === RUN TestMemoryStoreMetadataOperations
> --- PASS: TestMemoryStoreMetadataOperations (0.00s)
> === RUN TestMemoryStoreGetSized
> --- PASS: TestMemoryStoreGetSized (0.00s)
> === RUN TestOfflineStore
> --- PASS: TestOfflineStore (0.00s)
> === RUN TestErrOffline
> --- PASS: TestErrOffline (0.00s)
> === RUN TestMemoryStoreMetadata
> --- PASS: TestMemoryStoreMetadata (0.00s)
> FAIL
> FAIL github.com/theupdateframework/notary/storage 0.035s
> ? github.com/theupdateframework/notary/storage/rethinkdb [no test files]
> === RUN TestExportKeys
> --- PASS: TestExportKeys (0.00s)
> === RUN TestExportKeysByGUN
> --- PASS: TestExportKeysByGUN (0.00s)
> === RUN TestExportKeysByID
> --- PASS: TestExportKeysByID (0.00s)
> === RUN TestExport2InOneFile
> --- PASS: TestExport2InOneFile (0.00s)
> === RUN TestImportKeys
> --- PASS: TestImportKeys (0.00s)
> === RUN TestImportNoPath
> --- PASS: TestImportNoPath (0.01s)
> === RUN TestNonRootPathInference
> --- PASS: TestNonRootPathInference (0.00s)
> === RUN TestBlockHeaderPrecedenceRoleAndGun
> --- PASS: TestBlockHeaderPrecedenceRoleAndGun (0.00s)
> === RUN TestBlockHeaderPrecedenceGunFromPath
> --- PASS: TestBlockHeaderPrecedenceGunFromPath (0.01s)
> === RUN TestImportKeys2InOneFile
> --- PASS: TestImportKeys2InOneFile (0.00s)
> === RUN TestImportKeys2InOneFileNoPath
> --- PASS: TestImportKeys2InOneFileNoPath (0.01s)
> === RUN TestEncryptedKeyImportFail
> time="2020-03-22T08:31:22Z" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header"
> --- PASS: TestEncryptedKeyImportFail (0.02s)
> === RUN TestEncryptedKeyImportSuccess
> --- PASS: TestEncryptedKeyImportSuccess (0.01s)
> === RUN TestEncryption
> --- PASS: TestEncryption (0.01s)
> === RUN TestAddKey
> --- PASS: TestAddKey (0.02s)
> === RUN TestKeyStoreInternalState
> --- PASS: TestKeyStoreInternalState (0.01s)
> === RUN TestGet
> --- PASS: TestGet (0.01s)
> === RUN TestGetLegacyKey
> --- PASS: TestGetLegacyKey (0.01s)
> === RUN TestListKeys
> --- PASS: TestListKeys (0.04s)
> === RUN TestAddGetKeyMemStore
> --- PASS: TestAddGetKeyMemStore (0.00s)
> === RUN TestAddGetKeyInfoMemStore
> --- PASS: TestAddGetKeyInfoMemStore (0.01s)
> === RUN TestGetDecryptedWithTamperedCipherText
> time="2020-03-22T08:31:22Z" level=error msg="PEM block is empty"
> --- PASS: TestGetDecryptedWithTamperedCipherText (0.01s)
> === RUN TestGetDecryptedWithInvalidPassphrase
> --- PASS: TestGetDecryptedWithInvalidPassphrase (0.03s)
> === RUN TestGetDecryptedWithConsistentlyInvalidPassphrase
> --- PASS: TestGetDecryptedWithConsistentlyInvalidPassphrase (0.05s)
> === RUN TestRemoveKey
> --- PASS: TestRemoveKey (0.02s)
> === RUN TestKeysAreCached
> --- PASS: TestKeysAreCached (0.01s)
> PASS
> ok github.com/theupdateframework/notary/trustmanager 0.308s
> === RUN TestRemoteStore
> time="2020-03-22T08:31:22Z" level=info msg="listing files from localhost:9888"
> time="2020-03-22T08:31:22Z" level=info msg="listing files from localhost:9888"
> --- PASS: TestRemoteStore (0.02s)
> === RUN TestErrors
> time="2020-03-22T08:31:22Z" level=error msg="failed to store: test error"
> --- PASS: TestErrors (0.02s)
> === RUN TestNewGRPCStorage
> --- PASS: TestNewGRPCStorage (0.00s)
> === RUN TestGRPCStorage
> --- PASS: TestGRPCStorage (0.00s)
> PASS
> ok github.com/theupdateframework/notary/trustmanager/remoteks 0.046s
> ? github.com/theupdateframework/notary/trustmanager/yubikey [no test files]
> === RUN TestWildcardMatch
> --- PASS: TestWildcardMatch (0.00s)
> === RUN TestValidateRoot
> 2020/03/22 08:31:25 [INFO] generate received request
> 2020/03/22 08:31:25 [INFO] received CSR
> 2020/03/22 08:31:25 [INFO] generating key: ecdsa-256
> 2020/03/22 08:31:25 [INFO] encoded CSR
> 2020/03/22 08:31:25 [INFO] signed certificate with serial number 393857351147423668073835228535581130322881540031
> 2020/03/22 08:31:25 [INFO] received CSR
> 2020/03/22 08:31:25 [INFO] generating key: ecdsa-256
> 2020/03/22 08:31:25 [INFO] encoded CSR
> 2020/03/22 08:31:25 [INFO] signed certificate with serial number 377504733889350763610715989770006652676125919578
> 2020/03/22 08:31:25 [INFO] received CSR
> 2020/03/22 08:31:25 [INFO] generating key: ecdsa-256
> 2020/03/22 08:31:25 [INFO] encoded CSR
> 2020/03/22 08:31:25 [INFO] signed certificate with serial number 667217188240517842369922337254236466739503123871
