[pkg-go] Bug#954692: notary: FTBFS: dh_auto_test: error: cd _build && go test -vet=off -v -p 4 github.com/theupdateframework/notary [...] github.com/theupdateframework/notary/version returned exit code 1

Lucas Nussbaum lucas at debian.org
Sun Mar 22 13:45:57 GMT 2020


Source: notary
Version: 0.6.1~ds2-5
Severity: serious
Justification: FTBFS on amd64
Tags: bullseye sid ftbfs
Usertags: ftbfs-20200322 ftbfs-bullseye

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.

Relevant part (hopefully):
> make[1]: Entering directory '/<<PKGBUILDDIR>>'
> dh_auto_build -- -tags "pkcs11"
> 	cd _build && go install -trimpath -v -p 4 -tags pkcs11 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version
> internal/race
> internal/cpu
> runtime/internal/sys
> runtime/internal/atomic
> sync/atomic
> runtime/internal/math
> math/bits
> unicode/utf8
> internal/bytealg
> unicode
> internal/testlog
> math
> encoding
> unicode/utf16
> runtime
> crypto/internal/subtle
> crypto/subtle
> vendor/golang.org/x/crypto/cryptobyte/asn1
> internal/nettrace
> container/list
> runtime/cgo
> vendor/golang.org/x/crypto/internal/subtle
> github.com/theupdateframework/notary/version
> github.com/lib/pq/oid
> internal/reflectlite
> sync
> internal/singleflight
> google.golang.org/grpc/internal/grpcsync
> math/rand
> sort
> errors
> io
> internal/oserror
> strconv
> syscall
> vendor/golang.org/x/net/dns/dnsmessage
> hash
> bytes
> crypto
> reflect
> strings
> bufio
> crypto/internal/randutil
> path
> regexp/syntax
> internal/syscall/unix
> time
> crypto/hmac
> golang.org/x/crypto/pbkdf2
> hash/crc32
> crypto/rc4
> vendor/golang.org/x/crypto/hkdf
> regexp
> vendor/golang.org/x/text/transform
> github.com/hashicorp/hcl/hcl/strconv
> internal/poll
> encoding/binary
> internal/fmtsort
> context
> text/tabwriter
> golang.org/x/text/transform
> html
> crypto/md5
> os
> encoding/base64
> golang.org/x/sys/unix
> crypto/cipher
> crypto/sha512
> crypto/aes
> github.com/theupdateframework/notary
> fmt
> crypto/sha256
> crypto/des
> crypto/sha1
> crypto/ed25519/internal/edwards25519
> encoding/json
> github.com/docker/go/canonical/json
> log
> math/big
> encoding/hex
> encoding/pem
> path/filepath
> github.com/sirupsen/logrus
> io/ioutil
> net
> net/url
> github.com/theupdateframework/notary/tuf/validation
> mime
> mime/quotedprintable
> crypto/rand
> crypto/elliptic
> github.com/docker/distribution/uuid
> encoding/asn1
> crypto/rsa
> crypto/dsa
> crypto/ed25519
> crypto/ecdsa
> crypto/x509/pkix
> vendor/golang.org/x/crypto/cryptobyte
> golang.org/x/crypto/ed25519
> compress/flate
> vendor/golang.org/x/crypto/chacha20
> vendor/golang.org/x/crypto/poly1305
> vendor/golang.org/x/sys/cpu
> compress/gzip
> vendor/golang.org/x/crypto/curve25519
> vendor/golang.org/x/crypto/chacha20poly1305
> vendor/golang.org/x/text/unicode/bidi
> vendor/golang.org/x/text/unicode/norm
> vendor/golang.org/x/net/http2/hpack
> vendor/golang.org/x/text/secure/bidirule
> net/http/internal
> github.com/miekg/pkcs11
> flag
> vendor/golang.org/x/net/idna
> encoding/csv
> github.com/fsnotify/fsnotify
> github.com/hashicorp/hcl/hcl/token
> github.com/pelletier/go-toml
> github.com/hashicorp/hcl/hcl/ast
> github.com/hashicorp/hcl/hcl/scanner
> github.com/hashicorp/hcl/hcl/parser
> github.com/hashicorp/hcl/json/token
> github.com/hashicorp/hcl/json/scanner
> github.com/hashicorp/hcl/json/parser
> github.com/hashicorp/hcl
> github.com/hashicorp/hcl/hcl/printer
> crypto/x509
> net/textproto
> vendor/golang.org/x/net/http/httpproxy
> github.com/mitchellh/mapstructure
> mime/multipart
> vendor/golang.org/x/net/http/httpguts
> github.com/spf13/afero/mem
> golang.org/x/text/unicode/norm
> github.com/theupdateframework/notary/tuf/data
> crypto/tls
> text/template/parse
> github.com/theupdateframework/notary/client/changelist
> github.com/theupdateframework/notary/tuf/utils
> text/template
> github.com/spf13/jwalterweatherman
> github.com/spf13/pflag
> net/http/httptrace
> html/template
> net/http
> github.com/subosito/gotenv
> gopkg.in/ini.v1
> github.com/spf13/cast
> gopkg.in/yaml.v2
> github.com/golang/protobuf/proto
> golang.org/x/net/context
> golang.org/x/net/internal/timeseries
> google.golang.org/grpc/grpclog
> google.golang.org/grpc/connectivity
> google.golang.org/grpc/credentials/internal
> google.golang.org/grpc/internal
> google.golang.org/grpc/metadata
> google.golang.org/grpc/serviceconfig
> google.golang.org/grpc/internal/grpcrand
> google.golang.org/grpc/resolver
> google.golang.org/grpc/codes
> google.golang.org/grpc/encoding
> google.golang.org/grpc/internal/backoff
> google.golang.org/grpc/internal/balancerload
> google.golang.org/grpc/internal/envconfig
> golang.org/x/text/unicode/bidi
> golang.org/x/net/http2/hpack
> google.golang.org/grpc/internal/syscall
> google.golang.org/grpc/keepalive
> google.golang.org/grpc/stats
> golang.org/x/text/secure/bidirule
> google.golang.org/grpc/tap
> github.com/golang/protobuf/ptypes/empty
> google.golang.org/grpc/credentials
> google.golang.org/grpc/encoding/proto
> github.com/golang/protobuf/ptypes/any
> github.com/golang/protobuf/ptypes/duration
> github.com/golang/protobuf/ptypes/timestamp
> google.golang.org/grpc/balancer
> google.golang.org/genproto/googleapis/rpc/status
> github.com/golang/protobuf/ptypes
> google.golang.org/grpc/balancer/base
> google.golang.org/grpc/binarylog/grpc_binarylog_v1
> google.golang.org/grpc/status
> github.com/theupdateframework/notary/storage
> github.com/magiconair/properties
> github.com/spf13/afero
> golang.org/x/net/trace
> github.com/theupdateframework/notary/trustmanager
> github.com/theupdateframework/notary/cryptoservice
> github.com/theupdateframework/notary/tuf/signed
> google.golang.org/grpc/balancer/roundrobin
> google.golang.org/grpc/internal/binarylog
> google.golang.org/grpc/internal/channelz
> github.com/spf13/viper
> github.com/theupdateframework/notary/trustmanager/yubikey
> github.com/theupdateframework/notary/trustpinning
> golang.org/x/net/idna
> github.com/theupdateframework/notary/tuf
> google.golang.org/grpc/peer
> google.golang.org/grpc/naming
> google.golang.org/grpc/resolver/dns
> golang.org/x/net/http/httpguts
> google.golang.org/grpc/resolver/passthrough
> net/http/httputil
> github.com/bugsnag/bugsnag-go/errors
> golang.org/x/net/http2
> github.com/theupdateframework/notary/client
> os/exec
> os/signal
> github.com/gorilla/mux
> github.com/bugsnag/panicwrap
> github.com/bugsnag/bugsnag-go
> github.com/docker/distribution/registry/api/errcode
> github.com/docker/distribution/context
> github.com/docker/distribution/registry/auth
> github.com/Shopify/logrus-bugsnag
> github.com/pkg/errors
> database/sql/driver
> github.com/opencontainers/go-digest
> github.com/docker/go-connections/tlsconfig
> github.com/docker/distribution/digestset
> github.com/opencontainers/image-spec/specs-go
> database/sql
> github.com/docker/distribution/reference
> github.com/opencontainers/image-spec/specs-go/v1
> github.com/docker/distribution/registry/client/auth/challenge
> google.golang.org/grpc/internal/transport
> github.com/docker/distribution
> github.com/docker/distribution/registry/api/v2
> github.com/docker/distribution/registry/client/transport
> expvar
> github.com/beorn7/perks/quantile
> github.com/cespare/xxhash
> github.com/go-sql-driver/mysql
> github.com/prometheus/client_model/go
> github.com/prometheus/client_golang/prometheus/internal
> github.com/matttproud/golang_protobuf_extensions/pbutil
> github.com/prometheus/common/internal/bitbucket.org/ww/goautoneg
> github.com/prometheus/common/model
> github.com/prometheus/procfs/internal/fs
> github.com/prometheus/procfs/internal/util
> github.com/prometheus/procfs
> google.golang.org/grpc
> github.com/prometheus/common/expfmt
> github.com/theupdateframework/notary/utils
> runtime/debug
> github.com/spf13/cobra
> golang.org/x/crypto/ssh/terminal
> github.com/theupdateframework/notary/passphrase
> github.com/prometheus/client_golang/prometheus
> github.com/docker/distribution/health
> golang.org/x/crypto/blowfish
> github.com/theupdateframework/notary/trustmanager/remoteks
> golang.org/x/crypto/bcrypt
> encoding/base32
> github.com/docker/distribution/registry/auth/htpasswd
> github.com/docker/libtrust
> github.com/theupdateframework/notary/cmd/escrow
> github.com/lib/pq/scram
> os/user
> github.com/docker/distribution/registry/auth/token
> github.com/prometheus/client_golang/prometheus/promhttp
> hash/fnv
> github.com/theupdateframework/notary/vendor/github.com/prometheus/client_golang/prometheus
> github.com/docker/go-metrics
> github.com/docker/distribution/metrics
> github.com/docker/distribution/registry/storage/cache
> github.com/theupdateframework/notary/server/errors
> github.com/jinzhu/inflection
> github.com/docker/distribution/registry/storage/cache/memory
> go/token
> github.com/docker/distribution/registry/client
> go/scanner
> github.com/docker/distribution/registry/client/auth
> go/ast
> github.com/theupdateframework/notary/cmd/notary
> github.com/lib/pq
> github.com/jinzhu/gorm
> github.com/cenkalti/backoff
> github.com/hailocab/go-hostpool
> gopkg.in/fatih/pool.v2
> gopkg.in/gorethink/gorethink.v3/encoding
> gopkg.in/gorethink/gorethink.v3/ql2
> gopkg.in/gorethink/gorethink.v3/types
> github.com/theupdateframework/notary/proto
> google.golang.org/grpc/health/grpc_health_v1
> gopkg.in/dancannon/gorethink.v3
> runtime/pprof
> github.com/theupdateframework/notary/signer/client
> runtime/trace
> github.com/theupdateframework/notary/signer
> net/http/pprof
> github.com/theupdateframework/notary/signer/api
> github.com/dvsekhvalnov/jose2go/base64url
> github.com/dvsekhvalnov/jose2go/arrays
> github.com/dvsekhvalnov/jose2go/compact
> github.com/dvsekhvalnov/jose2go/aes
> github.com/dvsekhvalnov/jose2go/kdf
> github.com/dvsekhvalnov/jose2go/keys/ecc
> github.com/dvsekhvalnov/jose2go/padding
> google.golang.org/grpc/health
> github.com/dvsekhvalnov/jose2go
> github.com/davecgh/go-spew/spew
> github.com/theupdateframework/notary/storage/rethinkdb
> github.com/pmezard/go-difflib/difflib
> net/http/httptest
> github.com/theupdateframework/notary/server/storage
> github.com/theupdateframework/notary/signer/keydbstore
> github.com/stretchr/testify/assert
> github.com/theupdateframework/notary/cmd/notary-signer
> github.com/theupdateframework/notary/server/snapshot
> github.com/theupdateframework/notary/server/timestamp
> github.com/theupdateframework/notary/server/handlers
> github.com/stretchr/testify/require
> github.com/theupdateframework/notary/server
> github.com/theupdateframework/notary/cmd/notary-server
> github.com/theupdateframework/notary/tuf/testutils/keys
> testing
> github.com/theupdateframework/notary/tuf/testutils
> github.com/theupdateframework/notary/tuf/testutils/interfaces
> make[1]: Leaving directory '/<<PKGBUILDDIR>>'
>    dh_auto_test -O--builddirectory=/<<BUILDDIR>>/notary-0.6.1\~ds2/_build -O--buildsystem=golang
> 	cd _build && go test -vet=off -v -p 4 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version
> ?   	github.com/theupdateframework/notary	[no test files]
> === RUN   Test0Dot1Migration
> --- PASS: Test0Dot1Migration (0.05s)
> === RUN   Test0Dot3Migration
> --- PASS: Test0Dot3Migration (0.03s)
> === RUN   Test0Dot1RepoFormat
> time="2020-03-22T08:31:13Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: Test0Dot1RepoFormat (0.23s)
> === RUN   Test0Dot3RepoFormat
> time="2020-03-22T08:31:13Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: Test0Dot3RepoFormat (0.18s)
> === RUN   TestDownloading0Dot1RepoFormat
> --- PASS: TestDownloading0Dot1RepoFormat (0.01s)
> === RUN   TestDownloading0Dot3RepoFormat
> --- PASS: TestDownloading0Dot3RepoFormat (0.00s)
> === RUN   TestInitRepositoryManagedRolesIncludingRoot
> --- PASS: TestInitRepositoryManagedRolesIncludingRoot (0.01s)
> === RUN   TestInitRepositoryManagedRolesInvalidRole
> --- PASS: TestInitRepositoryManagedRolesInvalidRole (0.01s)
> === RUN   TestInitRepositoryManagedRolesIncludingTargets
> --- PASS: TestInitRepositoryManagedRolesIncludingTargets (0.00s)
> === RUN   TestInitRepositoryManagedRolesIncludingTimestamp
> --- PASS: TestInitRepositoryManagedRolesIncludingTimestamp (0.01s)
> === RUN   TestInitRepositoryWithCerts
> --- PASS: TestInitRepositoryWithCerts (0.02s)
> === RUN   TestMatchKeyIDsWithPublicKeys
> --- PASS: TestMatchKeyIDsWithPublicKeys (0.01s)
> === RUN   TestInitRepositoryNeedsRemoteTimestampKey
> --- PASS: TestInitRepositoryNeedsRemoteTimestampKey (0.01s)
> === RUN   TestInitRepositoryNeedsRemoteSnapshotKey
> --- PASS: TestInitRepositoryNeedsRemoteSnapshotKey (0.01s)
> === RUN   TestInitRepoServerOnlyManagesTimestampKey
> --- PASS: TestInitRepoServerOnlyManagesTimestampKey (0.14s)
> === RUN   TestInitRepoServerManagesTimestampAndSnapshotKeys
> --- PASS: TestInitRepoServerManagesTimestampAndSnapshotKeys (0.13s)
> === RUN   TestInitRepoAttemptsExceeded
> --- PASS: TestInitRepoAttemptsExceeded (0.12s)
> === RUN   TestInitRepoPasswordInvalid
> --- PASS: TestInitRepoPasswordInvalid (0.01s)
> === RUN   TestAddTargetToTargetRoleByDefault
> --- PASS: TestAddTargetToTargetRoleByDefault (0.04s)
> === RUN   TestAddTargetToSpecifiedValidRoles
> --- PASS: TestAddTargetToSpecifiedValidRoles (0.04s)
> === RUN   TestAddTargetToSpecifiedInvalidRoles
> --- PASS: TestAddTargetToSpecifiedInvalidRoles (0.04s)
> === RUN   TestAddTargetWithInvalidTarget
> --- PASS: TestAddTargetWithInvalidTarget (0.02s)
> === RUN   TestAddTargetErrorWritingChanges
> --- PASS: TestAddTargetErrorWritingChanges (0.02s)
> === RUN   TestRemoveTargetToTargetRoleByDefault
> --- PASS: TestRemoveTargetToTargetRoleByDefault (0.03s)
> === RUN   TestRemoveTargetFromSpecifiedValidRoles
> --- PASS: TestRemoveTargetFromSpecifiedValidRoles (0.05s)
> === RUN   TestRemoveTargetToSpecifiedInvalidRoles
> --- PASS: TestRemoveTargetToSpecifiedInvalidRoles (0.05s)
> === RUN   TestRemoveTargetErrorWritingChanges
> --- PASS: TestRemoveTargetErrorWritingChanges (0.02s)
> === RUN   TestListTarget
> --- PASS: TestListTarget (0.43s)
> === RUN   TestListTargetRestrictsDelegationPaths
> --- PASS: TestListTargetRestrictsDelegationPaths (0.08s)
> === RUN   TestValidateRootKey
> --- PASS: TestValidateRootKey (0.05s)
> === RUN   TestGetChangelist
> --- PASS: TestGetChangelist (0.04s)
> === RUN   TestPublishBareRepo
> --- PASS: TestPublishBareRepo (0.44s)
> === RUN   TestPublishUninitializedRepo
> time="2020-03-22T08:31:15Z" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time"
> --- PASS: TestPublishUninitializedRepo (0.06s)
> === RUN   TestPublishClientHasSnapshotKey
> --- PASS: TestPublishClientHasSnapshotKey (0.32s)
> === RUN   TestPublishAfterInitServerHasSnapshotKey
> --- PASS: TestPublishAfterInitServerHasSnapshotKey (0.35s)
> === RUN   TestPublishAfterPullServerHasSnapshotKey
> --- PASS: TestPublishAfterPullServerHasSnapshotKey (0.13s)
> === RUN   TestPublishNoOneHasSnapshotKey
> --- PASS: TestPublishNoOneHasSnapshotKey (0.08s)
> === RUN   TestPublishSnapshotCorrupt
> --- PASS: TestPublishSnapshotCorrupt (0.20s)
> === RUN   TestPublishTargetsCorrupt
> --- PASS: TestPublishTargetsCorrupt (0.11s)
> === RUN   TestPublishRootCorrupt
> time="2020-03-22T08:31:17Z" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')"
> time="2020-03-22T08:31:17Z" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')"
> --- PASS: TestPublishRootCorrupt (0.13s)
> === RUN   TestPublishSnapshotLocalKeysCreatedFirst
> --- PASS: TestPublishSnapshotLocalKeysCreatedFirst (0.01s)
> === RUN   TestPublishDelegations
> --- PASS: TestPublishDelegations (0.19s)
> === RUN   TestPublishDelegationsX509
> --- PASS: TestPublishDelegationsX509 (0.16s)
> === RUN   TestPublishTargetsDelegationScopeFailIfNoKeys
> time="2020-03-22T08:31:17Z" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist"
> time="2020-03-22T08:31:17Z" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist"
> --- PASS: TestPublishTargetsDelegationScopeFailIfNoKeys (0.12s)
> === RUN   TestPublishTargetsDelegationSuccessLocallyHasRoles
> --- PASS: TestPublishTargetsDelegationSuccessLocallyHasRoles (0.16s)
> === RUN   TestPublishTargetsDelegationNoTargetsKeyNeeded
> --- PASS: TestPublishTargetsDelegationNoTargetsKeyNeeded (0.14s)
> === RUN   TestPublishTargetsDelegationSuccessNeedsToDownloadRoles
> --- PASS: TestPublishTargetsDelegationSuccessNeedsToDownloadRoles (0.12s)
> === RUN   TestPublishTargetsDelegationFromTwoRepos
> --- PASS: TestPublishTargetsDelegationFromTwoRepos (0.12s)
> === RUN   TestPublishRemoveDelegationKeyFromDelegationRole
> time="2020-03-22T08:31:18Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:18Z" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: 4ca63af7d56142d32e60b1d3c7e56b797a640f6a4793882e2ca037727f497506"
> --- PASS: TestPublishRemoveDelegationKeyFromDelegationRole (0.10s)
> === RUN   TestPublishRemoveDelegation
> time="2020-03-22T08:31:18Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2020-03-22T08:31:18Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2020-03-22T08:31:18Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:18Z" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: "
> --- PASS: TestPublishRemoveDelegation (0.08s)
> === RUN   TestPublishSucceedsDespiteDelegationCorrupt
> --- PASS: TestPublishSucceedsDespiteDelegationCorrupt (0.09s)
> === RUN   TestRotateKeyInvalidRole
> --- PASS: TestRotateKeyInvalidRole (0.06s)
> === RUN   TestRemoteRotationError
> --- PASS: TestRemoteRotationError (0.02s)
> === RUN   TestRemoteRotationEndpointError
> --- PASS: TestRemoteRotationEndpointError (0.03s)
> === RUN   TestRemoteRotationNoRootKey
> --- PASS: TestRemoteRotationNoRootKey (0.05s)
> === RUN   TestRemoteRotationNoInit
> time="2020-03-22T08:31:18Z" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time"
> --- PASS: TestRemoteRotationNoInit (0.05s)
> === RUN   TestRotateBeforePublishFromRemoteKeyToLocalKey
> --- PASS: TestRotateBeforePublishFromRemoteKeyToLocalKey (0.14s)
> === RUN   TestRotateKeyAfterPublishNoServerManagementChange
> --- PASS: TestRotateKeyAfterPublishNoServerManagementChange (0.42s)
> === RUN   TestRotateKeyAfterPublishServerManagementChange
> --- PASS: TestRotateKeyAfterPublishServerManagementChange (0.48s)
> === RUN   TestRotateRootKey
> --- PASS: TestRotateRootKey (0.16s)
> === RUN   TestRotateRootMultiple
> --- PASS: TestRotateRootMultiple (0.13s)
> === RUN   TestRotateRootKeyProvided
> --- PASS: TestRotateRootKeyProvided (0.16s)
> === RUN   TestRotateRootKeyLegacySupport
> --- PASS: TestRotateRootKeyLegacySupport (0.14s)
> === RUN   TestRemoteServerUnavailableNoLocalCache
> time="2020-03-22T08:31:20Z" level=error msg="Could not publish Repository since we could not update: unable to reach trust server at this time: 500."
