Diff of the two buildlogs: -- --- b1/build.log 2025-02-16 01:00:26.240796942 +0000 +++ b2/build.log 2025-02-16 01:11:21.395237178 +0000 @@ -1,6 +1,6 @@ I: pbuilder: network access will be disabled during build -I: Current time: Fri Mar 20 19:18:20 -12 2026 -I: pbuilder-time-stamp: 1774077500 +I: Current time: Sun Feb 16 15:00:29 +14 2025 +I: pbuilder-time-stamp: 1739667629 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/unstable-reproducible-base.tgz] I: copying local configuration @@ -29,52 +29,84 @@ dpkg-source: info: applying fix-timebomb-ftbfs.patch I: Not using root during the build. I: Installing the build-deps -I: user script /srv/workspace/pbuilder/3141796/tmp/hooks/D02_print_environment starting +I: user script /srv/workspace/pbuilder/85135/tmp/hooks/D01_modify_environment starting +debug: Running on ionos1-amd64. +I: Changing host+domainname to test build reproducibility +I: Adding a custom variable just for the fun of it... +I: Changing /bin/sh to bash +'/bin/sh' -> '/bin/bash' +lrwxrwxrwx 1 root root 9 Feb 16 01:00 /bin/sh -> /bin/bash +I: Setting pbuilder2's login shell to /bin/bash +I: Setting pbuilder2's GECOS to second user,second room,second work-phone,second home-phone,second other +I: user script /srv/workspace/pbuilder/85135/tmp/hooks/D01_modify_environment finished +I: user script /srv/workspace/pbuilder/85135/tmp/hooks/D02_print_environment starting I: set - BUILDDIR='/build/reproducible-path' - BUILDUSERGECOS='first user,first room,first work-phone,first home-phone,first other' - BUILDUSERNAME='pbuilder1' - BUILD_ARCH='amd64' - DEBIAN_FRONTEND='noninteractive' - DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=42 ' - DISTRIBUTION='unstable' - HOME='/root' - HOST_ARCH='amd64' + BASH=/bin/sh + BASHOPTS=checkwinsize:cmdhist:complete_fullquote:extquote:force_fignore:globasciiranges:globskipdots:hostcomplete:interactive_comments:patsub_replacement:progcomp:promptvars:sourcepath + BASH_ALIASES=() + BASH_ARGC=() + BASH_ARGV=() + BASH_CMDS=() + BASH_LINENO=([0]="12" [1]="0") + BASH_LOADABLES_PATH=/usr/local/lib/bash:/usr/lib/bash:/opt/local/lib/bash:/usr/pkg/lib/bash:/opt/pkg/lib/bash:. + BASH_SOURCE=([0]="/tmp/hooks/D02_print_environment" [1]="/tmp/hooks/D02_print_environment") + BASH_VERSINFO=([0]="5" [1]="2" [2]="37" [3]="1" [4]="release" [5]="x86_64-pc-linux-gnu") + BASH_VERSION='5.2.37(1)-release' + BUILDDIR=/build/reproducible-path + BUILDUSERGECOS='second user,second room,second work-phone,second home-phone,second other' + BUILDUSERNAME=pbuilder2 + BUILD_ARCH=amd64 + DEBIAN_FRONTEND=noninteractive + DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=20 ' + DIRSTACK=() + DISTRIBUTION=unstable + EUID=0 + FUNCNAME=([0]="Echo" [1]="main") + GROUPS=() + HOME=/root + HOSTNAME=i-capture-the-hostname + HOSTTYPE=x86_64 + HOST_ARCH=amd64 IFS=' ' - INVOCATION_ID='c7b7526e89f74f61bd9cb2e3039f0941' - LANG='C' - LANGUAGE='en_US:en' - LC_ALL='C' - MAIL='/var/mail/root' - OPTIND='1' - PATH='/usr/sbin:/usr/bin:/sbin:/bin:/usr/games' - PBCURRENTCOMMANDLINEOPERATION='build' - PBUILDER_OPERATION='build' - PBUILDER_PKGDATADIR='/usr/share/pbuilder' - PBUILDER_PKGLIBDIR='/usr/lib/pbuilder' - PBUILDER_SYSCONFDIR='/etc' - PPID='3141796' - PS1='# ' - PS2='> ' + INVOCATION_ID=ef2291472d034018870dd8b4ad1d4c2c + LANG=C + LANGUAGE=et_EE:et + LC_ALL=C + MACHTYPE=x86_64-pc-linux-gnu + MAIL=/var/mail/root + OPTERR=1 + OPTIND=1 + OSTYPE=linux-gnu + PATH=/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path + PBCURRENTCOMMANDLINEOPERATION=build + PBUILDER_OPERATION=build + PBUILDER_PKGDATADIR=/usr/share/pbuilder + PBUILDER_PKGLIBDIR=/usr/lib/pbuilder + PBUILDER_SYSCONFDIR=/etc + PIPESTATUS=([0]="0") + POSIXLY_CORRECT=y + PPID=85135 PS4='+ ' - PWD='/' - SHELL='/bin/bash' - SHLVL='2' - SUDO_COMMAND='/usr/bin/timeout -k 18.1h 18h /usr/bin/ionice -c 3 /usr/bin/nice /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.WFB5B8KZ/pbuilderrc_SC3U --distribution unstable --hookdir /etc/pbuilder/first-build-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/unstable-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.WFB5B8KZ/b1 --logfile b1/build.log notary_0.7.0+git20240416.9d2b3b3+ds1-3.dsc' - SUDO_GID='110' - SUDO_UID='105' - SUDO_USER='jenkins' - TERM='unknown' - TZ='/usr/share/zoneinfo/Etc/GMT+12' - USER='root' - _='/usr/bin/systemd-run' - http_proxy='http://213.165.73.152:3128' + PWD=/ + SHELL=/bin/bash + SHELLOPTS=braceexpand:errexit:hashall:interactive-comments:posix + SHLVL=3 + SUDO_COMMAND='/usr/bin/timeout -k 24.1h 24h /usr/bin/ionice -c 3 /usr/bin/nice -n 11 /usr/bin/unshare --uts -- /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.WFB5B8KZ/pbuilderrc_sii9 --distribution unstable --hookdir /etc/pbuilder/rebuild-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/unstable-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.WFB5B8KZ/b2 --logfile b2/build.log notary_0.7.0+git20240416.9d2b3b3+ds1-3.dsc' + SUDO_GID=110 + SUDO_UID=105 + SUDO_USER=jenkins + TERM=unknown + TZ=/usr/share/zoneinfo/Etc/GMT-14 + UID=0 + USER=root + _='I: set' + http_proxy=http://46.16.76.132:3128 I: uname -a - Linux ionos5-amd64 6.12.9+bpo-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.12.9-1~bpo12+1 (2025-01-19) x86_64 GNU/Linux + Linux i-capture-the-hostname 6.1.0-31-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.128-1 (2025-02-07) x86_64 GNU/Linux I: ls -l /bin - lrwxrwxrwx 1 root root 7 Nov 22 2024 /bin -> usr/bin -I: user script /srv/workspace/pbuilder/3141796/tmp/hooks/D02_print_environment finished + lrwxrwxrwx 1 root root 7 Nov 22 14:40 /bin -> usr/bin +I: user script /srv/workspace/pbuilder/85135/tmp/hooks/D02_print_environment finished -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy @@ -401,7 +433,7 @@ Get: 233 http://deb.debian.org/debian unstable/main amd64 protobuf-compiler amd64 3.21.12-10+b4 [84.8 kB] Get: 234 http://deb.debian.org/debian unstable/main amd64 protoc-gen-go-1-5 amd64 1.5.4-1 [1435 kB] Get: 235 http://deb.debian.org/debian unstable/main amd64 protoc-gen-go-grpc amd64 1.64.0-6+b1 [1385 kB] -Fetched 165 MB in 7s (24.4 MB/s) +Fetched 165 MB in 9s (18.3 MB/s) Preconfiguring packages ... Selecting previously unselected package golang-golang-x-sys-dev. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19808 files and directories currently installed.) @@ -1167,8 +1199,8 @@ Setting up tzdata (2025a-2) ... Current default time zone: 'Etc/UTC' -Local time is now: Sat Mar 21 07:20:02 UTC 2026. -Universal Time is now: Sat Mar 21 07:20:02 UTC 2026. +Local time is now: Sun Feb 16 01:05:02 UTC 2025. +Universal Time is now: Sun Feb 16 01:05:02 UTC 2025. Run 'dpkg-reconfigure tzdata' if you wish to change it. Setting up golang-github-cespare-xxhash-dev (2.3.0-1) ... @@ -1362,7 +1394,11 @@ Building tag database... -> Finished parsing the build-deps I: Building the package -I: Running cd /build/reproducible-path/notary-0.7.0+git20240416.9d2b3b3+ds1/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-genchanges -S > ../notary_0.7.0+git20240416.9d2b3b3+ds1-3_source.changes +I: user script /srv/workspace/pbuilder/85135/tmp/hooks/A99_set_merged_usr starting +Not re-configuring usrmerge for unstable +I: user script /srv/workspace/pbuilder/85135/tmp/hooks/A99_set_merged_usr finished +hostname: Name or service not known +I: Running cd /build/reproducible-path/notary-0.7.0+git20240416.9d2b3b3+ds1/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-genchanges -S > ../notary_0.7.0+git20240416.9d2b3b3+ds1-3_source.changes dpkg-buildpackage: info: source package notary dpkg-buildpackage: info: source version 0.7.0+git20240416.9d2b3b3+ds1-3 dpkg-buildpackage: info: source distribution unstable @@ -1646,57 +1682,57 @@ src/github.com/theupdateframework/notary/utils/http.go src/github.com/theupdateframework/notary/utils/http_test.go src/github.com/theupdateframework/notary/version/version.go - cd _build && go install -trimpath -v -p 42 -tags pkcs11 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version -internal/cpu -internal/nettrace -github.com/klauspost/compress/internal/cpuinfo -unicode/utf16 -cmp -internal/itoa -encoding -github.com/theupdateframework/notary/version -internal/profilerecord -internal/runtime/syscall -log/internal + cd _build && go install -trimpath -v -p 20 -tags pkcs11 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version +internal/godebugs +internal/goexperiment +unicode/utf8 +internal/byteorder +internal/goos internal/coverage/rtcov -internal/unsafeheader +internal/msan +internal/profilerecord math/bits -internal/godebugs +internal/asan unicode -internal/msan +cmp +internal/itoa +internal/unsafeheader crypto/internal/fips140/alias -google.golang.org/grpc/serviceconfig -vendor/golang.org/x/crypto/cryptobyte/asn1 -internal/byteorder -unicode/utf8 -internal/asan -vendor/golang.org/x/crypto/internal/alias -sync/atomic -internal/goos -internal/goexperiment internal/goarch -container/list -google.golang.org/protobuf/internal/flags +sync/atomic +internal/cpu +internal/runtime/syscall internal/runtime/atomic -github.com/lib/pq/oid -crypto/internal/boring/sig +encoding crypto/internal/fips140/subtle -internal/runtime/math +unicode/utf16 +log/internal +crypto/internal/boring/sig +vendor/golang.org/x/crypto/cryptobyte/asn1 +internal/nettrace +container/list +vendor/golang.org/x/crypto/internal/alias internal/abi +internal/runtime/math internal/runtime/sys -crypto/internal/fips140deps/byteorder +google.golang.org/protobuf/internal/flags internal/chacha8rand +crypto/internal/fips140deps/byteorder google.golang.org/protobuf/internal/set +google.golang.org/grpc/serviceconfig +github.com/klauspost/compress/internal/cpuinfo +github.com/theupdateframework/notary/version +github.com/lib/pq/oid github.com/pelletier/go-toml/v2/internal/characters -crypto/internal/fips140deps/cpu internal/bytealg +crypto/internal/fips140deps/cpu math internal/runtime/exithook internal/stringslite internal/race -github.com/klauspost/compress -internal/sync internal/runtime/maps +internal/sync +github.com/klauspost/compress runtime internal/reflectlite sync @@ -1706,760 +1742,760 @@ runtime/metrics slices maps -errors -sort -internal/singleflight -internal/testlog internal/bisect +internal/singleflight unique github.com/spf13/viper/internal/encoding +internal/testlog google.golang.org/protobuf/internal/pragma +errors +sort runtime/cgo io -internal/oserror -path strconv +internal/oserror +google.golang.org/grpc/internal/buffer +github.com/hashicorp/hcl/hcl/strconv math/rand/v2 +path vendor/golang.org/x/net/dns/dnsmessage internal/godebug -github.com/hashicorp/hcl/hcl/strconv -google.golang.org/grpc/internal/buffer +syscall hash -crypto/internal/fips140deps/godebug bytes -crypto/internal/randutil strings -math/rand -syscall github.com/beorn7/perks/quantile -crypto -net/netip hash/crc32 hash/fnv +crypto +net/netip +crypto/internal/randutil golang.org/x/crypto/blowfish -reflect encoding/base32 -google.golang.org/grpc/internal/grpcrand -golang.org/x/text/transform -github.com/dvsekhvalnov/jose2go/padding +reflect +crypto/internal/fips140deps/godebug +math/rand vendor/golang.org/x/text/transform +github.com/dvsekhvalnov/jose2go/padding +golang.org/x/text/transform crypto/internal/fips140 crypto/internal/impl bufio -regexp/syntax net/http/internal/ascii +regexp/syntax github.com/munnerz/goautoneg net/http/internal/testcert html golang.org/x/text/runes -crypto/internal/fips140/sha3 +crypto/internal/fips140/sha256 crypto/internal/fips140/sha512 +crypto/internal/fips140/sha3 crypto/tls/internal/fips140tls -crypto/internal/fips140/sha256 +google.golang.org/grpc/internal/grpcrand crypto/sha3 crypto/internal/fips140/hmac crypto/internal/fips140/check crypto/internal/fips140hash crypto/internal/fips140/edwards25519/field -crypto/internal/fips140/bigmod -crypto/internal/fips140/aes -crypto/internal/fips140/nistec/fiat crypto/internal/fips140/hkdf crypto/internal/fips140/tls12 +crypto/internal/fips140/aes +crypto/internal/fips140/nistec/fiat +crypto/internal/fips140/bigmod crypto/internal/fips140/tls13 +regexp crypto/internal/fips140/edwards25519 internal/syscall/unix internal/syscall/execenv time -regexp github.com/jinzhu/inflection +encoding/binary +internal/fmtsort crypto/internal/fips140/nistec +io/fs context +internal/poll google.golang.org/grpc/backoff google.golang.org/grpc/keepalive github.com/bugsnag/bugsnag-go/headers -internal/poll -io/fs -google.golang.org/grpc/internal/backoff golang.org/x/net/context +google.golang.org/grpc/internal/backoff google.golang.org/grpc/internal/grpcsync gopkg.in/rethinkdb/rethinkdb-go.v6/vendor/gopkg.in/cenkalti/backoff.v2 -internal/fmtsort -encoding/binary -github.com/spf13/afero/internal/common -embed -internal/filepathlite -google.golang.org/protobuf/internal/editiondefaults -os encoding/base64 vendor/golang.org/x/crypto/internal/poly1305 +golang.org/x/sys/unix filippo.io/edwards25519/field github.com/cespare/xxhash github.com/klauspost/compress/internal/snapref -golang.org/x/sys/unix +github.com/spf13/afero/internal/common +embed +internal/filepathlite +google.golang.org/protobuf/internal/editiondefaults encoding/pem github.com/dvsekhvalnov/jose2go/base64url github.com/dvsekhvalnov/jose2go/compact +os filippo.io/edwards25519 crypto/internal/sysrand -google.golang.org/protobuf/internal/detrand -google.golang.org/grpc/internal/envconfig -github.com/bugsnag/bugsnag-go/device +fmt io/ioutil -os/signal -github.com/prometheus/procfs/internal/util -internal/sysinfo path/filepath -fmt +google.golang.org/protobuf/internal/detrand +internal/sysinfo +os/signal vendor/golang.org/x/sys/cpu +google.golang.org/grpc/internal/envconfig +github.com/prometheus/procfs/internal/util +github.com/bugsnag/bugsnag-go/device net crypto/internal/entropy crypto/internal/fips140/drbg crypto/internal/fips140only -crypto/internal/fips140/aes/gcm crypto/internal/fips140/ecdh +crypto/internal/fips140/aes/gcm crypto/internal/fips140/ecdsa -crypto/internal/fips140/ed25519 crypto/internal/fips140/rsa +crypto/internal/fips140/ed25519 crypto/internal/fips140/mlkem github.com/spf13/afero/mem os/exec -crypto/rc4 crypto/md5 +crypto/rc4 github.com/theupdateframework/notary crypto/cipher github.com/bugsnag/panicwrap +golang.org/x/term +crypto/internal/boring +crypto/des +vendor/golang.org/x/crypto/chacha20 +crypto/ecdh +crypto/sha512 +crypto/sha256 +crypto/aes +crypto/sha1 +crypto/hmac github.com/docker/go/canonical/json -encoding/json log -math/big +encoding/json encoding/hex +net/url mime/quotedprintable -runtime/debug -database/sql/driver -gopkg.in/ini.v1 -github.com/opencontainers/go-digest -vendor/golang.org/x/net/http2/hpack -golang.org/x/net/http2/hpack -net/http/internal mime -net/url +math/big +compress/flate +vendor/golang.org/x/crypto/chacha20poly1305 +net/http/internal +vendor/golang.org/x/net/http2/hpack +vendor/golang.org/x/text/unicode/norm +github.com/miekg/pkcs11 +flag encoding/csv +golang.org/x/crypto/pbkdf2 +github.com/fsnotify/fsnotify/internal golang.org/x/text/unicode/norm -flag -crypto/internal/boring -github.com/subosito/gotenv text/template/parse -github.com/opencontainers/image-spec/specs-go +github.com/subosito/gotenv github.com/hashicorp/hcl/hcl/token +vendor/golang.org/x/text/unicode/bidi +github.com/spf13/jwalterweatherman +github.com/fsnotify/fsnotify text/tabwriter +gopkg.in/ini.v1 github.com/pelletier/go-toml/v2/internal/danger +github.com/hashicorp/hcl/hcl/ast +github.com/hashicorp/hcl/hcl/scanner +github.com/hashicorp/hcl/json/token +github.com/pelletier/go-toml/v2/unstable +gopkg.in/yaml.v3 +google.golang.org/protobuf/internal/errors +github.com/hashicorp/hcl/json/scanner +go/token +github.com/hashicorp/hcl/hcl/parser +google.golang.org/protobuf/encoding/protowire +compress/gzip +github.com/hashicorp/hcl/json/parser google.golang.org/protobuf/internal/version +vendor/golang.org/x/text/secure/bidirule +google.golang.org/protobuf/reflect/protoreflect +golang.org/x/net/internal/timeseries google.golang.org/grpc/internal/grpclog -google.golang.org/protobuf/internal/errors google.golang.org/grpc/attributes google.golang.org/grpc/internal/idle -go/token +golang.org/x/text/unicode/bidi +golang.org/x/net/http2/hpack +github.com/hashicorp/hcl/hcl/printer github.com/pkg/errors +database/sql/driver +github.com/opencontainers/go-digest +github.com/hashicorp/hcl +github.com/pelletier/go-toml/v2/internal/tracker +github.com/opencontainers/image-spec/specs-go +github.com/bugsnag/bugsnag-go/errors +github.com/distribution/reference +github.com/opencontainers/image-spec/specs-go/v1 github.com/prometheus/procfs/internal/fs -gopkg.in/yaml.v3 -github.com/miekg/pkcs11 -vendor/golang.org/x/text/unicode/norm -compress/flate -crypto/des -vendor/golang.org/x/crypto/chacha20 +runtime/debug +text/template +github.com/theupdateframework/notary/passphrase github.com/klauspost/compress/fse +database/sql os/user +go/scanner +github.com/hailocab/go-hostpool +golang.org/x/text/secure/bidirule +vendor/golang.org/x/net/idna github.com/opentracing/opentracing-go/log -crypto/ecdh -crypto/sha512 -crypto/sha256 -crypto/aes -crypto/sha1 -crypto/hmac -github.com/hashicorp/hcl/hcl/ast -github.com/pelletier/go-toml/v2/unstable -github.com/hashicorp/hcl/hcl/scanner -github.com/hashicorp/hcl/json/token -google.golang.org/protobuf/encoding/protowire gopkg.in/rethinkdb/rethinkdb-go.v6/encoding gopkg.in/rethinkdb/rethinkdb-go.v6/types -github.com/bugsnag/bugsnag-go/errors +golang.org/x/net/idna +internal/profile +runtime/pprof runtime/trace -github.com/davecgh/go-spew/spew -github.com/pmezard/go-difflib/difflib -golang.org/x/crypto/pbkdf2 -github.com/distribution/reference -github.com/opencontainers/image-spec/specs-go/v1 -github.com/hashicorp/hcl/json/scanner -github.com/spf13/jwalterweatherman -vendor/golang.org/x/text/unicode/bidi -golang.org/x/net/internal/timeseries -google.golang.org/protobuf/reflect/protoreflect -github.com/hailocab/go-hostpool -golang.org/x/text/unicode/bidi -go/scanner -vendor/golang.org/x/crypto/chacha20poly1305 -github.com/hashicorp/hcl/hcl/parser -database/sql -github.com/hashicorp/hcl/json/parser -github.com/klauspost/compress/huff0 -testing -github.com/pelletier/go-toml/v2/internal/tracker -github.com/hashicorp/hcl/hcl/printer -github.com/hashicorp/hcl -compress/gzip go/ast -vendor/golang.org/x/text/secure/bidirule -runtime/pprof -internal/profile -golang.org/x/text/secure/bidirule +github.com/davecgh/go-spew/spew google.golang.org/protobuf/internal/descfmt +github.com/sirupsen/logrus +github.com/theupdateframework/notary/tuf/validation +github.com/spf13/viper/internal/encoding/hcl +github.com/spf13/viper/internal/encoding/json +github.com/pelletier/go-toml/v2 google.golang.org/protobuf/internal/descopts google.golang.org/protobuf/internal/strs google.golang.org/protobuf/internal/encoding/messageset google.golang.org/protobuf/internal/genid -google.golang.org/protobuf/internal/order -google.golang.org/protobuf/runtime/protoiface -text/template -google.golang.org/protobuf/reflect/protoregistry -google.golang.org/protobuf/internal/encoding/json google.golang.org/protobuf/internal/encoding/text -vendor/golang.org/x/net/idna -golang.org/x/net/idna -github.com/fsnotify/fsnotify/internal -golang.org/x/term -google.golang.org/protobuf/proto -github.com/theupdateframework/notary/tuf/validation -github.com/spf13/viper/internal/encoding/hcl -github.com/sirupsen/logrus -github.com/spf13/viper/internal/encoding/json -github.com/pelletier/go-toml/v2 -google.golang.org/grpc/grpclog -github.com/fsnotify/fsnotify -github.com/theupdateframework/notary/passphrase -google.golang.org/protobuf/internal/encoding/defval -google.golang.org/grpc/connectivity -github.com/jinzhu/gorm +google.golang.org/protobuf/internal/order crypto/rand crypto/elliptic +github.com/docker/distribution/uuid crypto/internal/boring/bbig encoding/asn1 crypto/dsa -github.com/docker/distribution/uuid -crypto/rsa crypto/ed25519 +crypto/rsa crypto/internal/hpke -github.com/lib/pq/scram +html/template +google.golang.org/protobuf/reflect/protoregistry +golang.org/x/crypto/ed25519 +google.golang.org/protobuf/runtime/protoiface +google.golang.org/grpc/grpclog +google.golang.org/protobuf/internal/encoding/json +github.com/klauspost/compress/huff0 +google.golang.org/protobuf/internal/encoding/defval golang.org/x/crypto/bcrypt +github.com/lib/pq/scram github.com/dvsekhvalnov/jose2go/arrays -github.com/klauspost/compress/zstd -google.golang.org/protobuf/encoding/protodelim -google.golang.org/protobuf/encoding/prototext -google.golang.org/protobuf/internal/filedesc -github.com/dvsekhvalnov/jose2go/kdf +github.com/pmezard/go-difflib/difflib +testing github.com/dvsekhvalnov/jose2go/aes -golang.org/x/crypto/ed25519 -html/template +github.com/dvsekhvalnov/jose2go/kdf +google.golang.org/grpc/connectivity github.com/spf13/viper/internal/encoding/yaml -crypto/x509/pkix +google.golang.org/protobuf/proto +github.com/jinzhu/gorm vendor/golang.org/x/crypto/cryptobyte +crypto/x509/pkix github.com/spf13/viper/internal/encoding/toml -crypto/ecdsa +github.com/klauspost/compress/zstd github.com/spf13/cast -google.golang.org/protobuf/encoding/protojson -google.golang.org/protobuf/internal/encoding/tag -github.com/spf13/viper/internal/encoding/dotenv +google.golang.org/protobuf/internal/filedesc +google.golang.org/protobuf/encoding/protodelim +google.golang.org/protobuf/encoding/prototext +crypto/ecdsa github.com/spf13/viper/internal/encoding/ini +github.com/spf13/viper/internal/encoding/dotenv +google.golang.org/protobuf/internal/encoding/tag +google.golang.org/protobuf/encoding/protojson google.golang.org/protobuf/internal/impl +crypto/x509 net/textproto vendor/golang.org/x/net/http/httpproxy github.com/mitchellh/mapstructure -crypto/x509 -google.golang.org/grpc/internal github.com/spf13/pflag +google.golang.org/grpc/internal google.golang.org/grpc/internal/resolver/dns/internal -github.com/google/uuid google.golang.org/grpc/internal/syscall github.com/prometheus/procfs -google.golang.org/grpc/metadata +github.com/google/uuid google.golang.org/grpc/codes -mime/multipart -vendor/golang.org/x/net/http/httpguts -golang.org/x/net/http/httpguts +google.golang.org/grpc/metadata google.golang.org/grpc/internal/grpcutil google.golang.org/grpc/internal/balancerload google.golang.org/grpc/stats google.golang.org/grpc/tap +mime/multipart +golang.org/x/net/http/httpguts +vendor/golang.org/x/net/http/httpguts google.golang.org/grpc/encoding -github.com/spf13/cobra github.com/theupdateframework/notary/tuf/data github.com/dvsekhvalnov/jose2go/keys/ecc crypto/tls +github.com/spf13/cobra github.com/dvsekhvalnov/jose2go -google.golang.org/protobuf/internal/filetype github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/tuf/utils +google.golang.org/protobuf/internal/filetype google.golang.org/protobuf/runtime/protoimpl -google.golang.org/protobuf/protoadapt google.golang.org/protobuf/types/known/emptypb +google.golang.org/protobuf/protoadapt google.golang.org/protobuf/types/known/durationpb google.golang.org/protobuf/types/known/timestamppb google.golang.org/protobuf/types/known/anypb google.golang.org/protobuf/types/descriptorpb google.golang.org/grpc/encoding/proto google.golang.org/grpc/internal/pretty -github.com/golang/protobuf/ptypes/empty github.com/golang/protobuf/ptypes/duration -google.golang.org/genproto/googleapis/rpc/status -github.com/golang/protobuf/ptypes/timestamp +github.com/golang/protobuf/ptypes/empty github.com/prometheus/client_model/go -google.golang.org/grpc/internal/status +github.com/golang/protobuf/ptypes/timestamp +google.golang.org/genproto/googleapis/rpc/status google.golang.org/grpc/binarylog/grpc_binarylog_v1 +google.golang.org/grpc/internal/status +github.com/prometheus/common/model google.golang.org/grpc/status google.golang.org/grpc/internal/binarylog -github.com/prometheus/common/model google.golang.org/protobuf/types/gofeaturespb google.golang.org/protobuf/reflect/protodesc github.com/prometheus/client_golang/prometheus/internal github.com/golang/protobuf/proto +net/http/httptrace github.com/docker/go-connections/tlsconfig -github.com/docker/libtrust -google.golang.org/grpc/internal/credentials