> --- PASS: TestValidateRoot (0.04s)
> === RUN TestValidateRootWithoutTOFUS
> --- PASS: TestValidateRootWithoutTOFUS (0.00s)
> === RUN TestValidateRootWithPinnedCert
> --- PASS: TestValidateRootWithPinnedCert (0.00s)
> === RUN TestValidateRootWithPinnedCertAndIntermediates
> --- PASS: TestValidateRootWithPinnedCertAndIntermediates (0.02s)
> === RUN TestValidateRootFailuresWithPinnedCert
> --- PASS: TestValidateRootFailuresWithPinnedCert (0.00s)
> === RUN TestValidateRootWithPinnedCA
> --- PASS: TestValidateRootWithPinnedCA (0.04s)
> === RUN TestValidateSuccessfulRootRotation
> --- PASS: TestValidateSuccessfulRootRotation (0.05s)
> === RUN TestValidateRootRotationMissingOrigSig
> --- PASS: TestValidateRootRotationMissingOrigSig (0.03s)
> === RUN TestValidateRootRotationMissingNewSig
> --- PASS: TestValidateRootRotationMissingNewSig (0.03s)
> === RUN TestValidateRootRotationTrustPinning
> --- PASS: TestValidateRootRotationTrustPinning (0.05s)
> === RUN TestValidateRootRotationTrustPinningInvalidCA
> --- PASS: TestValidateRootRotationTrustPinningInvalidCA (0.02s)
> === RUN TestParsePEMPublicKey
> time="2020-03-22T08:31:25Z" level=warning msg="certificate with CN notary is near expiry"
> --- PASS: TestParsePEMPublicKey (0.00s)
> === RUN TestCheckingCertExpiry
> time="2020-03-22T08:31:25Z" level=warning msg="certificate with CN notary is near expiry"
> --- PASS: TestCheckingCertExpiry (0.00s)
> === RUN TestValidateRootWithExpiredIntermediate
> --- PASS: TestValidateRootWithExpiredIntermediate (0.01s)
> === RUN TestCheckingWildcardCert
> --- PASS: TestCheckingWildcardCert (0.00s)
> === RUN TestWildcardMatching
> --- PASS: TestWildcardMatching (0.00s)
> PASS
> ok github.com/theupdateframework/notary/trustpinning 0.340s
> === RUN TestInitSnapshotNoTargets
> --- PASS: TestInitSnapshotNoTargets (0.00s)
> === RUN TestInitRepo
> --- PASS: TestInitRepo (0.01s)
> === RUN TestUpdateDelegations
> --- PASS: TestUpdateDelegations (0.00s)
> === RUN TestPurgeDelegationsKeyFromTop
> time="2020-03-22T08:31:24Z" level=warning msg="role targets/sybil has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2020-03-22T08:31:24Z" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> --- PASS: TestPurgeDelegationsKeyFromTop (0.00s)
> === RUN TestPurgeDelegationsKeyFromDeep
> time="2020-03-22T08:31:24Z" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> --- PASS: TestPurgeDelegationsKeyFromDeep (0.00s)
> === RUN TestPurgeDelegationsKeyBadWildRole
> --- PASS: TestPurgeDelegationsKeyBadWildRole (0.00s)
> === RUN TestUpdateDelegationsParentMissing
> --- PASS: TestUpdateDelegationsParentMissing (0.00s)
> === RUN TestUpdateDelegationsMissingParentKey
> --- PASS: TestUpdateDelegationsMissingParentKey (0.00s)
> === RUN TestUpdateDelegationsInvalidRole
> --- PASS: TestUpdateDelegationsInvalidRole (0.00s)
> === RUN TestUpdateDelegationsRoleThatIsMissingDelegationKey
> --- PASS: TestUpdateDelegationsRoleThatIsMissingDelegationKey (0.00s)
> === RUN TestUpdateDelegationsNotEnoughKeys
> time="2020-03-22T08:31:24Z" level=warning msg="role targets/role has fewer keys than its threshold of 2; it will not be usable until keys are added to it"
> --- PASS: TestUpdateDelegationsNotEnoughKeys (0.00s)
> === RUN TestUpdateDelegationsAddKeyToRole
> --- PASS: TestUpdateDelegationsAddKeyToRole (0.00s)
> === RUN TestDeleteDelegations
> --- PASS: TestDeleteDelegations (0.00s)
> === RUN TestDeleteDelegationsRoleNotExistBecauseNoParentMeta
> --- PASS: TestDeleteDelegationsRoleNotExistBecauseNoParentMeta (0.00s)
> === RUN TestDeleteDelegationsRoleNotExist
> --- PASS: TestDeleteDelegationsRoleNotExist (0.01s)
> === RUN TestDeleteDelegationsInvalidRole
> --- PASS: TestDeleteDelegationsInvalidRole (0.00s)
> === RUN TestDeleteDelegationsParentMissing
> --- PASS: TestDeleteDelegationsParentMissing (0.00s)
> === RUN TestDeleteDelegationsMissingParentSigningKey
> --- PASS: TestDeleteDelegationsMissingParentSigningKey (0.00s)
> === RUN TestDeleteDelegationsMidSliceRole
> --- PASS: TestDeleteDelegationsMidSliceRole (0.00s)
> === RUN TestGetDelegationRoleAndMetadataExistDelegationExists
> --- PASS: TestGetDelegationRoleAndMetadataExistDelegationExists (0.00s)
> === RUN TestGetDelegationRoleAndMetadataExistDelegationDoesntExists