> --- PASS: TestRemoteServerUnavailableNoLocalCache (0.00s)
> === RUN   TestAddDelegationChangefileValid
> --- PASS: TestAddDelegationChangefileValid (0.02s)
> === RUN   TestAddDelegationChangefileApplicable
> --- PASS: TestAddDelegationChangefileApplicable (0.01s)
> === RUN   TestAddDelegationErrorWritingChanges
> --- PASS: TestAddDelegationErrorWritingChanges (0.01s)
> === RUN   TestRemoveDelegationChangefileValid
> --- PASS: TestRemoveDelegationChangefileValid (0.02s)
> === RUN   TestRemoveDelegationChangefileApplicable
> time="2020-03-22T08:31:20Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2020-03-22T08:31:20Z" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> --- PASS: TestRemoveDelegationChangefileApplicable (0.01s)
> === RUN   TestClearAllPathsDelegationChangefileApplicable
> --- PASS: TestClearAllPathsDelegationChangefileApplicable (0.04s)
> === RUN   TestFullAddDelegationChangefileApplicable
> --- PASS: TestFullAddDelegationChangefileApplicable (0.02s)
> === RUN   TestFullRemoveDelegationChangefileApplicable
> --- PASS: TestFullRemoveDelegationChangefileApplicable (0.02s)
> === RUN   TestRemoveDelegationErrorWritingChanges
> --- PASS: TestRemoveDelegationErrorWritingChanges (0.01s)
> === RUN   TestBootstrapClientBadURL
> --- PASS: TestBootstrapClientBadURL (0.00s)
> === RUN   TestClientInvalidURL
> --- PASS: TestClientInvalidURL (0.00s)
> === RUN   TestPublishTargetsDelegationCanUseUserKeyWithArbitraryRole
> --- PASS: TestPublishTargetsDelegationCanUseUserKeyWithArbitraryRole (0.26s)
> === RUN   TestDeleteRepo
> --- PASS: TestDeleteRepo (0.07s)
> === RUN   TestDeleteRemoteRepo
> --- PASS: TestDeleteRemoteRepo (0.10s)
> === RUN   TestListRoles
> --- PASS: TestListRoles (0.18s)
> === RUN   TestGetAllTargetInfo
> --- PASS: TestGetAllTargetInfo (0.11s)
> === RUN   TestUpdateSucceedsEvenIfCannotWriteNewRepo
> time="2020-03-22T08:31:21Z" level=error msg="could not save root to cache: Non-writable"
> --- PASS: TestUpdateSucceedsEvenIfCannotWriteNewRepo (0.08s)
> === RUN   TestUpdateSucceedsEvenIfCannotWriteExistingRepo
> --- PASS: TestUpdateSucceedsEvenIfCannotWriteExistingRepo (0.28s)
> === RUN   TestUpdateInOfflineMode
> time="2020-03-22T08:31:21Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> time="2020-03-22T08:31:21Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: TestUpdateInOfflineMode (0.03s)
> === RUN   TestUpdateReplacesCorruptOrMissingMetadata
> time="2020-03-22T08:31:21Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:21Z" level=error msg="Metadata for root expired"
> --- PASS: TestUpdateReplacesCorruptOrMissingMetadata (0.51s)
> === RUN   TestUpdateFailsIfServerRootKeyChangedWithoutMultiSign
> time="2020-03-22T08:31:22Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:22Z" level=error msg="Metadata for root expired"
> --- PASS: TestUpdateFailsIfServerRootKeyChangedWithoutMultiSign (0.05s)
> === RUN   TestUpdateRemoteRootNotExistNoLocalCache
> --- PASS: TestUpdateRemoteRootNotExistNoLocalCache (0.02s)
> === RUN   TestUpdateRemoteRootNotExistCanUseLocalCache
> --- PASS: TestUpdateRemoteRootNotExistCanUseLocalCache (0.06s)
> === RUN   TestUpdateRemoteRootNotExistCannotUseLocalCache
> --- PASS: TestUpdateRemoteRootNotExistCannotUseLocalCache (0.04s)
> === RUN   TestUpdateRemoteRoot50XNoLocalCache
> --- PASS: TestUpdateRemoteRoot50XNoLocalCache (0.01s)
> === RUN   TestUpdateRemoteRoot50XCanUseLocalCache
> --- PASS: TestUpdateRemoteRoot50XCanUseLocalCache (0.04s)
> === RUN   TestUpdateRemoteRoot50XCannotUseLocalCache
> --- PASS: TestUpdateRemoteRoot50XCannotUseLocalCache (0.06s)
> === RUN   TestUpdateNonRootRemoteMissingMetadataNoLocalCache
> --- PASS: TestUpdateNonRootRemoteMissingMetadataNoLocalCache (0.10s)
> === RUN   TestUpdateNonRootRemoteMissingMetadataCanUseLocalCache
> time="2020-03-22T08:31:22Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: TestUpdateNonRootRemoteMissingMetadataCanUseLocalCache (0.14s)
> === RUN   TestUpdateNonRootRemoteMissingMetadataCannotUseLocalCache
> time="2020-03-22T08:31:22Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: TestUpdateNonRootRemoteMissingMetadataCannotUseLocalCache (0.17s)
> === RUN   TestUpdateNonRootRemote50XNoLocalCache
> --- PASS: TestUpdateNonRootRemote50XNoLocalCache (0.10s)
> === RUN   TestUpdateNonRootRemote50XCanUseLocalCache
> time="2020-03-22T08:31:22Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: TestUpdateNonRootRemote50XCanUseLocalCache (0.14s)
> === RUN   TestUpdateNonRootRemote50XCannotUseLocalCache
> time="2020-03-22T08:31:23Z" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely"
> --- PASS: TestUpdateNonRootRemote50XCannotUseLocalCache (0.22s)
> === RUN   TestUpdateRemoteChecksumWrongNoLocalCache
> --- PASS: TestUpdateRemoteChecksumWrongNoLocalCache (0.15s)
> === RUN   TestUpdateRemoteChecksumWrongCanUseLocalCache
> --- PASS: TestUpdateRemoteChecksumWrongCanUseLocalCache (0.27s)
> === RUN   TestUpdateRemoteChecksumWrongCannotUseLocalCache
> --- PASS: TestUpdateRemoteChecksumWrongCannotUseLocalCache (0.27s)
> === RUN   TestUpdateRootRemoteCorruptedNoLocalCache
> time="2020-03-22T08:31:24Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:24Z" level=error msg="Metadata for root expired"
> --- PASS: TestUpdateRootRemoteCorruptedNoLocalCache (0.44s)
> === RUN   TestUpdateRootRemoteCorruptedCanUseLocalCache
> --- PASS: TestUpdateRootRemoteCorruptedCanUseLocalCache (0.78s)
> === RUN   TestUpdateRootRemoteCorruptedCannotUseLocalCache
> time="2020-03-22T08:31:25Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:25Z" level=error msg="Metadata for root expired"
> --- PASS: TestUpdateRootRemoteCorruptedCannotUseLocalCache (1.02s)
> === RUN   TestUpdateNonRootRemoteCorruptedNoLocalCache
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for targets expired"
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for targets expired"
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for snapshot expired"
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for snapshot expired"
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for timestamp expired"
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for timestamp expired"
> time="2020-03-22T08:31:26Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:26Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:26Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for targets/a expired"
> time="2020-03-22T08:31:26Z" level=warning msg="Error getting targets/a: targets/a expired at Thu Feb 21 08:31:26 UTC 2019"
> time="2020-03-22T08:31:26Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2020-03-22T08:31:26Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2020-03-22T08:31:26Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for targets/a/b expired"
> time="2020-03-22T08:31:26Z" level=warning msg="Error getting targets/a/b: targets/a/b expired at Thu Feb 21 08:31:26 UTC 2019"
> time="2020-03-22T08:31:27Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2020-03-22T08:31:27Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2020-03-22T08:31:27Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2020-03-22T08:31:27Z" level=error msg="Metadata for targets/b expired"
> time="2020-03-22T08:31:27Z" level=warning msg="Error getting targets/b: targets/b expired at Thu Feb 21 08:31:27 UTC 2019"
> --- PASS: TestUpdateNonRootRemoteCorruptedNoLocalCache (0.93s)
> === RUN   TestUpdateNonRootRemoteCorruptedCanUseLocalCache
> time="2020-03-22T08:31:27Z" level=error msg="Metadata for timestamp expired"
> time="2020-03-22T08:31:27Z" level=error msg="Metadata for timestamp expired"
> --- PASS: TestUpdateNonRootRemoteCorruptedCanUseLocalCache (0.72s)
> === RUN   TestUpdateNonRootRemoteCorruptedCannotUseLocalCache
> time="2020-03-22T08:31:27Z" level=error msg="Metadata for targets expired"
> time="2020-03-22T08:31:28Z" level=error msg="Metadata for snapshot expired"
> time="2020-03-22T08:31:28Z" level=error msg="Metadata for snapshot expired"
> time="2020-03-22T08:31:28Z" level=error msg="Metadata for timestamp expired"
> time="2020-03-22T08:31:28Z" level=error msg="Metadata for timestamp expired"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:28Z" level=error msg="Metadata for targets/a expired"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/a: targets/a expired at Thu Feb 21 08:31:28 UTC 2019"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2020-03-22T08:31:28Z" level=error msg="Metadata for targets/a/b expired"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/a/b: targets/a/b expired at Thu Feb 21 08:31:28 UTC 2019"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> time="2020-03-22T08:31:28Z" level=error msg="Metadata for targets/b expired"
> time="2020-03-22T08:31:28Z" level=warning msg="Error getting targets/b: targets/b expired at Thu Feb 21 08:31:28 UTC 2019"
> --- PASS: TestUpdateNonRootRemoteCorruptedCannotUseLocalCache (0.88s)
> === RUN   TestUpdateLocalAndRemoteRootCorrupt
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> time="2020-03-22T08:31:29Z" level=error msg="Metadata for root expired"
> --- PASS: TestUpdateLocalAndRemoteRootCorrupt (0.96s)
> === RUN   TestUpdateRemoteKeyRotated
> time="2020-03-22T08:31:29Z" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a"
> time="2020-03-22T08:31:29Z" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b"
> time="2020-03-22T08:31:29Z" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b"
> --- PASS: TestUpdateRemoteKeyRotated (0.09s)
> === RUN   TestValidateRootRotationWithOldRole
> --- PASS: TestValidateRootRotationWithOldRole (0.05s)
> === RUN   TestRootRoleInvariant
> --- PASS: TestRootRoleInvariant (0.04s)
> === RUN   TestBadIntermediateTransitions
> --- PASS: TestBadIntermediateTransitions (0.02s)
> === RUN   TestExpiredIntermediateTransitions
> time="2020-03-22T08:31:29Z" level=warning msg="root is nearing expiry, you should re-sign the role metadata"
> --- PASS: TestExpiredIntermediateTransitions (0.02s)
> === RUN   TestDownloadTargetsLarge
> --- PASS: TestDownloadTargetsLarge (2.19s)
> === RUN   TestDownloadTargetsDeep
> --- PASS: TestDownloadTargetsDeep (0.01s)
> === RUN   TestDownloadSnapshotLargeDelegationsMany
> --- PASS: TestDownloadSnapshotLargeDelegationsMany (1.71s)
> === RUN   TestRootOnDiskTrustPinning
> --- PASS: TestRootOnDiskTrustPinning (0.01s)
> === RUN   TestApplyTargetsChange
> --- PASS: TestApplyTargetsChange (0.00s)
> === RUN   TestApplyAddTargetTwice
> --- PASS: TestApplyAddTargetTwice (0.00s)
> === RUN   TestApplyChangelist
> --- PASS: TestApplyChangelist (0.00s)
> === RUN   TestApplyChangelistMulti
> --- PASS: TestApplyChangelistMulti (0.00s)
> === RUN   TestApplyTargetsDelegationCreateDelete
> --- PASS: TestApplyTargetsDelegationCreateDelete (0.00s)
> === RUN   TestApplyTargetsDelegationCreate2SharedKey
> --- PASS: TestApplyTargetsDelegationCreate2SharedKey (0.00s)
> === RUN   TestApplyTargetsDelegationCreateEdit
> --- PASS: TestApplyTargetsDelegationCreateEdit (0.00s)
> === RUN   TestApplyTargetsDelegationEditNonExisting
> --- PASS: TestApplyTargetsDelegationEditNonExisting (0.00s)
> === RUN   TestApplyTargetsDelegationCreateAlreadyExisting
> --- PASS: TestApplyTargetsDelegationCreateAlreadyExisting (0.00s)
> === RUN   TestApplyTargetsDelegationAlreadyExistingMergePaths
> --- PASS: TestApplyTargetsDelegationAlreadyExistingMergePaths (0.00s)
> === RUN   TestApplyTargetsDelegationInvalidRole
> --- PASS: TestApplyTargetsDelegationInvalidRole (0.00s)
> === RUN   TestApplyTargetsDelegationInvalidJSONContent
> --- PASS: TestApplyTargetsDelegationInvalidJSONContent (0.00s)
> === RUN   TestApplyTargetsDelegationInvalidAction
> --- PASS: TestApplyTargetsDelegationInvalidAction (0.00s)
> === RUN   TestApplyTargetsChangeInvalidType
> --- PASS: TestApplyTargetsChangeInvalidType (0.00s)
> === RUN   TestApplyTargetsDelegationCreate2Deep
> --- PASS: TestApplyTargetsDelegationCreate2Deep (0.00s)
> === RUN   TestApplyTargetsDelegationParentDoesntExist
> --- PASS: TestApplyTargetsDelegationParentDoesntExist (0.00s)
> === RUN   TestApplyChangelistCreatesDelegation
> --- PASS: TestApplyChangelistCreatesDelegation (0.00s)
> === RUN   TestApplyChangelistTargetsToMultipleRoles
> --- PASS: TestApplyChangelistTargetsToMultipleRoles (0.00s)
> === RUN   TestApplyChangelistTargetsFailsNonexistentRole
> time="2020-03-22T08:31:33Z" level=error msg="couldn't add target to targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist"
> time="2020-03-22T08:31:33Z" level=error msg="couldn't remove target from targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist"
> --- PASS: TestApplyChangelistTargetsFailsNonexistentRole (0.00s)
> === RUN   TestChangeTargetMetaFailsInvalidRole
> time="2020-03-22T08:31:33Z" level=error msg="couldn't add target to ruhroh: tuf: invalid role ruhroh. does not exist"
> --- PASS: TestChangeTargetMetaFailsInvalidRole (0.00s)
> === RUN   TestChangeTargetMetaFailsIfPrefixError
> time="2020-03-22T08:31:33Z" level=error msg="couldn't add target to targets/level1: Could not add all targets"
> --- PASS: TestChangeTargetMetaFailsIfPrefixError (0.00s)
> === RUN   TestAllNearExpiry
> --- PASS: TestAllNearExpiry (0.00s)
> === RUN   TestAllNotNearExpiry
> --- PASS: TestAllNotNearExpiry (0.00s)
> === RUN   TestRotateRemoteKeyOffline
> --- PASS: TestRotateRemoteKeyOffline (0.00s)
> PASS
> ok  	github.com/theupdateframework/notary/client	20.362s
> === RUN   TestTUFDelegation
> --- PASS: TestTUFDelegation (0.00s)
> === RUN   TestMemChangelist
> --- PASS: TestMemChangelist (0.00s)
> === RUN   TestMemChangeIterator
> --- PASS: TestMemChangeIterator (0.00s)
> === RUN   TestMemChangelistRemove
> --- PASS: TestMemChangelistRemove (0.00s)
> === RUN   TestAdd
> --- PASS: TestAdd (0.00s)
> === RUN   TestErrorConditions
> time="2020-03-22T08:31:10Z" level=warning msg="invalid character '\\x05' looking for beginning of value"
> --- PASS: TestErrorConditions (0.00s)
> === RUN   TestListOrder
> --- PASS: TestListOrder (0.00s)
> === RUN   TestFileChangeIterator
> --- PASS: TestFileChangeIterator (0.00s)
> PASS
> ok  	github.com/theupdateframework/notary/client/changelist	0.017s
> === RUN   TestParseConfigError
> --- PASS: TestParseConfigError (0.00s)
> === RUN   TestSetupGRPCServer
> --- PASS: TestSetupGRPCServer (0.00s)
> === RUN   TestSetupStorage
> --- PASS: TestSetupStorage (0.00s)
> === RUN   TestSetupNetListener
> --- PASS: TestSetupNetListener (0.00s)
> PASS
> ok  	github.com/theupdateframework/notary/cmd/escrow	0.015s
> === RUN   TestPurgeDelegationKeys
> Usage:
>   delegation [command]
> 
> Available Commands:
>   add         Add a keys to delegation using the provided public key X509 certificates.