github.com/go-sql-driver/mysql -net/http/httptrace +github.com/docker/libtrust github.com/lib/pq -gopkg.in/rethinkdb/rethinkdb-go.v6/ql2 +google.golang.org/grpc/internal/credentials google.golang.org/grpc/credentials net/http google.golang.org/grpc/internal/channelz google.golang.org/grpc/resolver -google.golang.org/grpc/peer google.golang.org/grpc/credentials/insecure -google.golang.org/grpc/internal/metadata +google.golang.org/grpc/peer google.golang.org/grpc/internal/resolver/passthrough google.golang.org/grpc/internal/transport/networktype google.golang.org/grpc/balancer/grpclb/state -google.golang.org/grpc/internal/resolver/dns +google.golang.org/grpc/internal/metadata google.golang.org/grpc/internal/resolver/unix +google.golang.org/grpc/internal/resolver/dns google.golang.org/grpc/resolver/dns google.golang.org/grpc/channelz google.golang.org/grpc/balancer +gopkg.in/rethinkdb/rethinkdb-go.v6/ql2 google.golang.org/grpc/balancer/base google.golang.org/grpc/internal/serviceconfig google.golang.org/grpc/internal/resolver google.golang.org/grpc/internal/balancer/gracefulswitch google.golang.org/grpc/balancer/roundrobin github.com/theupdateframework/notary/storage -github.com/magiconair/properties -net/http/httptest github.com/spf13/afero +github.com/magiconair/properties +golang.org/x/net/trace net/http/httputil -github.com/bugsnag/bugsnag-go/sessions -github.com/docker/distribution/registry/auth -github.com/gorilla/mux -github.com/docker/distribution/registry/api/errcode -github.com/docker/distribution/registry/client/auth/challenge +github.com/docker/distribution/registry/client/transport expvar +github.com/prometheus/common/expfmt github.com/prometheus/client_golang/internal/github.com/golang/gddo/httputil/header -github.com/docker/distribution net/http/pprof -github.com/opentracing/opentracing-go -github.com/prometheus/common/expfmt -golang.org/x/net/trace -github.com/docker/distribution/registry/client/transport golang.org/x/net/http2 +github.com/opentracing/opentracing-go +github.com/bugsnag/bugsnag-go/sessions +github.com/gorilla/mux +github.com/docker/distribution/registry/api/errcode +github.com/docker/distribution/registry/auth +github.com/docker/distribution +net/http/httptest +github.com/docker/distribution/registry/client/auth/challenge github.com/prometheus/client_golang/internal/github.com/golang/gddo/httputil -github.com/theupdateframework/notary/server/errors github.com/opentracing/opentracing-go/ext +github.com/theupdateframework/notary/server/errors github.com/bugsnag/bugsnag-go gopkg.in/rethinkdb/rethinkdb-go.v6 -github.com/stretchr/testify/assert -github.com/theupdateframework/notary/trustmanager -github.com/spf13/viper/internal/encoding/javaproperties github.com/docker/distribution/context github.com/docker/distribution/registry/api/v2 +github.com/theupdateframework/notary/trustmanager +github.com/stretchr/testify/assert +github.com/spf13/viper/internal/encoding/javaproperties github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/tuf/signed -github.com/Shopify/logrus-bugsnag +github.com/docker/distribution/health +github.com/docker/distribution/registry/auth/htpasswd +github.com/docker/distribution/registry/auth/token github.com/theupdateframework/notary/vendor/github.com/prometheus/client_golang/prometheus github.com/prometheus/client_golang/prometheus github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning -github.com/docker/distribution/health -github.com/docker/distribution/registry/auth/htpasswd github.com/theupdateframework/notary/tuf/testutils/keys -github.com/docker/distribution/registry/auth/token -github.com/theupdateframework/notary/tuf +github.com/Shopify/logrus-bugsnag github.com/spf13/viper +github.com/theupdateframework/notary/tuf +github.com/theupdateframework/notary/utils github.com/stretchr/testify/require -github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/client -github.com/theupdateframework/notary/utils +github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/storage/rethinkdb +github.com/prometheus/client_golang/prometheus/promhttp github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/tuf/testutils/interfaces google.golang.org/grpc/internal/transport -github.com/prometheus/client_golang/prometheus/promhttp -github.com/theupdateframework/notary/server/snapshot -github.com/theupdateframework/notary/server/timestamp -github.com/theupdateframework/notary/server/handlers -github.com/theupdateframework/notary/server github.com/docker/go-metrics -google.golang.org/grpc +github.com/theupdateframework/notary/server/snapshot github.com/docker/distribution/metrics +github.com/theupdateframework/notary/server/timestamp github.com/docker/distribution/registry/storage/cache +github.com/theupdateframework/notary/server/handlers github.com/docker/distribution/registry/storage/cache/memory