> --- PASS: TestGetDelegationRoleAndMetadataExistDelegationDoesntExists (0.00s)
> === RUN TestGetDelegationRoleAndMetadataDoesntExists
> --- PASS: TestGetDelegationRoleAndMetadataDoesntExists (0.00s)
> === RUN TestGetDelegationParentMissing
> --- PASS: TestGetDelegationParentMissing (0.00s)
> === RUN TestAddTargetsRoleAndMetadataExist
> --- PASS: TestAddTargetsRoleAndMetadataExist (0.00s)
> === RUN TestAddTargetsRoleExistsAndMetadataDoesntExist
> --- PASS: TestAddTargetsRoleExistsAndMetadataDoesntExist (0.00s)
> === RUN TestAddTargetsRoleDoesntExist
> --- PASS: TestAddTargetsRoleDoesntExist (0.00s)
> === RUN TestAddTargetsNoSigningKeys
> --- PASS: TestAddTargetsNoSigningKeys (0.00s)
> === RUN TestRemoveExistingAndNonexistingTargets
> --- PASS: TestRemoveExistingAndNonexistingTargets (0.00s)
> === RUN TestRemoveTargetsRoleDoesntExist
> --- PASS: TestRemoveTargetsRoleDoesntExist (0.00s)
> === RUN TestRemoveTargetsNoSigningKeys
> --- PASS: TestRemoveTargetsNoSigningKeys (0.00s)
> === RUN TestAddBaseKeysToRoot
> --- PASS: TestAddBaseKeysToRoot (0.01s)
> === RUN TestRemoveBaseKeysFromRoot
> --- PASS: TestRemoveBaseKeysFromRoot (0.00s)
> === RUN TestReplaceBaseKeysInRoot
> --- PASS: TestReplaceBaseKeysInRoot (0.01s)
> === RUN TestGetAllRoles
> --- PASS: TestGetAllRoles (0.00s)
> === RUN TestGetBaseRoles
> --- PASS: TestGetBaseRoles (0.00s)
> === RUN TestGetBaseRolesInvalidName
> --- PASS: TestGetBaseRolesInvalidName (0.00s)
> === RUN TestGetDelegationValidRoles
> --- PASS: TestGetDelegationValidRoles (0.00s)
> === RUN TestGetDelegationRolesInvalidName
> --- PASS: TestGetDelegationRolesInvalidName (0.00s)
> === RUN TestGetDelegationRolesInvalidPaths
> --- PASS: TestGetDelegationRolesInvalidPaths (0.00s)
> === RUN TestDelegationRolesParent
> --- PASS: TestDelegationRolesParent (0.00s)
> === RUN TestGetBaseRoleEmptyRepo
> --- PASS: TestGetBaseRoleEmptyRepo (0.00s)
> === RUN TestGetBaseRoleKeyMissing
> --- PASS: TestGetBaseRoleKeyMissing (0.00s)
> === RUN TestGetDelegationRoleKeyMissing
> --- PASS: TestGetDelegationRoleKeyMissing (0.00s)
> === RUN TestSignRootOldKeyCertExists
> --- PASS: TestSignRootOldKeyCertExists (0.03s)
> === RUN TestSignRootOldKeyCertMissing
> --- PASS: TestSignRootOldKeyCertMissing (0.02s)
> === RUN TestRootKeyRotation
> --- PASS: TestRootKeyRotation (0.07s)
> === RUN TestBuilderLoadsValidRolesOnly
> --- PASS: TestBuilderLoadsValidRolesOnly (0.00s)
> === RUN TestBuilderOnlyAcceptsRootFirstWhenLoading
> --- PASS: TestBuilderOnlyAcceptsRootFirstWhenLoading (0.00s)
> === RUN TestBuilderOnlyAcceptsDelegationsAfterParent
> --- PASS: TestBuilderOnlyAcceptsDelegationsAfterParent (0.00s)
> === RUN TestMarkingIsValid
> --- PASS: TestMarkingIsValid (0.00s)
> === RUN TestBuilderLoadInvalidDelegations
> --- PASS: TestBuilderLoadInvalidDelegations (0.00s)
> === RUN TestBuilderLoadInvalidDelegationsOldVersion
> --- PASS: TestBuilderLoadInvalidDelegationsOldVersion (0.00s)
> === RUN TestBuilderAcceptRoleOnce
> --- PASS: TestBuilderAcceptRoleOnce (0.00s)
> === RUN TestBuilderStopsAcceptingOrProducingDataOnceDone
> --- PASS: TestBuilderStopsAcceptingOrProducingDataOnceDone (0.00s)
> === RUN TestGenerateSnapshotInvalidOperations
> --- PASS: TestGenerateSnapshotInvalidOperations (0.06s)
> === RUN TestGenerateTimestampInvalidOperations
> --- PASS: TestGenerateTimestampInvalidOperations (0.03s)
> === RUN TestGetConsistentInfo
> --- PASS: TestGetConsistentInfo (0.01s)
> === RUN TestTimestampPreAndPostChecksumming
> --- PASS: TestTimestampPreAndPostChecksumming (0.01s)
> === RUN TestSnapshotLoadedFirstChecksumsOthers
> --- PASS: TestSnapshotLoadedFirstChecksumsOthers (0.01s)
> === RUN TestSnapshotLoadedAfterChecksumsOthersRetroactively
> --- PASS: TestSnapshotLoadedAfterChecksumsOthersRetroactively (0.02s)
> PASS
> ok github.com/theupdateframework/notary/tuf 0.399s
> === RUN TestMergeStrSlicesExclusive
> --- PASS: TestMergeStrSlicesExclusive (0.00s)
> === RUN TestMergeStrSlicesOverlap
> --- PASS: TestMergeStrSlicesOverlap (0.00s)
> === RUN TestMergeStrSlicesEqual
> --- PASS: TestMergeStrSlicesEqual (0.00s)
> === RUN TestSubtractStrSlicesExclusive
> --- PASS: TestSubtractStrSlicesExclusive (0.00s)
> === RUN TestSubtractStrSlicesOverlap
> --- PASS: TestSubtractStrSlicesOverlap (0.00s)