>   list        Lists delegations for the Global Unique Name.
>   purge       Remove KeyID(s) from all delegation roles in the given GUN.
>   remove      Remove KeyID(s) from the specified Role delegation.
> 
> Use "delegation [command] --help" for more information about a command.
> Usage:
>   delegation [command]
> 
> Available Commands:
>   add         Add a keys to delegation using the provided public key X509 certificates.
>   list        Lists delegations for the Global Unique Name.
>   purge       Remove KeyID(s) from all delegation roles in the given GUN.
>   remove      Remove KeyID(s) from the specified Role delegation.
> 
> Use "delegation [command] --help" for more information about a command.
> Removal of the following keys from all delegations in gun staged for next publish:
> 	- abc
> --- PASS: TestPurgeDelegationKeys (0.00s)
> === RUN   TestAddInvalidDelegationName
> --- PASS: TestAddInvalidDelegationName (0.02s)
> === RUN   TestAddInvalidDelegationCert
> --- PASS: TestAddInvalidDelegationCert (0.00s)
> === RUN   TestAddInvalidShortPubkeyCert
> --- PASS: TestAddInvalidShortPubkeyCert (0.01s)
> === RUN   TestRemoveInvalidDelegationName
> --- PASS: TestRemoveInvalidDelegationName (0.00s)
> === RUN   TestRemoveAllInvalidDelegationName
> --- PASS: TestRemoveAllInvalidDelegationName (0.00s)
> === RUN   TestAddInvalidNumArgs
> Usage:
>   delegation [command]
> 
> Available Commands:
>   add         Add a keys to delegation using the provided public key X509 certificates.
>   list        Lists delegations for the Global Unique Name.
>   purge       Remove KeyID(s) from all delegation roles in the given GUN.
>   remove      Remove KeyID(s) from the specified Role delegation.
> 
> Use "delegation [command] --help" for more information about a command.
> --- PASS: TestAddInvalidNumArgs (0.00s)
> === RUN   TestListInvalidNumArgs
> Usage:
>   delegation [command]
> 
> Available Commands:
>   add         Add a keys to delegation using the provided public key X509 certificates.
>   list        Lists delegations for the Global Unique Name.
>   purge       Remove KeyID(s) from all delegation roles in the given GUN.
>   remove      Remove KeyID(s) from the specified Role delegation.
> 
> Use "delegation [command] --help" for more information about a command.
> --- PASS: TestListInvalidNumArgs (0.00s)
> === RUN   TestRemoveInvalidNumArgs
> Usage:
>   delegation [command]
> 
> Available Commands:
>   add         Add a keys to delegation using the provided public key X509 certificates.
>   list        Lists delegations for the Global Unique Name.
>   purge       Remove KeyID(s) from all delegation roles in the given GUN.
>   remove      Remove KeyID(s) from the specified Role delegation.
> 
> Use "delegation [command] --help" for more information about a command.
> --- PASS: TestRemoveInvalidNumArgs (0.00s)
> === RUN   TestInitWithRootKey
> --- PASS: TestInitWithRootKey (0.13s)
> === RUN   TestInitWithRootCert
> --- PASS: TestInitWithRootCert (0.07s)
> === RUN   TestClientTUFInteraction
> --- PASS: TestClientTUFInteraction (0.14s)
> === RUN   TestClientDeleteTUFInteraction
> time="2020-03-22T08:31:13Z" level=error msg="could not reach https://invalid-server: Get \"https://invalid-server/v2/\": dial tcp: lookup invalid-server on 172.31.0.2:53: no such host"
> --- PASS: TestClientDeleteTUFInteraction (0.18s)
> === RUN   TestClientTUFAddByHashInteraction
> --- PASS: TestClientTUFAddByHashInteraction (0.33s)
> === RUN   TestClientDelegationsInteraction
> time="2020-03-22T08:31:14Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2020-03-22T08:31:14Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> --- PASS: TestClientDelegationsInteraction (0.60s)
> === RUN   TestClientDelegationsPublishing
> --- PASS: TestClientDelegationsPublishing (0.47s)
> === RUN   TestClientKeyGenerationRotation
> --- PASS: TestClientKeyGenerationRotation (0.81s)
> === RUN   TestKeyRotation
> --- PASS: TestKeyRotation (0.11s)
> === RUN   TestKeyRotationNonRoot
> --- PASS: TestKeyRotationNonRoot (0.17s)
> === RUN   TestDefaultRootKeyGeneration
> --- PASS: TestDefaultRootKeyGeneration (0.01s)
> === RUN   TestLogLevelFlags
> --- PASS: TestLogLevelFlags (0.00s)
> === RUN   TestClientKeyPassphraseChange
> --- PASS: TestClientKeyPassphraseChange (0.17s)
> === RUN   TestPurgeSingleKey
> Removal of the following keys from all delegations in gun staged for next publish:
> 	- c3cbde94df3b421a82caf8a07dc88d459b42c6ab2b183dc68da9d71c1408c684
> --- PASS: TestPurgeSingleKey (0.12s)
> === RUN   TestWitness
> time="2020-03-22T08:31:16Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation"
> time="2020-03-22T08:31:16Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation"
> time="2020-03-22T08:31:17Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation"
> time="2020-03-22T08:31:17Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation"
> time="2020-03-22T08:31:17Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2020-03-22T08:31:17Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2020-03-22T08:31:17Z" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation"
> --- PASS: TestWitness (0.40s)
> === RUN   TestClientTUFInitWithAutoPublish
> time="2020-03-22T08:31:17Z" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get \"https://notary-server-on-the-moon:12306/v2/\": dial tcp: lookup notary-server-on-the-moon on 172.31.0.2:53: no such host"
> --- PASS: TestClientTUFInitWithAutoPublish (0.18s)
> === RUN   TestClientTUFAddWithAutoPublish
> time="2020-03-22T08:31:17Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> time="2020-03-22T08:31:17Z" level=error msg="Could not publish Repository since we could not update: client is offline"
> time="2020-03-22T08:31:17Z" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get \"https://notary-server-on-the-moon:12306/v2/\": dial tcp: lookup notary-server-on-the-moon on 172.31.0.2:53: no such host"
> time="2020-03-22T08:31:17Z" level=error msg="Could not publish Repository since we could not update: client is offline"
> --- PASS: TestClientTUFAddWithAutoPublish (0.09s)
> === RUN   TestClientTUFRemoveWithAutoPublish
> --- PASS: TestClientTUFRemoveWithAutoPublish (0.27s)
> === RUN   TestClientDelegationAddWithAutoPublish
> --- PASS: TestClientDelegationAddWithAutoPublish (0.11s)
> === RUN   TestClientDelegationRemoveWithAutoPublish
> time="2020-03-22T08:31:17Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2020-03-22T08:31:17Z" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> --- PASS: TestClientDelegationRemoveWithAutoPublish (0.18s)
> === RUN   TestClientTUFAddByHashWithAutoPublish
> --- PASS: TestClientTUFAddByHashWithAutoPublish (0.09s)
> === RUN   TestClientKeyImport
> time="2020-03-22T08:31:18Z" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header"
> time="2020-03-22T08:31:18Z" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to"
> --- PASS: TestClientKeyImport (0.04s)
> === RUN   TestAddDelImportKeyPublishFlow
> time="2020-03-22T08:31:18Z" level=error msg="couldn't add target to targets/releases: could not find necessary signing keys, at least one of these keys must be available: 0570f9fdca00bdaf62f3f79bf84e70748ba2c8bff926f20dd996bac49e6164fc"
> --- PASS: TestAddDelImportKeyPublishFlow (0.23s)
> === RUN   TestExportImportFlow
> --- PASS: TestExportImportFlow (0.06s)
> === RUN   TestDelegationKeyImportExport
> --- PASS: TestDelegationKeyImportExport (0.01s)
> === RUN   TestImportKeysNoYubikey
> --- PASS: TestImportKeysNoYubikey (0.01s)
> === RUN   TestExportImportKeysNoYubikey
> --- PASS: TestExportImportKeysNoYubikey (0.01s)
> === RUN   TestRemoveIfNoKey
> --- PASS: TestRemoveIfNoKey (0.00s)
> === RUN   TestRemoveOneKeyAbort
> --- PASS: TestRemoveOneKeyAbort (0.02s)
> === RUN   TestRemoveOneKeyConfirm
> --- PASS: TestRemoveOneKeyConfirm (0.01s)
> === RUN   TestRemoveMultikeysInvalidInput
> --- PASS: TestRemoveMultikeysInvalidInput (0.02s)
> === RUN   TestRemoveMultikeysAbortChoice
> --- PASS: TestRemoveMultikeysAbortChoice (0.01s)
> === RUN   TestRemoveMultikeysRemoveOnlyChosenKey
> --- PASS: TestRemoveMultikeysRemoveOnlyChosenKey (0.01s)
> === RUN   TestRotateKeyInvalidRoles
> time="2020-03-22T08:31:18Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> time="2020-03-22T08:31:18Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> time="2020-03-22T08:31:18Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> time="2020-03-22T08:31:18Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> --- PASS: TestRotateKeyInvalidRoles (0.01s)
> === RUN   TestRotateKeyTargetCannotBeServerManaged
> time="2020-03-22T08:31:18Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> --- PASS: TestRotateKeyTargetCannotBeServerManaged (0.00s)
> === RUN   TestRotateKeyTimestampCannotBeLocallyManaged
> time="2020-03-22T08:31:18Z" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on 172.31.0.2:53: no such host"
> --- PASS: TestRotateKeyTimestampCannotBeLocallyManaged (0.00s)
> === RUN   TestRotateKeyNoGUN
> Usage:
> --- PASS: TestRotateKeyNoGUN (0.00s)
> === RUN   TestRotateKeyRemoteServerManagesKey
> Successfully rotated snapshot key for repository docker.com/notary
> Successfully rotated timestamp key for repository docker.com/notary
> --- PASS: TestRotateKeyRemoteServerManagesKey (0.12s)
> === RUN   TestRotateKeyBothKeys
> Successfully rotated targets key for repository docker.com/notary
> Successfully rotated snapshot key for repository docker.com/notary
> --- PASS: TestRotateKeyBothKeys (0.10s)
> === RUN   TestRotateKeyRootIsInteractive
> --- PASS: TestRotateKeyRootIsInteractive (0.04s)
> === RUN   TestChangeKeyPassphraseInvalidID
> --- PASS: TestChangeKeyPassphraseInvalidID (0.00s)
> === RUN   TestChangeKeyPassphraseInvalidNumArgs
> Usage:
> --- PASS: TestChangeKeyPassphraseInvalidNumArgs (0.00s)
> === RUN   TestChangeKeyPassphraseNonexistentID
> --- PASS: TestChangeKeyPassphraseNonexistentID (0.00s)
> === RUN   TestExportKeys
> --- PASS: TestExportKeys (0.00s)
> === RUN   TestExportKeysByGUN
> --- PASS: TestExportKeysByGUN (0.00s)
> === RUN   TestExportKeysByID
> --- PASS: TestExportKeysByID (0.00s)
> === RUN   TestExportKeysBadFlagCombo
> --- PASS: TestExportKeysBadFlagCombo (0.00s)
> === RUN   TestImportKeysNonexistentFile
> --- PASS: TestImportKeysNonexistentFile (0.00s)
> === RUN   TestKeyGeneration
> time="2020-03-22T08:31:18Z" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to"
> --- PASS: TestKeyGeneration (0.02s)
> === RUN   TestNotaryConfigFileDefault
> --- PASS: TestNotaryConfigFileDefault (0.00s)
> === RUN   TestRemoteServerDefault
> --- PASS: TestRemoteServerDefault (0.00s)
> === RUN   TestRemoteServerUsesConfigFile
> --- PASS: TestRemoteServerUsesConfigFile (0.00s)
> === RUN   TestRemoteServerCommandLineFlagOverridesConfig
> --- PASS: TestRemoteServerCommandLineFlagOverridesConfig (0.00s)
> === RUN   TestInvalidAddHashCommands
> --- PASS: TestInvalidAddHashCommands (0.00s)
> === RUN   TestConfigParsingErrorsPropagatedByCommands
> --- PASS: TestConfigParsingErrorsPropagatedByCommands (0.00s)
> === RUN   TestInsufficientArgumentsReturnsErrorAndPrintsUsage
> --- PASS: TestInsufficientArgumentsReturnsErrorAndPrintsUsage (0.01s)
> === RUN   TestBareCommandPrintsUsageAndNoError
> --- PASS: TestBareCommandPrintsUsageAndNoError (0.00s)
> === RUN   TestConfigFileTLSCannotBeRelativeToCWD
> --- PASS: TestConfigFileTLSCannotBeRelativeToCWD (0.00s)
> === RUN   TestConfigFileTLSCanBeRelativeToConfigOrAbsolute
> --- PASS: TestConfigFileTLSCanBeRelativeToConfigOrAbsolute (0.02s)
> === RUN   TestConfigFileOverridenByCmdLineFlags
> --- PASS: TestConfigFileOverridenByCmdLineFlags (0.03s)
> === RUN   TestConfigFileTrustPinning
> --- PASS: TestConfigFileTrustPinning (0.00s)
> === RUN   TestPassphraseRetrieverCaching
> --- PASS: TestPassphraseRetrieverCaching (0.00s)
> === RUN   TestPassphraseRetrieverDelegationRoleCaching
> --- PASS: TestPassphraseRetrieverDelegationRoleCaching (0.00s)
> === RUN   TestTruncateWithEllipsis
> --- PASS: TestTruncateWithEllipsis (0.00s)
> === RUN   TestKeyInfoSorter
> --- PASS: TestKeyInfoSorter (0.00s)
> === RUN   TestPrettyPrintZeroKeys
> --- PASS: TestPrettyPrintZeroKeys (0.00s)
> === RUN   TestPrettyPrintRootAndSigningKeys
> --- PASS: TestPrettyPrintRootAndSigningKeys (0.05s)
> === RUN   TestPrettyPrintZeroTargets
> --- PASS: TestPrettyPrintZeroTargets (0.00s)
> === RUN   TestPrettyPrintSortedTargets
> --- PASS: TestPrettyPrintSortedTargets (0.00s)
> === RUN   TestPrettyPrintZeroRoles
> --- PASS: TestPrettyPrintZeroRoles (0.00s)
> === RUN   TestPrettyPrintSortedRoles
> --- PASS: TestPrettyPrintSortedRoles (0.00s)
> === RUN   TestImportRootCert
> --- PASS: TestImportRootCert (0.00s)
> === RUN   TestTokenAuth
> time="2020-03-22T08:31:18Z" level=error msg="could not reach https://localhost:9999: Get \"https://localhost:9999/v2/\": dial tcp [::1]:9999: connect: connection refused"
> --- PASS: TestTokenAuth (0.00s)
> === RUN   TestAdminTokenAuth
> time="2020-03-22T08:31:18Z" level=error msg="could not reach https://localhost:9999: Get \"https://localhost:9999/v2/\": dial tcp [::1]:9999: connect: connection refused"
> --- PASS: TestAdminTokenAuth (0.00s)
> === RUN   TestTokenAuth200Status
> --- PASS: TestTokenAuth200Status (0.00s)
> === RUN   TestAdminTokenAuth200Status
> --- PASS: TestAdminTokenAuth200Status (0.01s)
> === RUN   TestTokenAuth401Status
> --- PASS: TestTokenAuth401Status (0.00s)
> === RUN   TestAdminTokenAuth401Status
> --- PASS: TestAdminTokenAuth401Status (0.00s)
> === RUN   TestTokenAuthNon200Non401Status
> time="2020-03-22T08:31:18Z" level=error msg="could not reach http://127.0.0.1:34917: 404"
> --- PASS: TestTokenAuthNon200Non401Status (0.00s)
> === RUN   TestAdminTokenAuthNon200Non401Status
> time="2020-03-22T08:31:18Z" level=error msg="could not reach http://127.0.0.1:46311: 404"
> --- PASS: TestAdminTokenAuthNon200Non401Status (0.00s)
> === RUN   TestConfigureRepo
> --- PASS: TestConfigureRepo (0.00s)
> === RUN   TestConfigureRepoRW
> Enter username: time="2020-03-22T08:31:18Z" level=error msg="error processing username input: EOF"
> --- PASS: TestConfigureRepoRW (0.00s)
> === RUN   TestConfigureRepoAdmin
> Enter username: time="2020-03-22T08:31:18Z" level=error msg="error processing username input: EOF"
> --- PASS: TestConfigureRepoAdmin (0.00s)
> === RUN   TestStatusUnstageAndReset
> Successfully reset specified changes for repository gun
> Addition of target "test1" by sha256 hash to repository "gun" staged for next publish.
> Addition of target "test2" by sha256 hash to repository "gun" staged for next publish.
> Addition of target "test3" by sha256 hash to repository "gun" staged for next publish.
> Addition of target "test4" by sha256 hash to repository "gun" staged for next publish.