> === RUN TestSubtractStrSlicesEqual
> --- PASS: TestSubtractStrSlicesEqual (0.00s)
> === RUN TestAddRemoveKeys
> --- PASS: TestAddRemoveKeys (0.00s)
> === RUN TestAddRemovePaths
> --- PASS: TestAddRemovePaths (0.00s)
> === RUN TestAddPathNil
> --- PASS: TestAddPathNil (0.00s)
> === RUN TestErrNoSuchRole
> --- PASS: TestErrNoSuchRole (0.00s)
> === RUN TestErrInvalidRole
> --- PASS: TestErrInvalidRole (0.00s)
> === RUN TestIsDelegation
> --- PASS: TestIsDelegation (0.00s)
> === RUN TestIsWildDelegation
> --- PASS: TestIsWildDelegation (0.00s)
> === RUN TestValidRoleFunction
> --- PASS: TestValidRoleFunction (0.00s)
> === RUN TestIsBaseRole
> --- PASS: TestIsBaseRole (0.00s)
> === RUN TestBaseRoleEquals
> --- PASS: TestBaseRoleEquals (0.00s)
> === RUN TestRootToSignedMarshalsSignedPortionWithCanonicalJSON
> --- PASS: TestRootToSignedMarshalsSignedPortionWithCanonicalJSON (0.00s)
> === RUN TestRootToSignCopiesSignatures
> --- PASS: TestRootToSignCopiesSignatures (0.00s)
> === RUN TestRootToSignedMarshallingErrorsPropagated
> --- PASS: TestRootToSignedMarshallingErrorsPropagated (0.00s)
> === RUN TestRootMarshalJSONMarshalsSignedWithRegularJSON
> --- PASS: TestRootMarshalJSONMarshalsSignedWithRegularJSON (0.00s)
> === RUN TestRootMarshalJSONMarshallingErrorsPropagated
> --- PASS: TestRootMarshalJSONMarshallingErrorsPropagated (0.00s)
> === RUN TestRootFromSignedUnmarshallingErrorsPropagated
> --- PASS: TestRootFromSignedUnmarshallingErrorsPropagated (0.00s)
> === RUN TestRootFromSignedCopiesSignatures
> --- PASS: TestRootFromSignedCopiesSignatures (0.00s)
> === RUN TestRootFromSignedValidatesRoleData
> --- PASS: TestRootFromSignedValidatesRoleData (0.00s)
> === RUN TestRootFromSignedValidatesRoleType
> --- PASS: TestRootFromSignedValidatesRoleType (0.00s)
> === RUN TestRootFromSignedValidatesVersion
> --- PASS: TestRootFromSignedValidatesVersion (0.00s)
> === RUN TestSnapshotToSignedMarshalsSignedPortionWithCanonicalJSON
> --- PASS: TestSnapshotToSignedMarshalsSignedPortionWithCanonicalJSON (0.00s)
> === RUN TestSnapshotToSignCopiesSignatures
> --- PASS: TestSnapshotToSignCopiesSignatures (0.00s)
> === RUN TestSnapshotToSignedMarshallingErrorsPropagated
> --- PASS: TestSnapshotToSignedMarshallingErrorsPropagated (0.00s)
> === RUN TestSnapshotMarshalJSONMarshalsSignedWithRegularJSON
> --- PASS: TestSnapshotMarshalJSONMarshalsSignedWithRegularJSON (0.00s)
> === RUN TestSnapshotMarshalJSONMarshallingErrorsPropagated
> --- PASS: TestSnapshotMarshalJSONMarshallingErrorsPropagated (0.00s)
> === RUN TestSnapshotFromSignedUnmarshallingErrorsPropagated
> --- PASS: TestSnapshotFromSignedUnmarshallingErrorsPropagated (0.00s)
> === RUN TestSnapshotFromSignedCopiesSignatures
> --- PASS: TestSnapshotFromSignedCopiesSignatures (0.00s)
> === RUN TestSnapshotFromSignedValidatesMeta
> --- PASS: TestSnapshotFromSignedValidatesMeta (0.00s)
> === RUN TestSnapshotFromSignedValidatesRoleType
> --- PASS: TestSnapshotFromSignedValidatesRoleType (0.00s)
> === RUN TestSnapshotFromSignedValidatesVersion
> --- PASS: TestSnapshotFromSignedValidatesVersion (0.00s)
> === RUN TestSnapshotGetMeta
> --- PASS: TestSnapshotGetMeta (0.00s)
> === RUN TestTargetsToSignedMarshalsSignedPortionWithCanonicalJSON
> --- PASS: TestTargetsToSignedMarshalsSignedPortionWithCanonicalJSON (0.00s)
> === RUN TestTargetsToSignCopiesSignatures
> --- PASS: TestTargetsToSignCopiesSignatures (0.00s)
> === RUN TestTargetsToSignedMarshallingErrorsPropagated
> --- PASS: TestTargetsToSignedMarshallingErrorsPropagated (0.00s)
> === RUN TestTargetsMarshalJSONMarshalsSignedWithRegularJSON
> --- PASS: TestTargetsMarshalJSONMarshalsSignedWithRegularJSON (0.00s)
> === RUN TestTargetsMarshalJSONMarshallingErrorsPropagated
> --- PASS: TestTargetsMarshalJSONMarshallingErrorsPropagated (0.00s)
> === RUN TestTargetsFromSignedUnmarshallingErrorsPropagated
> --- PASS: TestTargetsFromSignedUnmarshallingErrorsPropagated (0.00s)
> === RUN TestTargetsFromSignedCopiesSignatures
> --- PASS: TestTargetsFromSignedCopiesSignatures (0.00s)
> === RUN TestTargetsFromSignedValidatesDelegations
> --- PASS: TestTargetsFromSignedValidatesDelegations (0.00s)
> === RUN TestTargetsFromSignedValidatesRoleType
> --- PASS: TestTargetsFromSignedValidatesRoleType (0.00s)