> --- PASS: TestStatusUnstageAndReset (0.01s)
> === RUN   TestGetTrustPinningErrors
> Pushing changes to gun
> --- PASS: TestGetTrustPinningErrors (0.00s)
> === RUN   TestPasswordStore
> Enter username: time="2020-03-22T08:31:18Z" level=error msg="error processing username input: EOF"
> --- PASS: TestPasswordStore (0.00s)
> === RUN   TestPasswordStoreWithEnvvar
> time="2020-03-22T08:31:18Z" level=error msg="Authentication string with zero-legnth username"
> time="2020-03-22T08:31:18Z" level=error msg="Could not base64-decode authentication string"
> --- PASS: TestPasswordStoreWithEnvvar (0.00s)
> === RUN   TestGetPayload
> --- PASS: TestGetPayload (0.00s)
> === RUN   TestFeedback
> --- PASS: TestFeedback (0.00s)
> === RUN   TestHomeExpand
> --- PASS: TestHomeExpand (0.00s)
> PASS
> ok  	github.com/theupdateframework/notary/cmd/notary	5.620s
> === RUN   TestBootstrap
> --- PASS: TestBootstrap (0.00s)
> === RUN   TestGetAddrAndTLSConfigInvalidTLS
> --- PASS: TestGetAddrAndTLSConfigInvalidTLS (0.00s)
> === RUN   TestGetAddrAndTLSConfigNoHTTPAddr
> --- PASS: TestGetAddrAndTLSConfigNoHTTPAddr (0.00s)
> === RUN   TestGetAddrAndTLSConfigSuccessWithTLS
> --- PASS: TestGetAddrAndTLSConfigSuccessWithTLS (0.00s)
> === RUN   TestGetAddrAndTLSConfigSuccessWithoutTLS
> --- PASS: TestGetAddrAndTLSConfigSuccessWithoutTLS (0.00s)
> === RUN   TestGetAddrAndTLSConfigWithClientTLS
> --- PASS: TestGetAddrAndTLSConfigWithClientTLS (0.00s)
> === RUN   TestGetInvalidTrustService
> --- PASS: TestGetInvalidTrustService (0.00s)
> === RUN   TestGetLocalTrustService
> time="2020-03-22T08:31:15Z" level=info msg="Using local signing service, which requires ED25519. Ignoring all other trust_service parameters, including keyAlgorithm"
> --- PASS: TestGetLocalTrustService (0.00s)
> === RUN   TestGetTrustServiceInvalidKeyAlgorithm
> --- PASS: TestGetTrustServiceInvalidKeyAlgorithm (0.00s)
> === RUN   TestGetTrustServiceTLSMissingCertOrKey
> --- PASS: TestGetTrustServiceTLSMissingCertOrKey (0.00s)
> === RUN   TestGetTrustServiceNoTLSConfig
> time="2020-03-22T08:31:15Z" level=info msg="Using remote signing service"
> --- PASS: TestGetTrustServiceNoTLSConfig (0.00s)
> === RUN   TestGetTrustServiceTLSSuccess
> time="2020-03-22T08:31:15Z" level=info msg="Using remote signing service"
> --- PASS: TestGetTrustServiceTLSSuccess (0.00s)
> === RUN   TestGetTrustServiceTLSFailure
> --- PASS: TestGetTrustServiceTLSFailure (0.00s)
> === RUN   TestGetStoreInvalid
> time="2020-03-22T08:31:15Z" level=info msg="Using asdf backend"
> --- PASS: TestGetStoreInvalid (0.00s)
> === RUN   TestGetStoreDBStore
> time="2020-03-22T08:31:15Z" level=info msg="Using sqlite3 backend"
> --- PASS: TestGetStoreDBStore (0.00s)
> === RUN   TestGetStoreRethinkDBStoreConnectionFails
> time="2020-03-22T08:31:15Z" level=info msg="Using rethinkdb backend"
> --- PASS: TestGetStoreRethinkDBStoreConnectionFails (0.00s)
> === RUN   TestGetMemoryStore
> time="2020-03-22T08:31:15Z" level=info msg="Using memory backend"
> --- PASS: TestGetMemoryStore (0.00s)
> === RUN   TestGetCacheConfig
> --- PASS: TestGetCacheConfig (0.00s)
> === RUN   TestGetGUNPRefixes
> --- PASS: TestGetGUNPRefixes (0.00s)
> === RUN   TestSampleConfig
> time="2020-03-22T08:31:15Z" level=info msg="Using remote signing service"
> time="2020-03-22T08:31:15Z" level=info msg="Using sqlite3 backend"
> --- PASS: TestSampleConfig (0.00s)
> PASS
> ok  	github.com/theupdateframework/notary/cmd/notary-server	0.018s
> === RUN   TestGetAddrAndTLSConfigInvalidTLS
> --- PASS: TestGetAddrAndTLSConfigInvalidTLS (0.00s)
> === RUN   TestGetAddrAndTLSConfigNoGRPCAddr
> --- PASS: TestGetAddrAndTLSConfigNoGRPCAddr (0.00s)
> === RUN   TestGetAddrAndTLSConfigSuccess
> --- PASS: TestGetAddrAndTLSConfigSuccess (0.00s)
> === RUN   TestSetupCryptoServicesDBStoreNoDefaultAlias
> --- PASS: TestSetupCryptoServicesDBStoreNoDefaultAlias (0.00s)
> === RUN   TestSetupCryptoServicesRethinkDBStoreNoDefaultAlias
> --- PASS: TestSetupCryptoServicesRethinkDBStoreNoDefaultAlias (0.00s)
> === RUN   TestSetupCryptoServicesRethinkDBStoreConnectionFails
>     TestSetupCryptoServicesRethinkDBStoreConnectionFails: main_test.go:121: DM - skipping malfunctioning test, fails on sbuild
> --- SKIP: TestSetupCryptoServicesRethinkDBStoreConnectionFails (0.00s)
> === RUN   TestSetupCryptoServicesDBStoreSuccess
> --- PASS: TestSetupCryptoServicesDBStoreSuccess (0.08s)
> === RUN   TestSetupCryptoServicesMemoryStore
> --- PASS: TestSetupCryptoServicesMemoryStore (0.01s)
> === RUN   TestSetupCryptoServicesInvalidStore
> --- PASS: TestSetupCryptoServicesInvalidStore (0.00s)
> === RUN   TestSetupGRPCServerInvalidAddress
> --- PASS: TestSetupGRPCServerInvalidAddress (0.00s)
> === RUN   TestSetupGRPCServerSuccess
> --- PASS: TestSetupGRPCServerSuccess (0.00s)
> === RUN   TestBootstrap
> --- PASS: TestBootstrap (0.00s)
> === RUN   TestGetEnv
> --- PASS: TestGetEnv (0.00s)
> === RUN   TestPassphraseRetrieverInvalid
> --- PASS: TestPassphraseRetrieverInvalid (0.00s)
> === RUN   TestSampleConfig
> --- PASS: TestSampleConfig (0.00s)
> PASS
> ok  	github.com/theupdateframework/notary/cmd/notary-signer	0.108s
> === RUN   TestGenerateCertificate
> --- PASS: TestGenerateCertificate (0.01s)
> === RUN   TestCryptoServiceWithNonEmptyGUN
> --- PASS: TestCryptoServiceWithNonEmptyGUN (0.72s)
> === RUN   TestCryptoServiceWithEmptyGUN
> --- PASS: TestCryptoServiceWithEmptyGUN (0.78s)
> === RUN   TestCryptoSignerInterfaceBehavior
> --- PASS: TestCryptoSignerInterfaceBehavior (0.00s)
> PASS
> ok  	github.com/theupdateframework/notary/cryptoservice	1.515s
> === RUN   TestGetPassphraseForUsingDelegationKey
> --- PASS: TestGetPassphraseForUsingDelegationKey (0.00s)
> === RUN   TestGetPassphraseLimitsShortPassphrases
> --- PASS: TestGetPassphraseLimitsShortPassphrases (0.00s)
> === RUN   TestGetPassphraseLimitsMismatchingPassphrases
> --- PASS: TestGetPassphraseLimitsMismatchingPassphrases (0.00s)
> === RUN   TestGetPassphraseForCreatingDelegationKey
> --- PASS: TestGetPassphraseForCreatingDelegationKey (0.00s)
> === RUN   TestRolePromptingAndCaching
> --- PASS: TestRolePromptingAndCaching (0.00s)
> === RUN   TestPromptRetrieverNeedsTerminal
> --- PASS: TestPromptRetrieverNeedsTerminal (0.00s)
> === RUN   TestGetPassphrase
> --- PASS: TestGetPassphrase (0.00s)
> PASS
> ok  	github.com/theupdateframework/notary/passphrase	0.009s
> ?   	github.com/theupdateframework/notary/proto	[no test files]
> === RUN   TestValidationErrorFormat
> time="2020-03-22T08:31:18Z" level=info msg="invalid update: Update sent by the client is invalid.: &{ErrBadHierarchy Metadata hierarchy is incomplete: no snapshot was included in update and server does not hold current snapshot key for repository}" go.version=go1.14.1 http.request.contenttype="multipart/form-data; boundary=83e263a6dd944aef8af58f36b41d833c4a804aeff2a19ee5eb60b57e9af1" http.request.host="127.0.0.1:42045" http.request.id=a6146bdc-ee67-4804-a789-ad7fbe4debcc http.request.method=POST http.request.remoteaddr="127.0.0.1:54548" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.contenttype="multipart/form-data; boundary=83e263a6dd944aef8af58f36b41d833c4a804aeff2a19ee5eb60b57e9af1" http.request.host="127.0.0.1:42045" http.request.id=a6146bdc-ee67-4804-a789-ad7fbe4debcc http.request.method=POST http.request.remoteaddr="127.0.0.1:54548" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration=2.181672ms http.response.status=400 http.response.written=260
> --- PASS: TestValidationErrorFormat (0.03s)
> === RUN   TestRunBadAddr
> --- PASS: TestRunBadAddr (0.00s)
> === RUN   TestRunReservedPort
> --- PASS: TestRunReservedPort (0.00s)
> === RUN   TestRepoPrefixMatches
> time="2020-03-22T08:31:18Z" level=info msg="updated docker.io/notary to timestamp version 1, checksum d7fda26fe63fd458ede329abe90f77130e21a51daad393dbca4fe173626dd8ac" docker.io/notary=gun go.version=go1.14.1 http.request.contenttype="multipart/form-data; boundary=5fcd1260b7577836381c4b02f27b78d824347dd1fbea30cf5f432e907bdc" http.request.host="127.0.0.1:34835" http.request.id=26b1a91e-de92-4d8b-b5e4-914949a43a16 http.request.method=POST http.request.remoteaddr="127.0.0.1:52458" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.contenttype="multipart/form-data; boundary=5fcd1260b7577836381c4b02f27b78d824347dd1fbea30cf5f432e907bdc" http.request.host="127.0.0.1:34835" http.request.id=26b1a91e-de92-4d8b-b5e4-914949a43a16 http.request.method=POST http.request.remoteaddr="127.0.0.1:52458" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration=1.853309ms http.response.status=0 http.response.written=0
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:34835" http.request.id=ab985889-d8c1-4f9d-b09f-e708fde628c7 http.request.method=GET http.request.remoteaddr="127.0.0.1:52458" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.json http.request.useragent=Go-http-client/1.1 http.response.duration="246.746µs" http.response.status=200 http.response.written=683
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:34835" http.request.id=02fe480d-38a1-4660-94db-443f4b298e1c http.request.method=GET http.request.remoteaddr="127.0.0.1:52458" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.7eb810365073c69c61e2194dc562662d5b698d5ca5d71a11f557fb0735f5eefc.json http.request.useragent=Go-http-client/1.1 http.response.duration="19.001µs" http.response.status=200 http.response.written=683
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:34835" http.request.id=73f44121-43a8-44cd-957e-21f9f736614b http.request.method=GET http.request.remoteaddr="127.0.0.1:52458" http.request.uri=/v2/docker.io/notary/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="286.126µs" http.response.status=200 http.response.written=181
> time="2020-03-22T08:31:18Z" level=info msg="trust data deleted for docker.io/notary" docker.io/notary=gun go.version=go1.14.1 http.request.host="127.0.0.1:34835" http.request.id=58611095-e218-4993-bb11-d6ba383084c1 http.request.method=DELETE http.request.remoteaddr="127.0.0.1:52458" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:34835" http.request.id=58611095-e218-4993-bb11-d6ba383084c1 http.request.method=DELETE http.request.remoteaddr="127.0.0.1:52458" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration="46.278µs" http.response.status=0 http.response.written=0
> --- PASS: TestRepoPrefixMatches (0.01s)
> === RUN   TestRepoPrefixDoesNotMatch
> --- PASS: TestRepoPrefixDoesNotMatch (0.02s)
> === RUN   TestMetricsEndpoint
> --- PASS: TestMetricsEndpoint (0.00s)
> === RUN   TestGetKeysEndpoint
> time="2020-03-22T08:31:18Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.14.1 http.request.host="127.0.0.1:36357" http.request.id=bc7664bb-8633-4fb5-9fc4-4ac0f4903727 http.request.method=GET http.request.remoteaddr="127.0.0.1:33834" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:36357" http.request.id=bc7664bb-8633-4fb5-9fc4-4ac0f4903727 http.request.method=GET http.request.remoteaddr="127.0.0.1:33834" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="99.508µs" http.response.status=404 http.response.written=104
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:36357" http.request.id=48b95c12-0834-4b22-9aa3-1d8d5527693d http.request.method=GET http.request.remoteaddr="127.0.0.1:33838" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="175.468µs" http.response.status=200 http.response.written=103
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:36357" http.request.id=2f61b884-962e-4290-92b2-6a2207320651 http.request.method=GET http.request.remoteaddr="127.0.0.1:33842" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="110.253µs" http.response.status=200 http.response.written=103
> time="2020-03-22T08:31:18Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.14.1 http.request.host="127.0.0.1:36357" http.request.id=97cc0cc5-35c6-4c65-81c2-395d66ff5f36 http.request.method=GET http.request.remoteaddr="127.0.0.1:33844" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:36357" http.request.id=97cc0cc5-35c6-4c65-81c2-395d66ff5f36 http.request.method=GET http.request.remoteaddr="127.0.0.1:33844" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="86.039µs" http.response.status=404 http.response.written=104
> time="2020-03-22T08:31:18Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.14.1 http.request.host="127.0.0.1:36357" http.request.id=60fb59b0-b150-4bef-b5ec-93ce0f5b7cb6 http.request.method=GET http.request.remoteaddr="127.0.0.1:33846" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:36357" http.request.id=60fb59b0-b150-4bef-b5ec-93ce0f5b7cb6 http.request.method=GET http.request.remoteaddr="127.0.0.1:33846" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="89.065µs" http.response.status=404 http.response.written=104
> --- PASS: TestGetKeysEndpoint (0.01s)
> === RUN   TestGetRoleByHash
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:39767" http.request.id=610450b9-261b-4e8f-aa6f-d5cd9cfd81ec http.request.method=GET http.request.remoteaddr="127.0.0.1:56018" http.request.uri=/v2/gun/_trust/tuf/timestamp.1dbad64a72a276191ee32ccdd4cb7c70f17e54376486d9875333a16c300e72dc.json http.request.useragent=Go-http-client/1.1 http.response.duration="41.673µs" http.response.status=200 http.response.written=114
> --- PASS: TestGetRoleByHash (0.00s)
> === RUN   TestGetRoleByVersion
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:46021" http.request.id=b230d509-00d7-4771-8a39-fac5b0987384 http.request.method=GET http.request.remoteaddr="127.0.0.1:41598" http.request.uri=/v2/gun/_trust/tuf/1.timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration="65.893µs" http.response.status=200 http.response.written=115
> --- PASS: TestGetRoleByVersion (0.00s)
> === RUN   TestGetCurrentRole
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:37271" http.request.id=6932b429-a0be-48b3-845d-21832120f96e http.request.method=GET http.request.remoteaddr="127.0.0.1:36418" http.request.uri=/v2/gun/_trust/tuf/timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration="269.859µs" http.response.status=200 http.response.written=495
> --- PASS: TestGetCurrentRole (0.00s)
> === RUN   TestRotateKeyEndpoint
> time="2020-03-22T08:31:18Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=67117e65-2049-4144-9c1f-8e76f11a9999 http.request.method=POST http.request.remoteaddr="127.0.0.1:58266" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=67117e65-2049-4144-9c1f-8e76f11a9999 http.request.method=POST http.request.remoteaddr="127.0.0.1:58266" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="117.967µs" http.response.status=404 http.response.written=104
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=e41551b2-e974-4c01-99d9-0bc1d3c7870b http.request.method=POST http.request.remoteaddr="127.0.0.1:58268" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="184.431µs" http.response.status=200 http.response.written=103
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=da269f53-7e02-4452-b343-5510c1a3900e http.request.method=POST http.request.remoteaddr="127.0.0.1:58270" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="165.379µs" http.response.status=200 http.response.written=103
> time="2020-03-22T08:31:18Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=9ced0bdf-afec-4808-bfb4-10be57b50e16 http.request.method=POST http.request.remoteaddr="127.0.0.1:58272" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=9ced0bdf-afec-4808-bfb4-10be57b50e16 http.request.method=POST http.request.remoteaddr="127.0.0.1:58272" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="83.411µs" http.response.status=404 http.response.written=104
> time="2020-03-22T08:31:18Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=75ef5f00-626d-4a2b-920d-2542f62d7523 http.request.method=POST http.request.remoteaddr="127.0.0.1:58280" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=75ef5f00-626d-4a2b-920d-2542f62d7523 http.request.method=POST http.request.remoteaddr="127.0.0.1:58280" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="72.22µs" http.response.status=404 http.response.written=104
> time="2020-03-22T08:31:18Z" level=info msg="metadata not found: You have requested metadata that does not exist.: <nil>" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=c5ea3343-7b36-48dd-bce2-f9ec512b2471 http.request.method=POST http.request.remoteaddr="127.0.0.1:58282" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.contenttype=text/plain http.request.host="127.0.0.1:41349" http.request.id=c5ea3343-7b36-48dd-bce2-f9ec512b2471 http.request.method=POST http.request.remoteaddr="127.0.0.1:58282" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="77.395µs" http.response.status=404 http.response.written=104
> --- PASS: TestRotateKeyEndpoint (0.01s)
> PASS
> ok  	github.com/theupdateframework/notary/server	0.099s
> ?   	github.com/theupdateframework/notary/server/errors	[no test files]
> === RUN   Test_changefeed
> --- PASS: Test_changefeed (0.00s)
> === RUN   Test_checkChangefeedInputs
> time="2020-03-22T08:31:18Z" level=error msg="500 GET unable to retrieve storage"
> time="2020-03-22T08:31:18Z" level=error msg="400 GET invalid pageSize: not_a_number"
> --- PASS: Test_checkChangefeedInputs (0.00s)
> === RUN   TestMainHandlerGet
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:42363" http.request.id=6051da3c-8110-41af-b846-477ea3973296 http.request.method=GET http.request.remoteaddr="127.0.0.1:56348" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.duration="63.317µs" http.response.status=200 http.response.written=2
> --- PASS: TestMainHandlerGet (0.00s)
> === RUN   TestMainHandlerNotGet
> time="2020-03-22T08:31:18Z" level=info msg="generic not found: You have requested a resource that does not exist.: <nil>" go.version=go1.14.1 http.request.host="127.0.0.1:40991" http.request.id=34774eb9-10dc-4c04-8dc5-45c76d34308d http.request.method=HEAD http.request.remoteaddr="127.0.0.1:49790" http.request.uri=/ http.request.useragent=Go-http-client/1.1
> time="2020-03-22T08:31:18Z" level=info msg="response completed" go.version=go1.14.1 http.request.host="127.0.0.1:40991" http.request.id=34774eb9-10dc-4c04-8dc5-45c76d34308d http.request.method=HEAD http.request.remoteaddr="127.0.0.1:49790" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="166.266µs" http.response.status=404 http.response.written=105
> --- PASS: TestMainHandlerNotGet (0.00s)
> === RUN   TestKeyHandlersInvalidConfiguration
> time="2020-03-22T08:31:18Z" level=error msg="500 GET storage not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 GET storage not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 GET crypto service not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 GET crypto service not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 GET key algorithm not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 GET key algorithm not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 POST storage not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 POST storage not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 POST crypto service not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 POST crypto service not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 POST key algorithm not configured" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 POST key algorithm not configured" go.version=go1.14.1 gun=gun