> === RUN TestTargetsFromSignedValidatesRoleName
> --- PASS: TestTargetsFromSignedValidatesRoleName (0.00s)
> === RUN TestTargetsFromSignedValidatesVersion
> --- PASS: TestTargetsFromSignedValidatesVersion (0.00s)
> === RUN TestTimestampToSignedMarshalsSignedPortionWithCanonicalJSON
> --- PASS: TestTimestampToSignedMarshalsSignedPortionWithCanonicalJSON (0.00s)
> === RUN TestTimestampToSignCopiesSignatures
> --- PASS: TestTimestampToSignCopiesSignatures (0.00s)
> === RUN TestTimestampToSignedMarshallingErrorsPropagated
> --- PASS: TestTimestampToSignedMarshallingErrorsPropagated (0.00s)
> === RUN TestTimestampMarshalJSONMarshalsSignedWithRegularJSON
> --- PASS: TestTimestampMarshalJSONMarshalsSignedWithRegularJSON (0.00s)
> === RUN TestTimestampMarshalJSONMarshallingErrorsPropagated
> --- PASS: TestTimestampMarshalJSONMarshallingErrorsPropagated (0.00s)
> === RUN TestTimestampFromSignedUnmarshallingErrorsPropagated
> --- PASS: TestTimestampFromSignedUnmarshallingErrorsPropagated (0.00s)
> === RUN TestTimestampFromSignedCopiesSignatures
> --- PASS: TestTimestampFromSignedCopiesSignatures (0.00s)
> === RUN TestTimestampFromSignedValidatesMeta
> --- PASS: TestTimestampFromSignedValidatesMeta (0.00s)
> === RUN TestTimestampFromSignedValidatesRoleType
> --- PASS: TestTimestampFromSignedValidatesRoleType (0.00s)
> === RUN TestTimestampFromSignedValidatesVersion
> --- PASS: TestTimestampFromSignedValidatesVersion (0.00s)
> === RUN TestTimestampGetSnapshot
> --- PASS: TestTimestampGetSnapshot (0.00s)
> === RUN TestGenerateFileMetaDefault
> --- PASS: TestGenerateFileMetaDefault (0.00s)
> === RUN TestGenerateFileMetaExplicit
> --- PASS: TestGenerateFileMetaExplicit (0.00s)
> === RUN TestSignatureUnmarshalJSON
> --- PASS: TestSignatureUnmarshalJSON (0.00s)
> === RUN TestCheckHashes
> --- PASS: TestCheckHashes (0.00s)
> === RUN TestCheckValidHashStructures
> --- PASS: TestCheckValidHashStructures (0.00s)
> === RUN TestCompareMultiHashes
> --- PASS: TestCompareMultiHashes (0.00s)
> === RUN TestFileMetaEquals
> --- PASS: TestFileMetaEquals (0.00s)
> PASS
> ok github.com/theupdateframework/notary/tuf/data 0.018s
> === RUN TestListKeys
> --- PASS: TestListKeys (0.00s)
> === RUN TestGetKeys
> --- PASS: TestGetKeys (0.00s)
> === RUN TestBasicSign
> --- PASS: TestBasicSign (0.00s)
> === RUN TestReSign
> --- PASS: TestReSign (0.00s)
> === RUN TestMultiSign
> --- PASS: TestMultiSign (0.00s)
> === RUN TestSignReturnsNoSigs
> --- PASS: TestSignReturnsNoSigs (0.00s)
> === RUN TestSignWithX509
> --- PASS: TestSignWithX509 (0.00s)
> === RUN TestSignRemovesValidSigByInvalidKey
> --- PASS: TestSignRemovesValidSigByInvalidKey (0.00s)
> === RUN TestSignRemovesInvalidSig
> --- PASS: TestSignRemovesInvalidSig (0.00s)
> === RUN TestSignMinSignatures
> --- PASS: TestSignMinSignatures (0.00s)
> === RUN TestSignFailingKeys
> --- PASS: TestSignFailingKeys (0.01s)
> === RUN TestErrInsufficientSignaturesMessaging
> --- PASS: TestErrInsufficientSignaturesMessaging (0.00s)
> === RUN TestRSAPSSVerifier
> --- PASS: TestRSAPSSVerifier (0.00s)
> === RUN TestRSAPSSx509Verifier
> --- PASS: TestRSAPSSx509Verifier (0.00s)
> === RUN TestRSAPSSVerifierWithInvalidKeyType
> --- PASS: TestRSAPSSVerifierWithInvalidKeyType (0.00s)
> === RUN TestRSAPSSVerifierWithInvalidKeyLength
> --- PASS: TestRSAPSSVerifierWithInvalidKeyLength (0.03s)
> === RUN TestRSAPSSVerifierWithInvalidKey
> --- PASS: TestRSAPSSVerifierWithInvalidKey (0.00s)
> === RUN TestRSAPSSVerifierWithInvalidSignature
> --- PASS: TestRSAPSSVerifierWithInvalidSignature (0.00s)
> === RUN TestRSAPKCS1v15Verifier
> --- PASS: TestRSAPKCS1v15Verifier (0.00s)
> === RUN TestRSAPKCS1v15x509Verifier
> --- PASS: TestRSAPKCS1v15x509Verifier (0.00s)
> === RUN TestRSAPKCS1v15VerifierWithInvalidKeyType
> --- PASS: TestRSAPKCS1v15VerifierWithInvalidKeyType (0.00s)
> === RUN TestRSAPKCS1v15VerifierWithInvalidKey
> --- PASS: TestRSAPKCS1v15VerifierWithInvalidKey (0.00s)
> === RUN TestRSAPKCS1v15VerifierWithInvalidSignature
> time="2020-03-22T08:31:26Z" level=error msg="Failed verification: crypto/rsa: verification error"
> --- PASS: TestRSAPKCS1v15VerifierWithInvalidSignature (0.00s)
> === RUN TestECDSAVerifier
> --- PASS: TestECDSAVerifier (0.00s)
> === RUN TestECDSAVerifierOtherCurves
> --- PASS: TestECDSAVerifierOtherCurves (0.21s)
> === RUN TestECDSAx509Verifier
> --- PASS: TestECDSAx509Verifier (0.00s)
> === RUN TestECDSAVerifierWithInvalidKeyType
> --- PASS: TestECDSAVerifierWithInvalidKeyType (0.00s)
> === RUN TestECDSAVerifierWithInvalidKey
> --- PASS: TestECDSAVerifierWithInvalidKey (0.00s)
> === RUN TestECDSAVerifierWithInvalidSignature
> --- PASS: TestECDSAVerifierWithInvalidSignature (0.00s)
> === RUN TestED25519VerifierInvalidKeyType
> --- PASS: TestED25519VerifierInvalidKeyType (0.00s)
> === RUN TestRSAPyCryptoVerifierInvalidKeyType
> --- PASS: TestRSAPyCryptoVerifierInvalidKeyType (0.00s)
> === RUN TestPyCryptoRSAPSSCompat
> --- PASS: TestPyCryptoRSAPSSCompat (0.00s)
> === RUN TestPyNaCled25519Compat
> --- PASS: TestPyNaCled25519Compat (0.00s)
> === RUN TestRoleNoKeys
> --- PASS: TestRoleNoKeys (0.00s)
> === RUN TestNotEnoughSigs
> --- PASS: TestNotEnoughSigs (0.00s)
> === RUN TestNoSigs
> --- PASS: TestNoSigs (0.00s)
> === RUN TestExactlyEnoughSigs
> --- PASS: TestExactlyEnoughSigs (0.00s)
> === RUN TestIsValidNotExported
> --- PASS: TestIsValidNotExported (0.00s)
> === RUN TestMoreThanEnoughSigs
> --- PASS: TestMoreThanEnoughSigs (0.00s)
> === RUN TestValidSigWithIncorrectKeyID
> --- PASS: TestValidSigWithIncorrectKeyID (0.00s)
> === RUN TestDuplicateSigs
> --- PASS: TestDuplicateSigs (0.00s)
> === RUN TestUnknownKeyBelowThreshold
> --- PASS: TestUnknownKeyBelowThreshold (0.00s)
> === RUN TestVerifyVersion
> --- PASS: TestVerifyVersion (0.00s)
> === RUN TestVerifyExpiry
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for root expired"
> --- PASS: TestVerifyExpiry (0.00s)
> === RUN TestVerifyPublicKeyMatchesPrivateKeyHappyCase
> --- PASS: TestVerifyPublicKeyMatchesPrivateKeyHappyCase (0.00s)
> === RUN TestVerifyPublicKeyMatchesPrivateKeyFails
> --- PASS: TestVerifyPublicKeyMatchesPrivateKeyFails (0.00s)
> PASS
> ok github.com/theupdateframework/notary/tuf/signed 0.278s
> === RUN TestNewSwizzler
> --- PASS: TestNewSwizzler (0.02s)
> === RUN TestSwizzlerSetInvalidJSON
> --- PASS: TestSwizzlerSetInvalidJSON (0.00s)
> === RUN TestSwizzlerAddExtraSpace
> --- PASS: TestSwizzlerAddExtraSpace (0.00s)
> === RUN TestSwizzlerSetInvalidSigned
> --- PASS: TestSwizzlerSetInvalidSigned (0.00s)
> === RUN TestSwizzlerSetInvalidSignedMeta
> --- PASS: TestSwizzlerSetInvalidSignedMeta (0.00s)
> === RUN TestSwizzlerSetInvalidMetadataType
> --- PASS: TestSwizzlerSetInvalidMetadataType (0.00s)
> === RUN TestSwizzlerInvalidateMetadataSignatures
> --- PASS: TestSwizzlerInvalidateMetadataSignatures (0.00s)
> === RUN TestSwizzlerRemoveMetadata
> --- PASS: TestSwizzlerRemoveMetadata (0.00s)
> === RUN TestSwizzlerSignMetadataWithInvalidKey
> --- PASS: TestSwizzlerSignMetadataWithInvalidKey (0.01s)
> === RUN TestSwizzlerOffsetMetadataVersion
> --- PASS: TestSwizzlerOffsetMetadataVersion (0.01s)
> === RUN TestSwizzlerExpireMetadata
> --- PASS: TestSwizzlerExpireMetadata (0.00s)
> === RUN TestSwizzlerSetThresholdBaseRole
> --- PASS: TestSwizzlerSetThresholdBaseRole (0.00s)
> === RUN TestSwizzlerSetThresholdDelegatedRole
> --- PASS: TestSwizzlerSetThresholdDelegatedRole (0.00s)
> === RUN TestSwizzlerChangeRootKey
> --- PASS: TestSwizzlerChangeRootKey (0.01s)
> === RUN TestSwizzlerUpdateSnapshotHashesSpecifiedRoles
> --- PASS: TestSwizzlerUpdateSnapshotHashesSpecifiedRoles (0.01s)
> === RUN TestSwizzlerUpdateSnapshotHashesNoSpecifiedRoles
> --- PASS: TestSwizzlerUpdateSnapshotHashesNoSpecifiedRoles (0.01s)
> === RUN TestSwizzlerUpdateTimestamp
> --- PASS: TestSwizzlerUpdateTimestamp (0.01s)
> === RUN TestMissingSigningKey
> --- PASS: TestMissingSigningKey (0.00s)
> === RUN TestSwizzlerMutateRoot
> --- PASS: TestSwizzlerMutateRoot (0.00s)
> === RUN TestSwizzlerMutateTimestamp
> --- PASS: TestSwizzlerMutateTimestamp (0.00s)
> === RUN TestSwizzlerMutateSnapshot
> --- PASS: TestSwizzlerMutateSnapshot (0.00s)
> === RUN TestSwizzlerMutateTargets
> --- PASS: TestSwizzlerMutateTargets (0.00s)
> === RUN TestSwizzlerRotateKeyBaseRole
> --- PASS: TestSwizzlerRotateKeyBaseRole (0.01s)
> === RUN TestSwizzlerRotateKeyDelegationRole
> --- PASS: TestSwizzlerRotateKeyDelegationRole (0.00s)
> PASS
> ok github.com/theupdateframework/notary/tuf/testutils 0.147s
> ? github.com/theupdateframework/notary/tuf/testutils/interfaces [no test files]