> --- PASS: TestKeyHandlersInvalidConfiguration (0.00s)
> === RUN   TestKeyHandlersNoRoleOrRepo
> time="2020-03-22T08:31:18Z" level=info msg="400 GET no gun in request" =gun go.version=go1.14.1
> time="2020-03-22T08:31:18Z" level=info msg="400 GET no gun in request" =gun go.version=go1.14.1
> time="2020-03-22T08:31:18Z" level=info msg="400 GET no role in request" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 GET no role in request" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 POST no gun in request" =gun go.version=go1.14.1
> time="2020-03-22T08:31:18Z" level=info msg="400 POST no gun in request" =gun go.version=go1.14.1
> time="2020-03-22T08:31:18Z" level=info msg="400 POST no role in request" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 POST no role in request" go.version=go1.14.1 gun=gun
> --- PASS: TestKeyHandlersNoRoleOrRepo (0.00s)
> === RUN   TestKeyHandlersInvalidRole
> time="2020-03-22T08:31:18Z" level=info msg="400 GET root key: <nil>" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 GET targets key: <nil>" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 GET targets/a key: <nil>" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 GET invalidrole key: <nil>" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 POST root key: <nil>" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 POST targets key: <nil>" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 POST targets/a key: <nil>" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=info msg="400 POST invalidrole key: <nil>" go.version=go1.14.1 gun=gun
> --- PASS: TestKeyHandlersInvalidRole (0.00s)
> === RUN   TestGetKeyHandlerCreatesOnce
> --- PASS: TestGetKeyHandlerCreatesOnce (0.00s)
> === RUN   TestKeyHandlersInvalidKeyAlgo
> time="2020-03-22T08:31:18Z" level=error msg="500 GET timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 GET snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 POST timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.14.1 gun=gun
> time="2020-03-22T08:31:18Z" level=error msg="500 POST snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.14.1 gun=gun
> --- PASS: TestKeyHandlersInvalidKeyAlgo (0.00s)
> === RUN   TestRotateKeyHandlerSuccessfulRotation
> --- PASS: TestRotateKeyHandlerSuccessfulRotation (0.00s)
> === RUN   TestGetHandlerRoot
> time="2020-03-22T08:31:18Z" level=info msg="404 GET root role" go.version=go1.14.1 gun=gun
> --- PASS: TestGetHandlerRoot (0.01s)
> === RUN   TestGetHandlerTimestamp
> --- PASS: TestGetHandlerTimestamp (0.01s)
> === RUN   TestGetHandlerSnapshot
> --- PASS: TestGetHandlerSnapshot (0.00s)
> === RUN   TestGetHandler404
> time="2020-03-22T08:31:18Z" level=info msg="404 GET root role" go.version=go1.14.1 gun=gun
> --- PASS: TestGetHandler404 (0.00s)
> === RUN   TestGetHandlerNilData
> time="2020-03-22T08:31:18Z" level=info msg="404 GET root role" go.version=go1.14.1 gun=gun
> --- PASS: TestGetHandlerNilData (0.00s)
> === RUN   TestGetHandlerNoStorage
> time="2020-03-22T08:31:18Z" level=error msg="500 GET: no storage exists" =gun go.version=go1.14.1
> --- PASS: TestGetHandlerNoStorage (0.00s)
> === RUN   TestAtomicUpdateValidationFailurePropagated
> --- PASS: TestAtomicUpdateValidationFailurePropagated (0.02s)
> === RUN   TestAtomicUpdateNonValidationFailureNotPropagated
> time="2020-03-22T08:31:18Z" level=info msg="400 POST error validating update" go.version=go1.14.1 testGUN=gun
> --- PASS: TestAtomicUpdateNonValidationFailureNotPropagated (0.01s)
> === RUN   TestAtomicUpdateVersionErrorPropagated
> time="2020-03-22T08:31:18Z" level=info msg="400 POST old version error" go.version=go1.14.1 testGUN=gun
> --- PASS: TestAtomicUpdateVersionErrorPropagated (0.02s)
> === RUN   TestGetMaybeServerSignedNoCrypto
> --- PASS: TestGetMaybeServerSignedNoCrypto (0.00s)
> === RUN   TestGetMaybeServerSignedNoKey
> --- PASS: TestGetMaybeServerSignedNoKey (0.00s)
> === RUN   TestValidateEmptyNew
> --- PASS: TestValidateEmptyNew (0.01s)
> === RUN   TestValidateRootCanContainOnlyx509KeysWithRightGun
> --- PASS: TestValidateRootCanContainOnlyx509KeysWithRightGun (0.01s)
> === RUN   TestValidatePrevTimestamp
> --- PASS: TestValidatePrevTimestamp (0.01s)
> === RUN   TestValidatePreviousTimestampCorrupt
> time="2020-03-22T08:31:18Z" level=error msg="Failed to unmarshal existing timestamp for GUN docker.com/notary"
> --- PASS: TestValidatePreviousTimestampCorrupt (0.01s)
> === RUN   TestValidateGetCurrentTimestampBroken
> --- PASS: TestValidateGetCurrentTimestampBroken (0.01s)
> === RUN   TestValidateNoNewRoot
> --- PASS: TestValidateNoNewRoot (0.01s)
> === RUN   TestValidateNoNewTargets
> --- PASS: TestValidateNoNewTargets (0.02s)
> === RUN   TestValidateOnlySnapshot
> --- PASS: TestValidateOnlySnapshot (0.01s)
> === RUN   TestValidateOldRoot
> --- PASS: TestValidateOldRoot (0.02s)
> === RUN   TestValidateOldRootCorrupt
> --- PASS: TestValidateOldRootCorrupt (0.01s)
> === RUN   TestValidateOldRootCorruptRootRole
> --- PASS: TestValidateOldRootCorruptRootRole (0.01s)
> === RUN   TestValidateRootGetCurrentRootBroken
> --- PASS: TestValidateRootGetCurrentRootBroken (0.01s)
> === RUN   TestValidateRootRotationWithOldSigs
> --- PASS: TestValidateRootRotationWithOldSigs (0.03s)
> === RUN   TestValidateRootRotationMultipleKeysThreshold1
> --- PASS: TestValidateRootRotationMultipleKeysThreshold1 (0.02s)
> === RUN   TestRootRotationNotSignedWithOldKeysForOldRole
> --- PASS: TestRootRotationNotSignedWithOldKeysForOldRole (0.02s)
> === RUN   TestRootRotationVersionIncrement
> --- PASS: TestRootRotationVersionIncrement (0.02s)
> === RUN   TestValidateNoRoot
> --- PASS: TestValidateNoRoot (0.02s)
> === RUN   TestValidateSnapshotMissingNoSnapshotKey
> --- PASS: TestValidateSnapshotMissingNoSnapshotKey (0.02s)
> === RUN   TestValidateSnapshotGenerateNoPrev
> --- PASS: TestValidateSnapshotGenerateNoPrev (0.02s)
> === RUN   TestValidateSnapshotGenerateWithPrev
> --- PASS: TestValidateSnapshotGenerateWithPrev (0.02s)
> === RUN   TestValidateSnapshotGeneratePrevCorrupt
> time="2020-03-22T08:31:18Z" level=error msg="Failed to unmarshal existing snapshot for GUN docker.com/notary"
> --- PASS: TestValidateSnapshotGeneratePrevCorrupt (0.01s)
> === RUN   TestValidateSnapshotGenerateStoreGetCurrentSnapshotBroken
> --- PASS: TestValidateSnapshotGenerateStoreGetCurrentSnapshotBroken (0.02s)
> === RUN   TestValidateSnapshotGenerateNoTargets
> --- PASS: TestValidateSnapshotGenerateNoTargets (0.01s)
> === RUN   TestValidateSnapshotGenerate
> --- PASS: TestValidateSnapshotGenerate (0.02s)
> === RUN   TestValidateRootNoTimestampKey
> --- PASS: TestValidateRootNoTimestampKey (0.00s)
> === RUN   TestValidateRootInvalidTimestampKey
> --- PASS: TestValidateRootInvalidTimestampKey (0.00s)
> === RUN   TestValidateRootInvalidTimestampThreshold
> --- PASS: TestValidateRootInvalidTimestampThreshold (0.01s)
> === RUN   TestValidateRootInvalidZeroThreshold
> --- PASS: TestValidateRootInvalidZeroThreshold (0.03s)
> === RUN   TestValidateRootRoleMissing
> --- PASS: TestValidateRootRoleMissing (0.01s)
> === RUN   TestValidateTargetsRoleMissing
> --- PASS: TestValidateTargetsRoleMissing (0.01s)
> === RUN   TestValidateSnapshotRoleMissing
> --- PASS: TestValidateSnapshotRoleMissing (0.01s)
> === RUN   TestValidateRootSigMissing
> --- PASS: TestValidateRootSigMissing (0.01s)
> === RUN   TestValidateTargetsSigMissing
> time="2020-03-22T08:31:19Z" level=error msg="ErrBadTargets: tuf: data has no signatures"
> --- PASS: TestValidateTargetsSigMissing (0.01s)
> === RUN   TestValidateSnapshotSigMissing
> --- PASS: TestValidateSnapshotSigMissing (0.01s)
> === RUN   TestValidateRootCorrupt
> --- PASS: TestValidateRootCorrupt (0.01s)
> === RUN   TestValidateTargetsCorrupt
> time="2020-03-22T08:31:19Z" level=error msg="ErrBadTargets: invalid character '\\u0084' looking for beginning of value"
> --- PASS: TestValidateTargetsCorrupt (0.01s)
> === RUN   TestValidateSnapshotCorrupt
> --- PASS: TestValidateSnapshotCorrupt (0.02s)
> === RUN   TestValidateRootModifiedSize
> --- PASS: TestValidateRootModifiedSize (0.01s)
> === RUN   TestValidateTargetsModifiedSize
> --- PASS: TestValidateTargetsModifiedSize (0.01s)
> === RUN   TestValidateRootModifiedHash
> --- PASS: TestValidateRootModifiedHash (0.01s)
> === RUN   TestValidateTargetsModifiedHash
> --- PASS: TestValidateTargetsModifiedHash (0.01s)
> === RUN   TestGenerateSnapshotRootNotLoaded
> --- PASS: TestGenerateSnapshotRootNotLoaded (0.00s)
> === RUN   TestGenerateSnapshotNoKey
> --- PASS: TestGenerateSnapshotNoKey (0.00s)
> === RUN   TestLoadTargetsLoadsNothingIfNoUpdates
> --- PASS: TestLoadTargetsLoadsNothingIfNoUpdates (0.01s)
> === RUN   TestValidateTargetsRequiresStoredParent
> time="2020-03-22T08:31:19Z" level=error msg="ErrBadTargets: targets must be loaded first"
> --- PASS: TestValidateTargetsRequiresStoredParent (0.00s)
> === RUN   TestValidateTargetsParentInUpdate
> time="2020-03-22T08:31:19Z" level=error msg="ErrBadTargets: invalid character 'I' looking for beginning of value"
> --- PASS: TestValidateTargetsParentInUpdate (0.00s)
> === RUN   TestValidateTargetsRoleNotInParent
> time="2020-03-22T08:31:19Z" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist"
> time="2020-03-22T08:31:19Z" level=error msg="ErrBadTargets: targets has already been loaded"
> time="2020-03-22T08:31:19Z" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist"
> --- PASS: TestValidateTargetsRoleNotInParent (0.01s)
> PASS
> ok  	github.com/theupdateframework/notary/server/handlers	0.637s
> === RUN   TestSnapshotExpired
> --- PASS: TestSnapshotExpired (0.00s)
> === RUN   TestSnapshotNotExpired
> --- PASS: TestSnapshotNotExpired (0.00s)
> === RUN   TestGetSnapshotKeyCreate
> --- PASS: TestGetSnapshotKeyCreate (0.00s)
> === RUN   TestGetSnapshotKeyCreateWithFailingStore
> time="2020-03-22T08:31:19Z" level=error msg="Error when retrieving root role for GUN gun: failing store failed"
> --- PASS: TestGetSnapshotKeyCreateWithFailingStore (0.00s)
> === RUN   TestGetSnapshotKeyCreateWithCorruptedStore
> time="2020-03-22T08:31:19Z" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve snapshot key ID"
> --- PASS: TestGetSnapshotKeyCreateWithCorruptedStore (0.00s)
> === RUN   TestGetSnapshotKeyCreateWithInvalidAlgo
> --- PASS: TestGetSnapshotKeyCreateWithInvalidAlgo (0.00s)
> === RUN   TestGetSnapshotKeyExistingMetadata
> --- PASS: TestGetSnapshotKeyExistingMetadata (0.03s)
> === RUN   TestGetSnapshotNoPreviousSnapshot
> time="2020-03-22T08:31:19Z" level=error msg="Failed to unmarshal existing snapshot for GUN gun"
> --- PASS: TestGetSnapshotNoPreviousSnapshot (0.00s)
> === RUN   TestGetSnapshotReturnsPreviousSnapshotIfUnexpired
> --- PASS: TestGetSnapshotReturnsPreviousSnapshotIfUnexpired (0.00s)
> === RUN   TestGetSnapshotOldSnapshotExpired
> --- PASS: TestGetSnapshotOldSnapshotExpired (0.00s)
> === RUN   TestCannotMakeNewSnapshotIfNoRoot
> --- PASS: TestCannotMakeNewSnapshotIfNoRoot (0.00s)
> === RUN   TestCreateSnapshotNoKeyInCrypto
> --- PASS: TestCreateSnapshotNoKeyInCrypto (0.00s)
> PASS
> ok  	github.com/theupdateframework/notary/server/snapshot	0.065s
> === RUN   TestMemoryUpdateCurrentEmpty
> --- PASS: TestMemoryUpdateCurrentEmpty (0.00s)
> === RUN   TestMemoryUpdateCurrentVersionCheckOldVersionExists
> --- PASS: TestMemoryUpdateCurrentVersionCheckOldVersionExists (0.00s)
> === RUN   TestMemoryUpdateCurrentVersionCheckOldVersionNotExist
> --- PASS: TestMemoryUpdateCurrentVersionCheckOldVersionNotExist (0.00s)
> === RUN   TestMemoryUpdateManyNoConflicts
> --- PASS: TestMemoryUpdateManyNoConflicts (0.00s)
> === RUN   TestMemoryUpdateManyConflictRollback
> --- PASS: TestMemoryUpdateManyConflictRollback (0.00s)
> === RUN   TestMemoryDeleteSuccess
> --- PASS: TestMemoryDeleteSuccess (0.00s)
> === RUN   TestGetCurrent
> --- PASS: TestGetCurrent (0.00s)
> === RUN   TestGetChecksumNotFound
> --- PASS: TestGetChecksumNotFound (0.00s)
> === RUN   TestMemoryGetChanges
> --- PASS: TestMemoryGetChanges (0.00s)
> === RUN   TestGetVersion
> --- PASS: TestGetVersion (0.00s)
> === RUN   TestRDBTUFFileJSONUnmarshalling
> --- PASS: TestRDBTUFFileJSONUnmarshalling (0.00s)
> === RUN   TestRDBTUFFileJSONUnmarshallingFailure
> --- PASS: TestRDBTUFFileJSONUnmarshallingFailure (0.00s)
> === RUN   TestSQLUpdateCurrentEmpty
> --- PASS: TestSQLUpdateCurrentEmpty (0.09s)
> === RUN   TestSQLUpdateCurrentVersionCheckOldVersionExists
> --- PASS: TestSQLUpdateCurrentVersionCheckOldVersionExists (0.04s)
> === RUN   TestSQLUpdateCurrentVersionCheckOldVersionNotExist
> --- PASS: TestSQLUpdateCurrentVersionCheckOldVersionNotExist (0.05s)
> === RUN   TestSQLUpdateManyNoConflicts
> --- PASS: TestSQLUpdateManyNoConflicts (0.07s)
> === RUN   TestSQLUpdateManyConflictRollback
> --- PASS: TestSQLUpdateManyConflictRollback (0.05s)
> === RUN   TestSQLDelete
> --- PASS: TestSQLDelete (0.15s)
> === RUN   TestSQLDBCheckHealthTableMissing
> --- PASS: TestSQLDBCheckHealthTableMissing (0.07s)
> === RUN   TestSQLDBCheckHealthDBConnectionFail
> --- PASS: TestSQLDBCheckHealthDBConnectionFail (0.04s)
> === RUN   TestSQLDBCheckHealthSucceeds
> --- PASS: TestSQLDBCheckHealthSucceeds (0.03s)
> === RUN   TestSQLDBGetChecksum
> --- PASS: TestSQLDBGetChecksum (0.06s)
> === RUN   TestSQLDBGetChecksumNotFound
> --- PASS: TestSQLDBGetChecksumNotFound (0.04s)
> === RUN   TestSQLTUFMetaStoreGetCurrent
> --- PASS: TestSQLTUFMetaStoreGetCurrent (0.11s)
> === RUN   TestSQLGetChanges
> --- PASS: TestSQLGetChanges (0.11s)
> === RUN   TestSQLDBGetVersion
> --- PASS: TestSQLDBGetVersion (0.04s)
> PASS
> ok  	github.com/theupdateframework/notary/server/storage	0.965s
> === RUN   TestTimestampExpired
> --- PASS: TestTimestampExpired (0.00s)
> === RUN   TestTimestampNotExpired
> --- PASS: TestTimestampNotExpired (0.00s)
> === RUN   TestGetTimestampKey
> --- PASS: TestGetTimestampKey (0.00s)
> === RUN   TestGetTimestampNoPreviousTimestamp
> time="2020-03-22T08:31:20Z" level=error msg="Failed to unmarshal existing timestamp"
> --- PASS: TestGetTimestampNoPreviousTimestamp (0.01s)
> === RUN   TestGetTimestampReturnsPreviousTimestampIfUnexpired
> --- PASS: TestGetTimestampReturnsPreviousTimestampIfUnexpired (0.00s)
> === RUN   TestGetTimestampOldTimestampExpired
> --- PASS: TestGetTimestampOldTimestampExpired (0.00s)
> === RUN   TestCannotMakeNewTimestampIfNoRootOrSnapshot
> time="2020-03-22T08:31:20Z" level=error msg="Failed to create a new timestamp"
> time="2020-03-22T08:31:20Z" level=error msg="Failed to create a new timestamp"
> --- PASS: TestCannotMakeNewTimestampIfNoRootOrSnapshot (0.00s)
> === RUN   TestCreateTimestampNoKeyInCrypto
> time="2020-03-22T08:31:20Z" level=error msg="Failed to create a new timestamp"
> --- PASS: TestCreateTimestampNoKeyInCrypto (0.00s)
> === RUN   TestGetTimestampKeyCreateWithFailingStore
> time="2020-03-22T08:31:20Z" level=error msg="Error when retrieving root role for GUN gun: failing store failed"
> --- PASS: TestGetTimestampKeyCreateWithFailingStore (0.00s)
> === RUN   TestGetTimestampKeyCreateWithCorruptedStore
> time="2020-03-22T08:31:20Z" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve timestamp key ID"
> --- PASS: TestGetTimestampKeyCreateWithCorruptedStore (0.00s)
> === RUN   TestGetTimestampKeyCreateWithInvalidAlgo
> --- PASS: TestGetTimestampKeyCreateWithInvalidAlgo (0.00s)
> === RUN   TestGetTimestampKeyExistingMetadata
> --- PASS: TestGetTimestampKeyExistingMetadata (0.00s)
> PASS
> ok  	github.com/theupdateframework/notary/server/timestamp	0.038s
> === RUN   TestHealthCheckKMUnhealthy
> --- PASS: TestHealthCheckKMUnhealthy (0.00s)
> === RUN   TestHealthCheckSignerUnhealthy
> --- PASS: TestHealthCheckSignerUnhealthy (0.00s)
> === RUN   TestHealthCheckKMTimeout
> --- PASS: TestHealthCheckKMTimeout (0.00s)
> === RUN   TestHealthCheckSignerTimeout
> --- PASS: TestHealthCheckSignerTimeout (0.00s)
> === RUN   TestHealthCheckKMHealthy
> --- PASS: TestHealthCheckKMHealthy (0.00s)
> === RUN   TestHealthCheckSignerHealthy
> --- PASS: TestHealthCheckSignerHealthy (0.00s)
> === RUN   TestHealthCheckKMConnectionDied
> --- PASS: TestHealthCheckKMConnectionDied (0.00s)
> === RUN   TestHealthCheckSignerConnectionDied
> --- PASS: TestHealthCheckSignerConnectionDied (0.00s)
> === RUN   TestHealthCheckForOverallStatus
> --- PASS: TestHealthCheckForOverallStatus (0.00s)
> === RUN   TestHealthCheckNonexistentService
> --- PASS: TestHealthCheckNonexistentService (0.00s)
> === RUN   TestGetPrivateKeyAndSignWithExistingKey
> time="2020-03-22T08:31:20Z" level=info msg="Sign: Signed message! with KeyID 6bcde84ce673f08c969c96ebe10eb005583b5cf3cf26345a02a82482ca091cd4" go.version=go1.14.1
> --- PASS: TestGetPrivateKeyAndSignWithExistingKey (0.05s)
> === RUN   TestCannotSignWithKeyThatDoesntExist
> time="2020-03-22T08:31:20Z" level=error msg="Sign: key 37763809d0ee2895e0037a5d716b1e03984babd9d33796b137af33264e0852c1 not found" go.version=go1.14.1
> --- PASS: TestCannotSignWithKeyThatDoesntExist (0.00s)
> === RUN   TestCryptoSignerInterfaceBehavior
> time="2020-03-22T08:31:20Z" level=error msg="GetKeyInfo: key nonexistent not found" go.version=go1.14.1
> time="2020-03-22T08:31:20Z" level=error msg="GetKeyInfo: key nonexistent not found" go.version=go1.14.1
> time="2020-03-22T08:31:20Z" level=info msg="CreateKey: Created KeyID d81c546d41724791ea9f09ef9624870de0287281bf270cd28ce12372cbda4b9f" go.version=go1.14.1
> time="2020-03-22T08:31:20Z" level=info msg="CreateKey: Created KeyID a4c0a41427efdb206e8032d5b1dafabf3720a14ce98418694d361d4b5cd36077" go.version=go1.14.1
> time="2020-03-22T08:31:20Z" level=error msg="GetKeyInfo: key d81c546d41724791ea9f09ef9624870de0287281bf270cd28ce12372cbda4b9f not found" go.version=go1.14.1
> time="2020-03-22T08:31:20Z" level=error msg="GetKeyInfo: key a4c0a41427efdb206e8032d5b1dafabf3720a14ce98418694d361d4b5cd36077 not found" go.version=go1.14.1
> --- PASS: TestCryptoSignerInterfaceBehavior (0.01s)
> PASS
> ok  	github.com/theupdateframework/notary/signer	0.111s
> ?   	github.com/theupdateframework/notary/signer/api	[no test files]
> ?   	github.com/theupdateframework/notary/signer/client	[no test files]
> === RUN   TestGetSuccessPopulatesCache
> --- PASS: TestGetSuccessPopulatesCache (0.02s)
> === RUN   TestAddKeyPopulatesCacheIfSuccessful
> --- PASS: TestAddKeyPopulatesCacheIfSuccessful (0.00s)
> === RUN   TestDeleteKeyRemovesKeyFromCache
> --- PASS: TestDeleteKeyRemovesKeyFromCache (0.01s)
> === RUN   TestRDBPrivateKeyJSONUnmarshalling
> --- PASS: TestRDBPrivateKeyJSONUnmarshalling (0.00s)
> === RUN   TestRDBPrivateKeyJSONUnmarshallingFailure
> --- PASS: TestRDBPrivateKeyJSONUnmarshallingFailure (0.00s)
> === RUN   TestNewSQLKeyDBStorePropagatesDBError
> `nodb` is not officially supported, running under compatibility mode.