> ? github.com/theupdateframework/notary/tuf/testutils/keys [no test files]
> === RUN TestConvertTUFKeyToPKCS8
> --- PASS: TestConvertTUFKeyToPKCS8 (0.04s)
> === RUN TestParsePKCS8ToTufKey
> --- PASS: TestParsePKCS8ToTufKey (0.21s)
> === RUN TestPEMtoPEM
> --- PASS: TestPEMtoPEM (0.00s)
> === RUN TestRoleListLen
> --- PASS: TestRoleListLen (0.00s)
> === RUN TestRoleListLess
> --- PASS: TestRoleListLess (0.00s)
> === RUN TestRoleListSwap
> --- PASS: TestRoleListSwap (0.00s)
> === RUN TestRoleListSort
> --- PASS: TestRoleListSort (0.00s)
> === RUN TestCreateStack
> --- PASS: TestCreateStack (0.00s)
> === RUN TestPush
> --- PASS: TestPush (0.00s)
> === RUN TestPop
> --- PASS: TestPop (0.00s)
> === RUN TestPopEmpty
> --- PASS: TestPopEmpty (0.00s)
> === RUN TestPopString
> --- PASS: TestPopString (0.00s)
> === RUN TestPopStringWrongType
> --- PASS: TestPopStringWrongType (0.00s)
> === RUN TestPopStringEmpty
> --- PASS: TestPopStringEmpty (0.00s)
> === RUN TestEmpty
> --- PASS: TestEmpty (0.00s)
> === RUN TestUnusedDelegationKeys
> --- PASS: TestUnusedDelegationKeys (0.00s)
> === RUN TestRemoveUnusedKeys
> --- PASS: TestRemoveUnusedKeys (0.00s)
> === RUN TestFindRoleIndexFound
> --- PASS: TestFindRoleIndexFound (0.00s)
> === RUN TestFindRoleIndexNotFound
> --- PASS: TestFindRoleIndexNotFound (0.00s)
> === RUN TestCertsToKeys
> --- PASS: TestCertsToKeys (0.00s)
> === RUN TestNewCertificate
> --- PASS: TestNewCertificate (0.00s)
> === RUN TestKeyOperations
> --- PASS: TestKeyOperations (0.04s)
> === RUN TestRSAX509PublickeyID
> --- PASS: TestRSAX509PublickeyID (0.00s)
> === RUN TestECDSAX509PublickeyID
> --- PASS: TestECDSAX509PublickeyID (0.00s)
> === RUN TestExtractPrivateKeyAttributes
> --- PASS: TestExtractPrivateKeyAttributes (0.00s)
> === RUN TestParsePEMPrivateKeyLegacy
> --- PASS: TestParsePEMPrivateKeyLegacy (0.00s)
> === RUN TestValidateCertificateWithSHA1
> --- PASS: TestValidateCertificateWithSHA1 (0.00s)
> === RUN TestValidateCertificateWithExpiredCert
> --- PASS: TestValidateCertificateWithExpiredCert (0.00s)
> === RUN TestValidateCertificateWithInvalidExpiry
> --- PASS: TestValidateCertificateWithInvalidExpiry (0.00s)
> === RUN TestValidateCertificateWithShortKey
> --- PASS: TestValidateCertificateWithShortKey (0.03s)
> PASS
> ok github.com/theupdateframework/notary/tuf/utils 0.325s
> === RUN TestNewSerializableErrorNonValidationError
> --- PASS: TestNewSerializableErrorNonValidationError (0.00s)
> === RUN TestNewSerializableErrorValidationError
> --- PASS: TestNewSerializableErrorValidationError (0.00s)
> === RUN TestUnmarshalSerialiableErrorSuccessfully
> --- PASS: TestUnmarshalSerialiableErrorSuccessfully (0.00s)
> === RUN TestUnmarshalUnknownErrorName
> --- PASS: TestUnmarshalUnknownErrorName (0.00s)
> === RUN TestUnmarshalInvalidError
> --- PASS: TestUnmarshalInvalidError (0.00s)
> === RUN TestUnmarshalNoName
> --- PASS: TestUnmarshalNoName (0.00s)
> === RUN TestUnmarshalInvalidJSON
> --- PASS: TestUnmarshalInvalidJSON (0.00s)
> PASS
> ok github.com/theupdateframework/notary/tuf/validation 0.008s
> === RUN TestSetSignalTrap
> --- PASS: TestSetSignalTrap (0.00s)
> === RUN TestLogLevelSignalHandle
> Attempt to increase log level failed, will remain at debug level, error: log level can not be set higher than Debug
> Successfully setting log level to debug
> Successfully setting log level to info
> Successfully setting log level to warning
> Successfully setting log level to error
> Successfully setting log level to fatal
> Successfully setting log level to info
> Successfully setting log level to warning
> Successfully setting log level to error
> Successfully setting log level to fatal
> Successfully setting log level to panic
> Attempt to decrease log level failed, will remain at panic level, error: log level can not be set lower than Panic
> --- PASS: TestLogLevelSignalHandle (0.00s)
> === RUN TestParseInvalidLogLevel
> --- PASS: TestParseInvalidLogLevel (0.00s)
> === RUN TestParseNoLogLevel
> --- PASS: TestParseNoLogLevel (0.00s)
> === RUN TestParseLogLevel
> --- PASS: TestParseLogLevel (0.00s)
> === RUN TestParseLogLevelWithEnvironmentVariables
> --- PASS: TestParseLogLevelWithEnvironmentVariables (0.00s)
> === RUN TestParseInvalidBugsnag
> --- PASS: TestParseInvalidBugsnag (0.00s)