> --- PASS: TestNewSQLKeyDBStorePropagatesDBError (0.00s)
> === RUN   TestSQLDBHealthCheckMissingTable
> --- PASS: TestSQLDBHealthCheckMissingTable (0.03s)
> === RUN   TestSQLDBHealthCheckNoConnection
> --- PASS: TestSQLDBHealthCheckNoConnection (0.03s)
> === RUN   TestSQLKeyCanOnlyBeAddedOnce
> 
> 
> (UNIQUE constraint failed: private_keys.key_id) 
> [2020-03-22 08:31:22]  
> --- PASS: TestSQLKeyCanOnlyBeAddedOnce (0.17s)
> === RUN   TestSQLCreateDelete
> --- PASS: TestSQLCreateDelete (0.18s)
> === RUN   TestSQLKeyRotation
> --- PASS: TestSQLKeyRotation (0.18s)
> === RUN   TestSQLSigningMarksKeyActive
> time="2020-03-22T08:31:22Z" level=error msg="Key cfbfdb459dfb9543229a49e9f890307e74a83ab79c6e4ee2592a0e0fabdfdd52 was just used to sign hash successful, db closed, error when trying to mark key as active: sql: database is closed"
> 
> 
> (sql: database is closed) 
> [2020-03-22 08:31:22]  
> --- PASS: TestSQLSigningMarksKeyActive (0.33s)
> === RUN   TestSQLCreateKey
> --- PASS: TestSQLCreateKey (0.20s)
> === RUN   TestSQLUnimplementedInterfaceBehavior
> --- PASS: TestSQLUnimplementedInterfaceBehavior (0.13s)
> PASS
> ok  	github.com/theupdateframework/notary/signer/keydbstore	1.283s
> === RUN   TestSet
> --- PASS: TestSet (0.00s)
> === RUN   TestSetWithNoParentDirectory
> --- PASS: TestSetWithNoParentDirectory (0.00s)
> === RUN   TestSetRemovesExistingFileBeforeWriting
> --- PASS: TestSetRemovesExistingFileBeforeWriting (0.00s)
> === RUN   TestGetSized
> --- PASS: TestGetSized (0.00s)
> === RUN   TestGetSizedSet
> --- PASS: TestGetSizedSet (0.00s)
> === RUN   TestRemove
> --- PASS: TestRemove (0.00s)
> === RUN   TestRemoveAll
> --- PASS: TestRemoveAll (0.00s)
> === RUN   TestAddFile
> --- PASS: TestAddFile (0.00s)
> === RUN   TestRemoveFile
> --- PASS: TestRemoveFile (0.01s)
> === RUN   TestListFiles
> --- PASS: TestListFiles (0.00s)
> === RUN   TestGetPath
> --- PASS: TestGetPath (0.00s)
> === RUN   TestGetPathProtection
> --- PASS: TestGetPathProtection (0.00s)
> === RUN   TestGetData
> --- PASS: TestGetData (0.00s)
> === RUN   TestCreateDirectory
> --- PASS: TestCreateDirectory (0.00s)
> === RUN   TestCreatePrivateDirectory
> --- PASS: TestCreatePrivateDirectory (0.00s)
> === RUN   TestFileStoreConsistency
> --- PASS: TestFileStoreConsistency (0.00s)
> === RUN   TestHTTPStoreGetSized
> --- PASS: TestHTTPStoreGetSized (0.00s)
> === RUN   TestHTTPStoreGetAllMeta
> --- PASS: TestHTTPStoreGetAllMeta (0.00s)
> === RUN   TestSetSingleAndSetMultiMeta
> --- PASS: TestSetSingleAndSetMultiMeta (0.00s)
> === RUN   Test404Error
> --- PASS: Test404Error (0.00s)
> === RUN   Test50XErrors
> --- PASS: Test50XErrors (0.00s)
> === RUN   Test400Error
> --- PASS: Test400Error (0.00s)
> === RUN   TestTranslateErrorsParse400Errors
> --- PASS: TestTranslateErrorsParse400Errors (0.00s)
> === RUN   TestTranslateErrorsWhenCannotParse400
> --- PASS: TestTranslateErrorsWhenCannotParse400 (0.00s)
> === RUN   TestTranslateErrorsLimitsErrorSize
> --- PASS: TestTranslateErrorsLimitsErrorSize (0.00s)
> === RUN   TestHTTPStoreRemoveAll
> --- PASS: TestHTTPStoreRemoveAll (0.00s)
> === RUN   TestHTTPStoreRotateKey
> --- PASS: TestHTTPStoreRotateKey (0.00s)
> === RUN   TestHTTPStoreGetKey
> --- PASS: TestHTTPStoreGetKey (0.00s)
> === RUN   TestHTTPStoreGetRotateKeySizeLimited
> --- PASS: TestHTTPStoreGetRotateKeySizeLimited (0.00s)
> === RUN   TestHTTPOffline
> --- PASS: TestHTTPOffline (0.00s)
> === RUN   TestErrServerUnavailable
> --- PASS: TestErrServerUnavailable (0.00s)
> === RUN   TestNetworkError
>     TestNetworkError: httpstore_test.go:396: 
>         	Error Trace:	httpstore_test.go:396
>         	Error:      	Not equal: 
>         	            	expected: "GET https://auth.docker.io: abc:def:ghi"
>         	            	actual  : "GET \"https://auth.docker.io\": abc:def:ghi"
>         	            	
>         	            	Diff:
>         	            	--- Expected
>         	            	+++ Actual
>         	            	@@ -1 +1 @@
>         	            	-GET https://auth.docker.io: abc:def:ghi
>         	            	+GET "https://auth.docker.io": abc:def:ghi
>         	Test:       	TestNetworkError
> --- FAIL: TestNetworkError (0.00s)
> === RUN   TestMemoryStoreMetadataOperations
> --- PASS: TestMemoryStoreMetadataOperations (0.00s)
> === RUN   TestMemoryStoreGetSized
> --- PASS: TestMemoryStoreGetSized (0.00s)
> === RUN   TestOfflineStore
> --- PASS: TestOfflineStore (0.00s)
> === RUN   TestErrOffline
> --- PASS: TestErrOffline (0.00s)
> === RUN   TestMemoryStoreMetadata
> --- PASS: TestMemoryStoreMetadata (0.00s)
> FAIL
> FAIL	github.com/theupdateframework/notary/storage	0.035s
> ?   	github.com/theupdateframework/notary/storage/rethinkdb	[no test files]
> === RUN   TestExportKeys
> --- PASS: TestExportKeys (0.00s)
> === RUN   TestExportKeysByGUN
> --- PASS: TestExportKeysByGUN (0.00s)
> === RUN   TestExportKeysByID
> --- PASS: TestExportKeysByID (0.00s)
> === RUN   TestExport2InOneFile
> --- PASS: TestExport2InOneFile (0.00s)
> === RUN   TestImportKeys
> --- PASS: TestImportKeys (0.00s)
> === RUN   TestImportNoPath
> --- PASS: TestImportNoPath (0.01s)
> === RUN   TestNonRootPathInference
> --- PASS: TestNonRootPathInference (0.00s)
> === RUN   TestBlockHeaderPrecedenceRoleAndGun
> --- PASS: TestBlockHeaderPrecedenceRoleAndGun (0.00s)
> === RUN   TestBlockHeaderPrecedenceGunFromPath
> --- PASS: TestBlockHeaderPrecedenceGunFromPath (0.01s)
> === RUN   TestImportKeys2InOneFile
> --- PASS: TestImportKeys2InOneFile (0.00s)
> === RUN   TestImportKeys2InOneFileNoPath
> --- PASS: TestImportKeys2InOneFileNoPath (0.01s)
> === RUN   TestEncryptedKeyImportFail
> time="2020-03-22T08:31:22Z" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header"
> --- PASS: TestEncryptedKeyImportFail (0.02s)
> === RUN   TestEncryptedKeyImportSuccess
> --- PASS: TestEncryptedKeyImportSuccess (0.01s)
> === RUN   TestEncryption
> --- PASS: TestEncryption (0.01s)
> === RUN   TestAddKey
> --- PASS: TestAddKey (0.02s)
> === RUN   TestKeyStoreInternalState
> --- PASS: TestKeyStoreInternalState (0.01s)
> === RUN   TestGet
> --- PASS: TestGet (0.01s)
> === RUN   TestGetLegacyKey
> --- PASS: TestGetLegacyKey (0.01s)
> === RUN   TestListKeys
> --- PASS: TestListKeys (0.04s)
> === RUN   TestAddGetKeyMemStore
> --- PASS: TestAddGetKeyMemStore (0.00s)
> === RUN   TestAddGetKeyInfoMemStore
> --- PASS: TestAddGetKeyInfoMemStore (0.01s)
> === RUN   TestGetDecryptedWithTamperedCipherText
> time="2020-03-22T08:31:22Z" level=error msg="PEM block is empty"
> --- PASS: TestGetDecryptedWithTamperedCipherText (0.01s)
> === RUN   TestGetDecryptedWithInvalidPassphrase
> --- PASS: TestGetDecryptedWithInvalidPassphrase (0.03s)
> === RUN   TestGetDecryptedWithConsistentlyInvalidPassphrase
> --- PASS: TestGetDecryptedWithConsistentlyInvalidPassphrase (0.05s)
> === RUN   TestRemoveKey
> --- PASS: TestRemoveKey (0.02s)
> === RUN   TestKeysAreCached
> --- PASS: TestKeysAreCached (0.01s)
> PASS
> ok  	github.com/theupdateframework/notary/trustmanager	0.308s
> === RUN   TestRemoteStore
> time="2020-03-22T08:31:22Z" level=info msg="listing files from localhost:9888"
> time="2020-03-22T08:31:22Z" level=info msg="listing files from localhost:9888"
> --- PASS: TestRemoteStore (0.02s)
> === RUN   TestErrors
> time="2020-03-22T08:31:22Z" level=error msg="failed to store: test error"
> --- PASS: TestErrors (0.02s)
> === RUN   TestNewGRPCStorage
> --- PASS: TestNewGRPCStorage (0.00s)
> === RUN   TestGRPCStorage
> --- PASS: TestGRPCStorage (0.00s)
> PASS
> ok  	github.com/theupdateframework/notary/trustmanager/remoteks	0.046s
> ?   	github.com/theupdateframework/notary/trustmanager/yubikey	[no test files]
> === RUN   TestWildcardMatch
> --- PASS: TestWildcardMatch (0.00s)
> === RUN   TestValidateRoot
> 2020/03/22 08:31:25 [INFO] generate received request
> 2020/03/22 08:31:25 [INFO] received CSR
> 2020/03/22 08:31:25 [INFO] generating key: ecdsa-256
> 2020/03/22 08:31:25 [INFO] encoded CSR
> 2020/03/22 08:31:25 [INFO] signed certificate with serial number 393857351147423668073835228535581130322881540031
> 2020/03/22 08:31:25 [INFO] received CSR
> 2020/03/22 08:31:25 [INFO] generating key: ecdsa-256
> 2020/03/22 08:31:25 [INFO] encoded CSR
> 2020/03/22 08:31:25 [INFO] signed certificate with serial number 377504733889350763610715989770006652676125919578
> 2020/03/22 08:31:25 [INFO] received CSR
> 2020/03/22 08:31:25 [INFO] generating key: ecdsa-256
> 2020/03/22 08:31:25 [INFO] encoded CSR
> 2020/03/22 08:31:25 [INFO] signed certificate with serial number 667217188240517842369922337254236466739503123871
> --- PASS: TestValidateRoot (0.04s)
> === RUN   TestValidateRootWithoutTOFUS
> --- PASS: TestValidateRootWithoutTOFUS (0.00s)
> === RUN   TestValidateRootWithPinnedCert
> --- PASS: TestValidateRootWithPinnedCert (0.00s)
> === RUN   TestValidateRootWithPinnedCertAndIntermediates
> --- PASS: TestValidateRootWithPinnedCertAndIntermediates (0.02s)
> === RUN   TestValidateRootFailuresWithPinnedCert
> --- PASS: TestValidateRootFailuresWithPinnedCert (0.00s)
> === RUN   TestValidateRootWithPinnedCA
> --- PASS: TestValidateRootWithPinnedCA (0.04s)
> === RUN   TestValidateSuccessfulRootRotation
> --- PASS: TestValidateSuccessfulRootRotation (0.05s)
> === RUN   TestValidateRootRotationMissingOrigSig
> --- PASS: TestValidateRootRotationMissingOrigSig (0.03s)
> === RUN   TestValidateRootRotationMissingNewSig
> --- PASS: TestValidateRootRotationMissingNewSig (0.03s)
> === RUN   TestValidateRootRotationTrustPinning
> --- PASS: TestValidateRootRotationTrustPinning (0.05s)
> === RUN   TestValidateRootRotationTrustPinningInvalidCA
> --- PASS: TestValidateRootRotationTrustPinningInvalidCA (0.02s)
> === RUN   TestParsePEMPublicKey
> time="2020-03-22T08:31:25Z" level=warning msg="certificate with CN notary is near expiry"
> --- PASS: TestParsePEMPublicKey (0.00s)
> === RUN   TestCheckingCertExpiry
> time="2020-03-22T08:31:25Z" level=warning msg="certificate with CN notary is near expiry"
> --- PASS: TestCheckingCertExpiry (0.00s)
> === RUN   TestValidateRootWithExpiredIntermediate
> --- PASS: TestValidateRootWithExpiredIntermediate (0.01s)
> === RUN   TestCheckingWildcardCert
> --- PASS: TestCheckingWildcardCert (0.00s)
> === RUN   TestWildcardMatching
> --- PASS: TestWildcardMatching (0.00s)
> PASS
> ok  	github.com/theupdateframework/notary/trustpinning	0.340s
> === RUN   TestInitSnapshotNoTargets
> --- PASS: TestInitSnapshotNoTargets (0.00s)
> === RUN   TestInitRepo
> --- PASS: TestInitRepo (0.01s)
> === RUN   TestUpdateDelegations
> --- PASS: TestUpdateDelegations (0.00s)
> === RUN   TestPurgeDelegationsKeyFromTop
> time="2020-03-22T08:31:24Z" level=warning msg="role targets/sybil has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> time="2020-03-22T08:31:24Z" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> --- PASS: TestPurgeDelegationsKeyFromTop (0.00s)
> === RUN   TestPurgeDelegationsKeyFromDeep
> time="2020-03-22T08:31:24Z" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it"
> --- PASS: TestPurgeDelegationsKeyFromDeep (0.00s)
> === RUN   TestPurgeDelegationsKeyBadWildRole
> --- PASS: TestPurgeDelegationsKeyBadWildRole (0.00s)
> === RUN   TestUpdateDelegationsParentMissing
> --- PASS: TestUpdateDelegationsParentMissing (0.00s)
> === RUN   TestUpdateDelegationsMissingParentKey
> --- PASS: TestUpdateDelegationsMissingParentKey (0.00s)
> === RUN   TestUpdateDelegationsInvalidRole
> --- PASS: TestUpdateDelegationsInvalidRole (0.00s)
> === RUN   TestUpdateDelegationsRoleThatIsMissingDelegationKey
> --- PASS: TestUpdateDelegationsRoleThatIsMissingDelegationKey (0.00s)
> === RUN   TestUpdateDelegationsNotEnoughKeys
> time="2020-03-22T08:31:24Z" level=warning msg="role targets/role has fewer keys than its threshold of 2; it will not be usable until keys are added to it"
> --- PASS: TestUpdateDelegationsNotEnoughKeys (0.00s)
> === RUN   TestUpdateDelegationsAddKeyToRole
> --- PASS: TestUpdateDelegationsAddKeyToRole (0.00s)
> === RUN   TestDeleteDelegations
> --- PASS: TestDeleteDelegations (0.00s)
> === RUN   TestDeleteDelegationsRoleNotExistBecauseNoParentMeta
> --- PASS: TestDeleteDelegationsRoleNotExistBecauseNoParentMeta (0.00s)
> === RUN   TestDeleteDelegationsRoleNotExist
> --- PASS: TestDeleteDelegationsRoleNotExist (0.01s)
> === RUN   TestDeleteDelegationsInvalidRole
> --- PASS: TestDeleteDelegationsInvalidRole (0.00s)
> === RUN   TestDeleteDelegationsParentMissing
> --- PASS: TestDeleteDelegationsParentMissing (0.00s)
> === RUN   TestDeleteDelegationsMissingParentSigningKey
> --- PASS: TestDeleteDelegationsMissingParentSigningKey (0.00s)
> === RUN   TestDeleteDelegationsMidSliceRole
> --- PASS: TestDeleteDelegationsMidSliceRole (0.00s)
> === RUN   TestGetDelegationRoleAndMetadataExistDelegationExists
> --- PASS: TestGetDelegationRoleAndMetadataExistDelegationExists (0.00s)
> === RUN   TestGetDelegationRoleAndMetadataExistDelegationDoesntExists
> --- PASS: TestGetDelegationRoleAndMetadataExistDelegationDoesntExists (0.00s)
> === RUN   TestGetDelegationRoleAndMetadataDoesntExists
> --- PASS: TestGetDelegationRoleAndMetadataDoesntExists (0.00s)
> === RUN   TestGetDelegationParentMissing
> --- PASS: TestGetDelegationParentMissing (0.00s)
> === RUN   TestAddTargetsRoleAndMetadataExist
> --- PASS: TestAddTargetsRoleAndMetadataExist (0.00s)
> === RUN   TestAddTargetsRoleExistsAndMetadataDoesntExist
> --- PASS: TestAddTargetsRoleExistsAndMetadataDoesntExist (0.00s)
> === RUN   TestAddTargetsRoleDoesntExist
> --- PASS: TestAddTargetsRoleDoesntExist (0.00s)
> === RUN   TestAddTargetsNoSigningKeys
> --- PASS: TestAddTargetsNoSigningKeys (0.00s)
> === RUN   TestRemoveExistingAndNonexistingTargets
> --- PASS: TestRemoveExistingAndNonexistingTargets (0.00s)
> === RUN   TestRemoveTargetsRoleDoesntExist
> --- PASS: TestRemoveTargetsRoleDoesntExist (0.00s)
> === RUN   TestRemoveTargetsNoSigningKeys
> --- PASS: TestRemoveTargetsNoSigningKeys (0.00s)
> === RUN   TestAddBaseKeysToRoot
> --- PASS: TestAddBaseKeysToRoot (0.01s)
> === RUN   TestRemoveBaseKeysFromRoot
> --- PASS: TestRemoveBaseKeysFromRoot (0.00s)
> === RUN   TestReplaceBaseKeysInRoot
> --- PASS: TestReplaceBaseKeysInRoot (0.01s)
> === RUN   TestGetAllRoles
> --- PASS: TestGetAllRoles (0.00s)
> === RUN   TestGetBaseRoles
> --- PASS: TestGetBaseRoles (0.00s)
> === RUN   TestGetBaseRolesInvalidName
> --- PASS: TestGetBaseRolesInvalidName (0.00s)
> === RUN   TestGetDelegationValidRoles
> --- PASS: TestGetDelegationValidRoles (0.00s)
> === RUN   TestGetDelegationRolesInvalidName
> --- PASS: TestGetDelegationRolesInvalidName (0.00s)
> === RUN   TestGetDelegationRolesInvalidPaths
> --- PASS: TestGetDelegationRolesInvalidPaths (0.00s)
> === RUN   TestDelegationRolesParent
> --- PASS: TestDelegationRolesParent (0.00s)
> === RUN   TestGetBaseRoleEmptyRepo
> --- PASS: TestGetBaseRoleEmptyRepo (0.00s)
> === RUN   TestGetBaseRoleKeyMissing
> --- PASS: TestGetBaseRoleKeyMissing (0.00s)
> === RUN   TestGetDelegationRoleKeyMissing
> --- PASS: TestGetDelegationRoleKeyMissing (0.00s)
> === RUN   TestSignRootOldKeyCertExists
> --- PASS: TestSignRootOldKeyCertExists (0.03s)
> === RUN   TestSignRootOldKeyCertMissing
> --- PASS: TestSignRootOldKeyCertMissing (0.02s)
> === RUN   TestRootKeyRotation
> --- PASS: TestRootKeyRotation (0.07s)
> === RUN   TestBuilderLoadsValidRolesOnly
> --- PASS: TestBuilderLoadsValidRolesOnly (0.00s)
> === RUN   TestBuilderOnlyAcceptsRootFirstWhenLoading
> --- PASS: TestBuilderOnlyAcceptsRootFirstWhenLoading (0.00s)
> === RUN   TestBuilderOnlyAcceptsDelegationsAfterParent
> --- PASS: TestBuilderOnlyAcceptsDelegationsAfterParent (0.00s)
> === RUN   TestMarkingIsValid
> --- PASS: TestMarkingIsValid (0.00s)
> === RUN   TestBuilderLoadInvalidDelegations
> --- PASS: TestBuilderLoadInvalidDelegations (0.00s)
> === RUN   TestBuilderLoadInvalidDelegationsOldVersion
> --- PASS: TestBuilderLoadInvalidDelegationsOldVersion (0.00s)
> === RUN   TestBuilderAcceptRoleOnce
> --- PASS: TestBuilderAcceptRoleOnce (0.00s)
> === RUN   TestBuilderStopsAcceptingOrProducingDataOnceDone
> --- PASS: TestBuilderStopsAcceptingOrProducingDataOnceDone (0.00s)
> === RUN   TestGenerateSnapshotInvalidOperations
> --- PASS: TestGenerateSnapshotInvalidOperations (0.06s)
> === RUN   TestGenerateTimestampInvalidOperations
> --- PASS: TestGenerateTimestampInvalidOperations (0.03s)
> === RUN   TestGetConsistentInfo
> --- PASS: TestGetConsistentInfo (0.01s)
> === RUN   TestTimestampPreAndPostChecksumming
> --- PASS: TestTimestampPreAndPostChecksumming (0.01s)
> === RUN   TestSnapshotLoadedFirstChecksumsOthers
> --- PASS: TestSnapshotLoadedFirstChecksumsOthers (0.01s)
> === RUN   TestSnapshotLoadedAfterChecksumsOthersRetroactively
> --- PASS: TestSnapshotLoadedAfterChecksumsOthersRetroactively (0.02s)
> PASS
> ok  	github.com/theupdateframework/notary/tuf	0.399s
> === RUN   TestMergeStrSlicesExclusive
> --- PASS: TestMergeStrSlicesExclusive (0.00s)
> === RUN   TestMergeStrSlicesOverlap
> --- PASS: TestMergeStrSlicesOverlap (0.00s)
> === RUN   TestMergeStrSlicesEqual
> --- PASS: TestMergeStrSlicesEqual (0.00s)
> === RUN   TestSubtractStrSlicesExclusive
> --- PASS: TestSubtractStrSlicesExclusive (0.00s)
> === RUN   TestSubtractStrSlicesOverlap
> --- PASS: TestSubtractStrSlicesOverlap (0.00s)
> === RUN   TestSubtractStrSlicesEqual
> --- PASS: TestSubtractStrSlicesEqual (0.00s)
> === RUN   TestAddRemoveKeys
> --- PASS: TestAddRemoveKeys (0.00s)
> === RUN   TestAddRemovePaths
> --- PASS: TestAddRemovePaths (0.00s)
> === RUN   TestAddPathNil
> --- PASS: TestAddPathNil (0.00s)
> === RUN   TestErrNoSuchRole
> --- PASS: TestErrNoSuchRole (0.00s)
> === RUN   TestErrInvalidRole
> --- PASS: TestErrInvalidRole (0.00s)
> === RUN   TestIsDelegation
> --- PASS: TestIsDelegation (0.00s)
> === RUN   TestIsWildDelegation
> --- PASS: TestIsWildDelegation (0.00s)
> === RUN   TestValidRoleFunction
> --- PASS: TestValidRoleFunction (0.00s)
> === RUN   TestIsBaseRole
> --- PASS: TestIsBaseRole (0.00s)
> === RUN   TestBaseRoleEquals
> --- PASS: TestBaseRoleEquals (0.00s)
> === RUN   TestRootToSignedMarshalsSignedPortionWithCanonicalJSON
> --- PASS: TestRootToSignedMarshalsSignedPortionWithCanonicalJSON (0.00s)
> === RUN   TestRootToSignCopiesSignatures
> --- PASS: TestRootToSignCopiesSignatures (0.00s)
> === RUN   TestRootToSignedMarshallingErrorsPropagated
> --- PASS: TestRootToSignedMarshallingErrorsPropagated (0.00s)
> === RUN   TestRootMarshalJSONMarshalsSignedWithRegularJSON
> --- PASS: TestRootMarshalJSONMarshalsSignedWithRegularJSON (0.00s)
> === RUN   TestRootMarshalJSONMarshallingErrorsPropagated
> --- PASS: TestRootMarshalJSONMarshallingErrorsPropagated (0.00s)
> === RUN   TestRootFromSignedUnmarshallingErrorsPropagated
> --- PASS: TestRootFromSignedUnmarshallingErrorsPropagated (0.00s)
> === RUN   TestRootFromSignedCopiesSignatures
> --- PASS: TestRootFromSignedCopiesSignatures (0.00s)
> === RUN   TestRootFromSignedValidatesRoleData
> --- PASS: TestRootFromSignedValidatesRoleData (0.00s)
> === RUN   TestRootFromSignedValidatesRoleType
> --- PASS: TestRootFromSignedValidatesRoleType (0.00s)
> === RUN   TestRootFromSignedValidatesVersion
> --- PASS: TestRootFromSignedValidatesVersion (0.00s)
> === RUN   TestSnapshotToSignedMarshalsSignedPortionWithCanonicalJSON
> --- PASS: TestSnapshotToSignedMarshalsSignedPortionWithCanonicalJSON (0.00s)
> === RUN   TestSnapshotToSignCopiesSignatures
> --- PASS: TestSnapshotToSignCopiesSignatures (0.00s)
> === RUN   TestSnapshotToSignedMarshallingErrorsPropagated
> --- PASS: TestSnapshotToSignedMarshallingErrorsPropagated (0.00s)
> === RUN   TestSnapshotMarshalJSONMarshalsSignedWithRegularJSON
> --- PASS: TestSnapshotMarshalJSONMarshalsSignedWithRegularJSON (0.00s)
> === RUN   TestSnapshotMarshalJSONMarshallingErrorsPropagated
> --- PASS: TestSnapshotMarshalJSONMarshallingErrorsPropagated (0.00s)
> === RUN   TestSnapshotFromSignedUnmarshallingErrorsPropagated
> --- PASS: TestSnapshotFromSignedUnmarshallingErrorsPropagated (0.00s)
> === RUN   TestSnapshotFromSignedCopiesSignatures
> --- PASS: TestSnapshotFromSignedCopiesSignatures (0.00s)
> === RUN   TestSnapshotFromSignedValidatesMeta
> --- PASS: TestSnapshotFromSignedValidatesMeta (0.00s)
> === RUN   TestSnapshotFromSignedValidatesRoleType
> --- PASS: TestSnapshotFromSignedValidatesRoleType (0.00s)
> === RUN   TestSnapshotFromSignedValidatesVersion
> --- PASS: TestSnapshotFromSignedValidatesVersion (0.00s)
> === RUN   TestSnapshotGetMeta
> --- PASS: TestSnapshotGetMeta (0.00s)
> === RUN   TestTargetsToSignedMarshalsSignedPortionWithCanonicalJSON
> --- PASS: TestTargetsToSignedMarshalsSignedPortionWithCanonicalJSON (0.00s)
> === RUN   TestTargetsToSignCopiesSignatures
> --- PASS: TestTargetsToSignCopiesSignatures (0.00s)
> === RUN   TestTargetsToSignedMarshallingErrorsPropagated
> --- PASS: TestTargetsToSignedMarshallingErrorsPropagated (0.00s)
> === RUN   TestTargetsMarshalJSONMarshalsSignedWithRegularJSON
> --- PASS: TestTargetsMarshalJSONMarshalsSignedWithRegularJSON (0.00s)
> === RUN   TestTargetsMarshalJSONMarshallingErrorsPropagated
> --- PASS: TestTargetsMarshalJSONMarshallingErrorsPropagated (0.00s)
> === RUN   TestTargetsFromSignedUnmarshallingErrorsPropagated
> --- PASS: TestTargetsFromSignedUnmarshallingErrorsPropagated (0.00s)
> === RUN   TestTargetsFromSignedCopiesSignatures
> --- PASS: TestTargetsFromSignedCopiesSignatures (0.00s)
> === RUN   TestTargetsFromSignedValidatesDelegations
> --- PASS: TestTargetsFromSignedValidatesDelegations (0.00s)
> === RUN   TestTargetsFromSignedValidatesRoleType
> --- PASS: TestTargetsFromSignedValidatesRoleType (0.00s)
> === RUN   TestTargetsFromSignedValidatesRoleName
> --- PASS: TestTargetsFromSignedValidatesRoleName (0.00s)
> === RUN   TestTargetsFromSignedValidatesVersion
> --- PASS: TestTargetsFromSignedValidatesVersion (0.00s)
> === RUN   TestTimestampToSignedMarshalsSignedPortionWithCanonicalJSON
> --- PASS: TestTimestampToSignedMarshalsSignedPortionWithCanonicalJSON (0.00s)
> === RUN   TestTimestampToSignCopiesSignatures
> --- PASS: TestTimestampToSignCopiesSignatures (0.00s)
> === RUN   TestTimestampToSignedMarshallingErrorsPropagated
> --- PASS: TestTimestampToSignedMarshallingErrorsPropagated (0.00s)
> === RUN   TestTimestampMarshalJSONMarshalsSignedWithRegularJSON
> --- PASS: TestTimestampMarshalJSONMarshalsSignedWithRegularJSON (0.00s)
> === RUN   TestTimestampMarshalJSONMarshallingErrorsPropagated
> --- PASS: TestTimestampMarshalJSONMarshallingErrorsPropagated (0.00s)
> === RUN   TestTimestampFromSignedUnmarshallingErrorsPropagated
> --- PASS: TestTimestampFromSignedUnmarshallingErrorsPropagated (0.00s)
> === RUN   TestTimestampFromSignedCopiesSignatures
> --- PASS: TestTimestampFromSignedCopiesSignatures (0.00s)
> === RUN   TestTimestampFromSignedValidatesMeta
> --- PASS: TestTimestampFromSignedValidatesMeta (0.00s)
> === RUN   TestTimestampFromSignedValidatesRoleType
> --- PASS: TestTimestampFromSignedValidatesRoleType (0.00s)
> === RUN   TestTimestampFromSignedValidatesVersion
> --- PASS: TestTimestampFromSignedValidatesVersion (0.00s)
> === RUN   TestTimestampGetSnapshot
> --- PASS: TestTimestampGetSnapshot (0.00s)
> === RUN   TestGenerateFileMetaDefault
> --- PASS: TestGenerateFileMetaDefault (0.00s)
> === RUN   TestGenerateFileMetaExplicit
> --- PASS: TestGenerateFileMetaExplicit (0.00s)
> === RUN   TestSignatureUnmarshalJSON
> --- PASS: TestSignatureUnmarshalJSON (0.00s)
> === RUN   TestCheckHashes
> --- PASS: TestCheckHashes (0.00s)
> === RUN   TestCheckValidHashStructures
> --- PASS: TestCheckValidHashStructures (0.00s)
> === RUN   TestCompareMultiHashes
> --- PASS: TestCompareMultiHashes (0.00s)
> === RUN   TestFileMetaEquals
> --- PASS: TestFileMetaEquals (0.00s)
> PASS
> ok  	github.com/theupdateframework/notary/tuf/data	0.018s
> === RUN   TestListKeys
> --- PASS: TestListKeys (0.00s)
> === RUN   TestGetKeys
> --- PASS: TestGetKeys (0.00s)
> === RUN   TestBasicSign
> --- PASS: TestBasicSign (0.00s)
> === RUN   TestReSign
> --- PASS: TestReSign (0.00s)
> === RUN   TestMultiSign
> --- PASS: TestMultiSign (0.00s)
> === RUN   TestSignReturnsNoSigs
> --- PASS: TestSignReturnsNoSigs (0.00s)
> === RUN   TestSignWithX509
> --- PASS: TestSignWithX509 (0.00s)
> === RUN   TestSignRemovesValidSigByInvalidKey
> --- PASS: TestSignRemovesValidSigByInvalidKey (0.00s)
> === RUN   TestSignRemovesInvalidSig
> --- PASS: TestSignRemovesInvalidSig (0.00s)
> === RUN   TestSignMinSignatures
> --- PASS: TestSignMinSignatures (0.00s)
> === RUN   TestSignFailingKeys
> --- PASS: TestSignFailingKeys (0.01s)
> === RUN   TestErrInsufficientSignaturesMessaging
> --- PASS: TestErrInsufficientSignaturesMessaging (0.00s)
> === RUN   TestRSAPSSVerifier
> --- PASS: TestRSAPSSVerifier (0.00s)
> === RUN   TestRSAPSSx509Verifier
> --- PASS: TestRSAPSSx509Verifier (0.00s)
> === RUN   TestRSAPSSVerifierWithInvalidKeyType
> --- PASS: TestRSAPSSVerifierWithInvalidKeyType (0.00s)
> === RUN   TestRSAPSSVerifierWithInvalidKeyLength
> --- PASS: TestRSAPSSVerifierWithInvalidKeyLength (0.03s)
> === RUN   TestRSAPSSVerifierWithInvalidKey
> --- PASS: TestRSAPSSVerifierWithInvalidKey (0.00s)
> === RUN   TestRSAPSSVerifierWithInvalidSignature
> --- PASS: TestRSAPSSVerifierWithInvalidSignature (0.00s)
> === RUN   TestRSAPKCS1v15Verifier
> --- PASS: TestRSAPKCS1v15Verifier (0.00s)
> === RUN   TestRSAPKCS1v15x509Verifier
> --- PASS: TestRSAPKCS1v15x509Verifier (0.00s)
> === RUN   TestRSAPKCS1v15VerifierWithInvalidKeyType
> --- PASS: TestRSAPKCS1v15VerifierWithInvalidKeyType (0.00s)
> === RUN   TestRSAPKCS1v15VerifierWithInvalidKey
> --- PASS: TestRSAPKCS1v15VerifierWithInvalidKey (0.00s)
> === RUN   TestRSAPKCS1v15VerifierWithInvalidSignature
> time="2020-03-22T08:31:26Z" level=error msg="Failed verification: crypto/rsa: verification error"
> --- PASS: TestRSAPKCS1v15VerifierWithInvalidSignature (0.00s)
> === RUN   TestECDSAVerifier
> --- PASS: TestECDSAVerifier (0.00s)
> === RUN   TestECDSAVerifierOtherCurves
> --- PASS: TestECDSAVerifierOtherCurves (0.21s)