> === RUN TestParseNoBugsnag
> --- PASS: TestParseNoBugsnag (0.00s)
> === RUN TestParseBugsnag
> --- PASS: TestParseBugsnag (0.00s)
> === RUN TestParseBugsnagWithEnvironmentVariables
> --- PASS: TestParseBugsnagWithEnvironmentVariables (0.00s)
> === RUN TestParseInvalidStorageBackend
> --- PASS: TestParseInvalidStorageBackend (0.00s)
> === RUN TestParseInvalidSQLStorageNoDBSource
> --- PASS: TestParseInvalidSQLStorageNoDBSource (0.00s)
> === RUN TestParseInvalidDBSourceInSQLStorage
> --- PASS: TestParseInvalidDBSourceInSQLStorage (0.00s)
> === RUN TestParseSQLStorageDBStore
> --- PASS: TestParseSQLStorageDBStore (0.00s)
> === RUN TestParseRethinkStorageDBStoreInvalidBackend
> --- PASS: TestParseRethinkStorageDBStoreInvalidBackend (0.00s)
> === RUN TestParseRethinkStorageDBStoreEmptyDBUrl
> --- PASS: TestParseRethinkStorageDBStoreEmptyDBUrl (0.00s)
> === RUN TestParseRethinkStorageDBStoreEmptyDBName
> --- PASS: TestParseRethinkStorageDBStoreEmptyDBName (0.00s)
> === RUN TestParseRethinkStorageDBStoreEmptyCA
> --- PASS: TestParseRethinkStorageDBStoreEmptyCA (0.00s)
> === RUN TestParseRethinkStorageDBStoreEmptyCertAndKey
> --- PASS: TestParseRethinkStorageDBStoreEmptyCertAndKey (0.00s)
> === RUN TestParseRethinkStorageDBStoreEmptyUsername
> --- PASS: TestParseRethinkStorageDBStoreEmptyUsername (0.00s)
> === RUN TestParseSQLStorageWithEnvironmentVariables
> --- PASS: TestParseSQLStorageWithEnvironmentVariables (0.00s)
> === RUN TestParseTLSNoTLSWhenRequired
> --- PASS: TestParseTLSNoTLSWhenRequired (0.00s)
> === RUN TestParseTLSPartialTLS
> --- PASS: TestParseTLSPartialTLS (0.00s)
> === RUN TestParseTLSNoTLSNotRequired
> --- PASS: TestParseTLSNoTLSNotRequired (0.00s)
> === RUN TestParseTLSWithTLS
> --- PASS: TestParseTLSWithTLS (0.00s)
> === RUN TestParseTLSWithTLSRelativeToConfigFile
> --- PASS: TestParseTLSWithTLSRelativeToConfigFile (0.00s)
> === RUN TestParseTLSWithEnvironmentVariables
> --- PASS: TestParseTLSWithEnvironmentVariables (0.00s)
> === RUN TestParseViperWithInvalidFile
> --- PASS: TestParseViperWithInvalidFile (0.00s)
> === RUN TestParseViperWithValidFile
> --- PASS: TestParseViperWithValidFile (0.00s)
> === RUN TestAdjustLogLevel
> --- PASS: TestAdjustLogLevel (0.00s)
> === RUN TestRootHandlerFactory
> --- PASS: TestRootHandlerFactory (0.00s)
> === RUN TestRootHandlerError
> --- PASS: TestRootHandlerError (0.00s)
> === RUN TestWrapWithCacheHeaderNilCacheControlConfig
> --- PASS: TestWrapWithCacheHeaderNilCacheControlConfig (0.00s)
> === RUN TestWrapWithCacheHeaderNon200Response
> --- PASS: TestWrapWithCacheHeaderNon200Response (0.00s)
> === RUN TestWrapWithCacheHeaderPublicCacheControlNoCacheHeaders
> --- PASS: TestWrapWithCacheHeaderPublicCacheControlNoCacheHeaders (0.00s)
> === RUN TestWrapWithCacheHeaderPublicCacheControlLastModifiedHeader
> --- PASS: TestWrapWithCacheHeaderPublicCacheControlLastModifiedHeader (0.00s)
> === RUN TestWrapWithCacheHeaderPublicCacheControlCacheControlHeader
> --- PASS: TestWrapWithCacheHeaderPublicCacheControlCacheControlHeader (0.00s)
> === RUN TestWrapWithCacheHeaderNoCacheControlNoCacheHeaders
> --- PASS: TestWrapWithCacheHeaderNoCacheControlNoCacheHeaders (0.00s)
> === RUN TestWrapWithCacheHeaderNoCacheControlLastModifiedHeader
> --- PASS: TestWrapWithCacheHeaderNoCacheControlLastModifiedHeader (0.00s)
> === RUN TestWrapWithCacheHeaderNoCacheControlCacheControlHeader
> --- PASS: TestWrapWithCacheHeaderNoCacheControlCacheControlHeader (0.00s)
> === RUN TestBuildCatalogRecord
> --- PASS: TestBuildCatalogRecord (0.00s)
> === RUN TestDoAuthNonWildcardImage
> --- PASS: TestDoAuthNonWildcardImage (0.00s)
> === RUN TestDoAuthWildcardImage
> --- PASS: TestDoAuthWildcardImage (0.00s)
> PASS
> ok github.com/theupdateframework/notary/utils 0.010s
> ? github.com/theupdateframework/notary/version [no test files]
> FAIL
> dh_auto_test: error: cd _build && go test -vet=off -v -p 4 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version returned exit code 1
The full build log is available from:
http://qa-logs.debian.net/2020/03/22/notary_0.6.1~ds2-5_unstable.log
A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!
About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.
More information about the Pkg-go-maintainers
mailing list