> === RUN   TestECDSAx509Verifier
> --- PASS: TestECDSAx509Verifier (0.00s)
> === RUN   TestECDSAVerifierWithInvalidKeyType
> --- PASS: TestECDSAVerifierWithInvalidKeyType (0.00s)
> === RUN   TestECDSAVerifierWithInvalidKey
> --- PASS: TestECDSAVerifierWithInvalidKey (0.00s)
> === RUN   TestECDSAVerifierWithInvalidSignature
> --- PASS: TestECDSAVerifierWithInvalidSignature (0.00s)
> === RUN   TestED25519VerifierInvalidKeyType
> --- PASS: TestED25519VerifierInvalidKeyType (0.00s)
> === RUN   TestRSAPyCryptoVerifierInvalidKeyType
> --- PASS: TestRSAPyCryptoVerifierInvalidKeyType (0.00s)
> === RUN   TestPyCryptoRSAPSSCompat
> --- PASS: TestPyCryptoRSAPSSCompat (0.00s)
> === RUN   TestPyNaCled25519Compat
> --- PASS: TestPyNaCled25519Compat (0.00s)
> === RUN   TestRoleNoKeys
> --- PASS: TestRoleNoKeys (0.00s)
> === RUN   TestNotEnoughSigs
> --- PASS: TestNotEnoughSigs (0.00s)
> === RUN   TestNoSigs
> --- PASS: TestNoSigs (0.00s)
> === RUN   TestExactlyEnoughSigs
> --- PASS: TestExactlyEnoughSigs (0.00s)
> === RUN   TestIsValidNotExported
> --- PASS: TestIsValidNotExported (0.00s)
> === RUN   TestMoreThanEnoughSigs
> --- PASS: TestMoreThanEnoughSigs (0.00s)
> === RUN   TestValidSigWithIncorrectKeyID
> --- PASS: TestValidSigWithIncorrectKeyID (0.00s)
> === RUN   TestDuplicateSigs
> --- PASS: TestDuplicateSigs (0.00s)
> === RUN   TestUnknownKeyBelowThreshold
> --- PASS: TestUnknownKeyBelowThreshold (0.00s)
> === RUN   TestVerifyVersion
> --- PASS: TestVerifyVersion (0.00s)
> === RUN   TestVerifyExpiry
> time="2020-03-22T08:31:26Z" level=error msg="Metadata for root expired"
> --- PASS: TestVerifyExpiry (0.00s)
> === RUN   TestVerifyPublicKeyMatchesPrivateKeyHappyCase
> --- PASS: TestVerifyPublicKeyMatchesPrivateKeyHappyCase (0.00s)
> === RUN   TestVerifyPublicKeyMatchesPrivateKeyFails
> --- PASS: TestVerifyPublicKeyMatchesPrivateKeyFails (0.00s)
> PASS
> ok  	github.com/theupdateframework/notary/tuf/signed	0.278s
> === RUN   TestNewSwizzler
> --- PASS: TestNewSwizzler (0.02s)
> === RUN   TestSwizzlerSetInvalidJSON
> --- PASS: TestSwizzlerSetInvalidJSON (0.00s)
> === RUN   TestSwizzlerAddExtraSpace
> --- PASS: TestSwizzlerAddExtraSpace (0.00s)
> === RUN   TestSwizzlerSetInvalidSigned
> --- PASS: TestSwizzlerSetInvalidSigned (0.00s)
> === RUN   TestSwizzlerSetInvalidSignedMeta
> --- PASS: TestSwizzlerSetInvalidSignedMeta (0.00s)
> === RUN   TestSwizzlerSetInvalidMetadataType
> --- PASS: TestSwizzlerSetInvalidMetadataType (0.00s)
> === RUN   TestSwizzlerInvalidateMetadataSignatures
> --- PASS: TestSwizzlerInvalidateMetadataSignatures (0.00s)
> === RUN   TestSwizzlerRemoveMetadata
> --- PASS: TestSwizzlerRemoveMetadata (0.00s)
> === RUN   TestSwizzlerSignMetadataWithInvalidKey
> --- PASS: TestSwizzlerSignMetadataWithInvalidKey (0.01s)
> === RUN   TestSwizzlerOffsetMetadataVersion
> --- PASS: TestSwizzlerOffsetMetadataVersion (0.01s)
> === RUN   TestSwizzlerExpireMetadata
> --- PASS: TestSwizzlerExpireMetadata (0.00s)
> === RUN   TestSwizzlerSetThresholdBaseRole
> --- PASS: TestSwizzlerSetThresholdBaseRole (0.00s)
> === RUN   TestSwizzlerSetThresholdDelegatedRole
> --- PASS: TestSwizzlerSetThresholdDelegatedRole (0.00s)
> === RUN   TestSwizzlerChangeRootKey
> --- PASS: TestSwizzlerChangeRootKey (0.01s)
> === RUN   TestSwizzlerUpdateSnapshotHashesSpecifiedRoles
> --- PASS: TestSwizzlerUpdateSnapshotHashesSpecifiedRoles (0.01s)
> === RUN   TestSwizzlerUpdateSnapshotHashesNoSpecifiedRoles
> --- PASS: TestSwizzlerUpdateSnapshotHashesNoSpecifiedRoles (0.01s)
> === RUN   TestSwizzlerUpdateTimestamp
> --- PASS: TestSwizzlerUpdateTimestamp (0.01s)
> === RUN   TestMissingSigningKey
> --- PASS: TestMissingSigningKey (0.00s)
> === RUN   TestSwizzlerMutateRoot
> --- PASS: TestSwizzlerMutateRoot (0.00s)
> === RUN   TestSwizzlerMutateTimestamp
> --- PASS: TestSwizzlerMutateTimestamp (0.00s)
> === RUN   TestSwizzlerMutateSnapshot
> --- PASS: TestSwizzlerMutateSnapshot (0.00s)
> === RUN   TestSwizzlerMutateTargets
> --- PASS: TestSwizzlerMutateTargets (0.00s)
> === RUN   TestSwizzlerRotateKeyBaseRole
> --- PASS: TestSwizzlerRotateKeyBaseRole (0.01s)
> === RUN   TestSwizzlerRotateKeyDelegationRole
> --- PASS: TestSwizzlerRotateKeyDelegationRole (0.00s)
> PASS
> ok  	github.com/theupdateframework/notary/tuf/testutils	0.147s
> ?   	github.com/theupdateframework/notary/tuf/testutils/interfaces	[no test files]
> ?   	github.com/theupdateframework/notary/tuf/testutils/keys	[no test files]
> === RUN   TestConvertTUFKeyToPKCS8
> --- PASS: TestConvertTUFKeyToPKCS8 (0.04s)
> === RUN   TestParsePKCS8ToTufKey
> --- PASS: TestParsePKCS8ToTufKey (0.21s)
> === RUN   TestPEMtoPEM
> --- PASS: TestPEMtoPEM (0.00s)
> === RUN   TestRoleListLen
> --- PASS: TestRoleListLen (0.00s)
> === RUN   TestRoleListLess
> --- PASS: TestRoleListLess (0.00s)
> === RUN   TestRoleListSwap
> --- PASS: TestRoleListSwap (0.00s)
> === RUN   TestRoleListSort
> --- PASS: TestRoleListSort (0.00s)
> === RUN   TestCreateStack
> --- PASS: TestCreateStack (0.00s)
> === RUN   TestPush
> --- PASS: TestPush (0.00s)
> === RUN   TestPop
> --- PASS: TestPop (0.00s)
> === RUN   TestPopEmpty
> --- PASS: TestPopEmpty (0.00s)
> === RUN   TestPopString
> --- PASS: TestPopString (0.00s)
> === RUN   TestPopStringWrongType
> --- PASS: TestPopStringWrongType (0.00s)
> === RUN   TestPopStringEmpty
> --- PASS: TestPopStringEmpty (0.00s)
> === RUN   TestEmpty
> --- PASS: TestEmpty (0.00s)
> === RUN   TestUnusedDelegationKeys
> --- PASS: TestUnusedDelegationKeys (0.00s)
> === RUN   TestRemoveUnusedKeys
> --- PASS: TestRemoveUnusedKeys (0.00s)
> === RUN   TestFindRoleIndexFound
> --- PASS: TestFindRoleIndexFound (0.00s)
> === RUN   TestFindRoleIndexNotFound
> --- PASS: TestFindRoleIndexNotFound (0.00s)
> === RUN   TestCertsToKeys
> --- PASS: TestCertsToKeys (0.00s)
> === RUN   TestNewCertificate
> --- PASS: TestNewCertificate (0.00s)
> === RUN   TestKeyOperations
> --- PASS: TestKeyOperations (0.04s)
> === RUN   TestRSAX509PublickeyID
> --- PASS: TestRSAX509PublickeyID (0.00s)
> === RUN   TestECDSAX509PublickeyID
> --- PASS: TestECDSAX509PublickeyID (0.00s)
> === RUN   TestExtractPrivateKeyAttributes
> --- PASS: TestExtractPrivateKeyAttributes (0.00s)
> === RUN   TestParsePEMPrivateKeyLegacy
> --- PASS: TestParsePEMPrivateKeyLegacy (0.00s)
> === RUN   TestValidateCertificateWithSHA1
> --- PASS: TestValidateCertificateWithSHA1 (0.00s)
> === RUN   TestValidateCertificateWithExpiredCert
> --- PASS: TestValidateCertificateWithExpiredCert (0.00s)
> === RUN   TestValidateCertificateWithInvalidExpiry
> --- PASS: TestValidateCertificateWithInvalidExpiry (0.00s)
> === RUN   TestValidateCertificateWithShortKey
> --- PASS: TestValidateCertificateWithShortKey (0.03s)
> PASS
> ok  	github.com/theupdateframework/notary/tuf/utils	0.325s
> === RUN   TestNewSerializableErrorNonValidationError
> --- PASS: TestNewSerializableErrorNonValidationError (0.00s)
> === RUN   TestNewSerializableErrorValidationError
> --- PASS: TestNewSerializableErrorValidationError (0.00s)
> === RUN   TestUnmarshalSerialiableErrorSuccessfully
> --- PASS: TestUnmarshalSerialiableErrorSuccessfully (0.00s)
> === RUN   TestUnmarshalUnknownErrorName
> --- PASS: TestUnmarshalUnknownErrorName (0.00s)
> === RUN   TestUnmarshalInvalidError
> --- PASS: TestUnmarshalInvalidError (0.00s)
> === RUN   TestUnmarshalNoName
> --- PASS: TestUnmarshalNoName (0.00s)
> === RUN   TestUnmarshalInvalidJSON
> --- PASS: TestUnmarshalInvalidJSON (0.00s)
> PASS
> ok  	github.com/theupdateframework/notary/tuf/validation	0.008s
> === RUN   TestSetSignalTrap
> --- PASS: TestSetSignalTrap (0.00s)
> === RUN   TestLogLevelSignalHandle
> Attempt to increase log level failed, will remain at debug level, error: log level can not be set higher than Debug
> Successfully setting log level to debug
> Successfully setting log level to info
> Successfully setting log level to warning
> Successfully setting log level to error
> Successfully setting log level to fatal
> Successfully setting log level to info
> Successfully setting log level to warning
> Successfully setting log level to error
> Successfully setting log level to fatal
> Successfully setting log level to panic
> Attempt to decrease log level failed, will remain at panic level, error: log level can not be set lower than Panic
> --- PASS: TestLogLevelSignalHandle (0.00s)
> === RUN   TestParseInvalidLogLevel
> --- PASS: TestParseInvalidLogLevel (0.00s)
> === RUN   TestParseNoLogLevel
> --- PASS: TestParseNoLogLevel (0.00s)
> === RUN   TestParseLogLevel
> --- PASS: TestParseLogLevel (0.00s)
> === RUN   TestParseLogLevelWithEnvironmentVariables
> --- PASS: TestParseLogLevelWithEnvironmentVariables (0.00s)
> === RUN   TestParseInvalidBugsnag
> --- PASS: TestParseInvalidBugsnag (0.00s)
> === RUN   TestParseNoBugsnag
> --- PASS: TestParseNoBugsnag (0.00s)
> === RUN   TestParseBugsnag
> --- PASS: TestParseBugsnag (0.00s)
> === RUN   TestParseBugsnagWithEnvironmentVariables
> --- PASS: TestParseBugsnagWithEnvironmentVariables (0.00s)
> === RUN   TestParseInvalidStorageBackend
> --- PASS: TestParseInvalidStorageBackend (0.00s)
> === RUN   TestParseInvalidSQLStorageNoDBSource
> --- PASS: TestParseInvalidSQLStorageNoDBSource (0.00s)
> === RUN   TestParseInvalidDBSourceInSQLStorage
> --- PASS: TestParseInvalidDBSourceInSQLStorage (0.00s)
> === RUN   TestParseSQLStorageDBStore
> --- PASS: TestParseSQLStorageDBStore (0.00s)
> === RUN   TestParseRethinkStorageDBStoreInvalidBackend
> --- PASS: TestParseRethinkStorageDBStoreInvalidBackend (0.00s)
> === RUN   TestParseRethinkStorageDBStoreEmptyDBUrl
> --- PASS: TestParseRethinkStorageDBStoreEmptyDBUrl (0.00s)
> === RUN   TestParseRethinkStorageDBStoreEmptyDBName
> --- PASS: TestParseRethinkStorageDBStoreEmptyDBName (0.00s)
> === RUN   TestParseRethinkStorageDBStoreEmptyCA
> --- PASS: TestParseRethinkStorageDBStoreEmptyCA (0.00s)
> === RUN   TestParseRethinkStorageDBStoreEmptyCertAndKey
> --- PASS: TestParseRethinkStorageDBStoreEmptyCertAndKey (0.00s)
> === RUN   TestParseRethinkStorageDBStoreEmptyUsername
> --- PASS: TestParseRethinkStorageDBStoreEmptyUsername (0.00s)
> === RUN   TestParseSQLStorageWithEnvironmentVariables
> --- PASS: TestParseSQLStorageWithEnvironmentVariables (0.00s)
> === RUN   TestParseTLSNoTLSWhenRequired
> --- PASS: TestParseTLSNoTLSWhenRequired (0.00s)
> === RUN   TestParseTLSPartialTLS
> --- PASS: TestParseTLSPartialTLS (0.00s)
> === RUN   TestParseTLSNoTLSNotRequired
> --- PASS: TestParseTLSNoTLSNotRequired (0.00s)
> === RUN   TestParseTLSWithTLS
> --- PASS: TestParseTLSWithTLS (0.00s)
> === RUN   TestParseTLSWithTLSRelativeToConfigFile
> --- PASS: TestParseTLSWithTLSRelativeToConfigFile (0.00s)
> === RUN   TestParseTLSWithEnvironmentVariables
> --- PASS: TestParseTLSWithEnvironmentVariables (0.00s)
> === RUN   TestParseViperWithInvalidFile
> --- PASS: TestParseViperWithInvalidFile (0.00s)
> === RUN   TestParseViperWithValidFile
> --- PASS: TestParseViperWithValidFile (0.00s)
> === RUN   TestAdjustLogLevel
> --- PASS: TestAdjustLogLevel (0.00s)
> === RUN   TestRootHandlerFactory
> --- PASS: TestRootHandlerFactory (0.00s)
> === RUN   TestRootHandlerError
> --- PASS: TestRootHandlerError (0.00s)
> === RUN   TestWrapWithCacheHeaderNilCacheControlConfig
> --- PASS: TestWrapWithCacheHeaderNilCacheControlConfig (0.00s)
> === RUN   TestWrapWithCacheHeaderNon200Response
> --- PASS: TestWrapWithCacheHeaderNon200Response (0.00s)
> === RUN   TestWrapWithCacheHeaderPublicCacheControlNoCacheHeaders
> --- PASS: TestWrapWithCacheHeaderPublicCacheControlNoCacheHeaders (0.00s)
> === RUN   TestWrapWithCacheHeaderPublicCacheControlLastModifiedHeader
> --- PASS: TestWrapWithCacheHeaderPublicCacheControlLastModifiedHeader (0.00s)
> === RUN   TestWrapWithCacheHeaderPublicCacheControlCacheControlHeader
> --- PASS: TestWrapWithCacheHeaderPublicCacheControlCacheControlHeader (0.00s)
> === RUN   TestWrapWithCacheHeaderNoCacheControlNoCacheHeaders
> --- PASS: TestWrapWithCacheHeaderNoCacheControlNoCacheHeaders (0.00s)
> === RUN   TestWrapWithCacheHeaderNoCacheControlLastModifiedHeader
> --- PASS: TestWrapWithCacheHeaderNoCacheControlLastModifiedHeader (0.00s)
> === RUN   TestWrapWithCacheHeaderNoCacheControlCacheControlHeader
> --- PASS: TestWrapWithCacheHeaderNoCacheControlCacheControlHeader (0.00s)
> === RUN   TestBuildCatalogRecord
> --- PASS: TestBuildCatalogRecord (0.00s)
> === RUN   TestDoAuthNonWildcardImage
> --- PASS: TestDoAuthNonWildcardImage (0.00s)
> === RUN   TestDoAuthWildcardImage
> --- PASS: TestDoAuthWildcardImage (0.00s)
> PASS
> ok  	github.com/theupdateframework/notary/utils	0.010s
> ?   	github.com/theupdateframework/notary/version	[no test files]
> FAIL
> dh_auto_test: error: cd _build && go test -vet=off -v -p 4 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version returned exit code 1

The full build log is available from:
   http://qa-logs.debian.net/2020/03/22/notary_0.6.1~ds2-5_unstable.log

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.



More information about the Pkg-go-maintainers mailing list