github.com/docker/distribution/registry/client +github.com/theupdateframework/notary/server github.com/docker/distribution/registry/client/auth +google.golang.org/grpc github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/trustmanager/remoteks -google.golang.org/grpc/health/grpc_health_v1 github.com/theupdateframework/notary/proto +google.golang.org/grpc/health/grpc_health_v1 google.golang.org/grpc/health -github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/client +github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/signer/api -github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cmd/notary-server +github.com/theupdateframework/notary/cmd/notary-signer make[1]: Leaving directory '/build/reproducible-path/notary-0.7.0+git20240416.9d2b3b3+ds1' dh_auto_test -O--builddirectory=/build/reproducible-path/notary-0.7.0\+git20240416.9d2b3b3\+ds1/_build -O--buildsystem=golang - cd _build && go test -vet=off -v -p 42 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/proto/github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/remoteks/github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version + cd _build && go test -vet=off -v -p 20 github.com/theupdateframework/notary github.com/theupdateframework/notary/client github.com/theupdateframework/notary/client/changelist github.com/theupdateframework/notary/cmd/escrow github.com/theupdateframework/notary/cmd/notary github.com/theupdateframework/notary/cmd/notary-server github.com/theupdateframework/notary/cmd/notary-signer github.com/theupdateframework/notary/cryptoservice github.com/theupdateframework/notary/passphrase github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/proto/github.com/theupdateframework/notary/proto github.com/theupdateframework/notary/server github.com/theupdateframework/notary/server/errors github.com/theupdateframework/notary/server/handlers github.com/theupdateframework/notary/server/snapshot github.com/theupdateframework/notary/server/storage github.com/theupdateframework/notary/server/timestamp github.com/theupdateframework/notary/signer github.com/theupdateframework/notary/signer/api github.com/theupdateframework/notary/signer/client github.com/theupdateframework/notary/signer/keydbstore github.com/theupdateframework/notary/storage github.com/theupdateframework/notary/storage/rethinkdb github.com/theupdateframework/notary/trustmanager github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/remoteks/github.com/theupdateframework/notary/trustmanager/remoteks github.com/theupdateframework/notary/trustmanager/yubikey github.com/theupdateframework/notary/trustpinning github.com/theupdateframework/notary/tuf github.com/theupdateframework/notary/tuf/data github.com/theupdateframework/notary/tuf/signed github.com/theupdateframework/notary/tuf/testutils github.com/theupdateframework/notary/tuf/testutils/interfaces github.com/theupdateframework/notary/tuf/testutils/keys github.com/theupdateframework/notary/tuf/utils github.com/theupdateframework/notary/tuf/validation github.com/theupdateframework/notary/utils github.com/theupdateframework/notary/version ? github.com/theupdateframework/notary [no test files] === RUN Test0Dot1Migration ---- PASS: Test0Dot1Migration (0.05s) +--- PASS: Test0Dot1Migration (0.16s) === RUN Test0Dot3Migration ---- PASS: Test0Dot3Migration (0.05s) +--- PASS: Test0Dot3Migration (0.14s) === RUN Test0Dot1RepoFormat -time="2026-03-20T19:21:36-12:00" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: Test0Dot1RepoFormat (0.32s) +time="2025-02-16T15:08:17+14:00" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: Test0Dot1RepoFormat (0.60s) === RUN Test0Dot3RepoFormat backwards_compatibility_test.go:248: Disable FTBFS timebomb. https://bugs.debian.org/1078632 --- SKIP: Test0Dot3RepoFormat (0.00s) === RUN TestDownloading0Dot1RepoFormat ---- PASS: TestDownloading0Dot1RepoFormat (0.03s) +--- PASS: TestDownloading0Dot1RepoFormat (0.02s) === RUN TestDownloading0Dot3RepoFormat backwards_compatibility_test.go:343: Disable FTBFS timebomb. https://bugs.debian.org/1078632 --- SKIP: TestDownloading0Dot3RepoFormat (0.00s) === RUN TestInitRepositoryManagedRolesIncludingRoot --- PASS: TestInitRepositoryManagedRolesIncludingRoot (0.01s) === RUN TestInitRepositoryManagedRolesInvalidRole ---- PASS: TestInitRepositoryManagedRolesInvalidRole (0.06s) +--- PASS: TestInitRepositoryManagedRolesInvalidRole (0.01s) === RUN TestInitRepositoryManagedRolesIncludingTargets ---- PASS: TestInitRepositoryManagedRolesIncludingTargets (0.25s) +--- PASS: TestInitRepositoryManagedRolesIncludingTargets (0.00s) === RUN TestInitRepositoryManagedRolesIncludingTimestamp ---- PASS: TestInitRepositoryManagedRolesIncludingTimestamp (0.16s) +--- PASS: TestInitRepositoryManagedRolesIncludingTimestamp (0.02s) === RUN TestInitRepositoryWithCerts ---- PASS: TestInitRepositoryWithCerts (0.06s) +--- PASS: TestInitRepositoryWithCerts (0.04s) === RUN TestMatchKeyIDsWithPublicKeys ---- PASS: TestMatchKeyIDsWithPublicKeys (0.01s) +--- PASS: TestMatchKeyIDsWithPublicKeys (0.02s) === RUN TestInitRepositoryNeedsRemoteTimestampKey ---- PASS: TestInitRepositoryNeedsRemoteTimestampKey (0.02s) +--- PASS: TestInitRepositoryNeedsRemoteTimestampKey (0.03s) === RUN TestInitRepositoryNeedsRemoteSnapshotKey ---- PASS: TestInitRepositoryNeedsRemoteSnapshotKey (0.01s) +--- PASS: TestInitRepositoryNeedsRemoteSnapshotKey (0.02s) === RUN TestInitRepoServerOnlyManagesTimestampKey ---- PASS: TestInitRepoServerOnlyManagesTimestampKey (0.19s) +--- PASS: TestInitRepoServerOnlyManagesTimestampKey (0.22s) === RUN TestInitRepoServerManagesTimestampAndSnapshotKeys ---- PASS: TestInitRepoServerManagesTimestampAndSnapshotKeys (0.14s) +--- PASS: TestInitRepoServerManagesTimestampAndSnapshotKeys (0.21s) === RUN TestInitRepoAttemptsExceeded ---- PASS: TestInitRepoAttemptsExceeded (0.16s) +--- PASS: TestInitRepoAttemptsExceeded (0.10s) === RUN TestInitRepoPasswordInvalid ---- PASS: TestInitRepoPasswordInvalid (0.02s) +--- PASS: TestInitRepoPasswordInvalid (0.01s) === RUN TestAddTargetToTargetRoleByDefault ---- PASS: TestAddTargetToTargetRoleByDefault (0.06s) +--- PASS: TestAddTargetToTargetRoleByDefault (0.04s) === RUN TestAddTargetToSpecifiedValidRoles ---- PASS: TestAddTargetToSpecifiedValidRoles (0.05s) +--- PASS: TestAddTargetToSpecifiedValidRoles (0.06s) === RUN TestAddTargetToSpecifiedInvalidRoles ---- PASS: TestAddTargetToSpecifiedInvalidRoles (0.04s) +--- PASS: TestAddTargetToSpecifiedInvalidRoles (0.08s) === RUN TestAddTargetWithInvalidTarget ---- PASS: TestAddTargetWithInvalidTarget (0.02s) +--- PASS: TestAddTargetWithInvalidTarget (0.05s) === RUN TestAddTargetErrorWritingChanges --- PASS: TestAddTargetErrorWritingChanges (0.03s) === RUN TestRemoveTargetToTargetRoleByDefault ---- PASS: TestRemoveTargetToTargetRoleByDefault (0.04s) +--- PASS: TestRemoveTargetToTargetRoleByDefault (0.13s) === RUN TestRemoveTargetFromSpecifiedValidRoles ---- PASS: TestRemoveTargetFromSpecifiedValidRoles (0.05s) +--- PASS: TestRemoveTargetFromSpecifiedValidRoles (0.11s) === RUN TestRemoveTargetToSpecifiedInvalidRoles ---- PASS: TestRemoveTargetToSpecifiedInvalidRoles (0.05s) +--- PASS: TestRemoveTargetToSpecifiedInvalidRoles (0.09s) === RUN TestRemoveTargetErrorWritingChanges ---- PASS: TestRemoveTargetErrorWritingChanges (0.02s) +--- PASS: TestRemoveTargetErrorWritingChanges (0.07s) === RUN TestListTarget ---- PASS: TestListTarget (0.59s) +--- PASS: TestListTarget (1.35s) === RUN TestListTargetRestrictsDelegationPaths ---- PASS: TestListTargetRestrictsDelegationPaths (0.09s) +--- PASS: TestListTargetRestrictsDelegationPaths (0.24s) === RUN TestValidateRootKey ---- PASS: TestValidateRootKey (0.07s) +--- PASS: TestValidateRootKey (0.16s) === RUN TestGetChangelist ---- PASS: TestGetChangelist (0.08s) +--- PASS: TestGetChangelist (0.15s) === RUN TestPublishBareRepo ---- PASS: TestPublishBareRepo (0.48s) +--- PASS: TestPublishBareRepo (2.00s) === RUN TestPublishUninitializedRepo -time="2026-03-20T19:21:39-12:00" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time" ---- PASS: TestPublishUninitializedRepo (0.07s) +time="2025-02-16T15:08:23+14:00" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time" +--- PASS: TestPublishUninitializedRepo (0.13s) === RUN TestPublishClientHasSnapshotKey ---- PASS: TestPublishClientHasSnapshotKey (0.50s) +--- PASS: TestPublishClientHasSnapshotKey (1.69s) === RUN TestPublishAfterInitServerHasSnapshotKey ---- PASS: TestPublishAfterInitServerHasSnapshotKey (0.48s) +--- PASS: TestPublishAfterInitServerHasSnapshotKey (1.34s) === RUN TestPublishAfterPullServerHasSnapshotKey ---- PASS: TestPublishAfterPullServerHasSnapshotKey (0.18s) +--- PASS: TestPublishAfterPullServerHasSnapshotKey (0.44s) === RUN TestPublishNoOneHasSnapshotKey ---- PASS: TestPublishNoOneHasSnapshotKey (0.12s) +--- PASS: TestPublishNoOneHasSnapshotKey (0.29s) === RUN TestPublishSnapshotCorrupt ---- PASS: TestPublishSnapshotCorrupt (0.26s) +--- PASS: TestPublishSnapshotCorrupt (0.72s) === RUN TestPublishTargetsCorrupt ---- PASS: TestPublishTargetsCorrupt (0.14s) +--- PASS: TestPublishTargetsCorrupt (0.32s) === RUN TestPublishRootCorrupt -time="2026-03-20T19:21:41-12:00" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')" -time="2026-03-20T19:21:41-12:00" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')" ---- PASS: TestPublishRootCorrupt (0.09s) +time="2025-02-16T15:08:28+14:00" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')" +time="2025-02-16T15:08:28+14:00" level=error msg="Could not publish Repository since we could not update: invalid character 'h' in literal true (expecting 'r')" +--- PASS: TestPublishRootCorrupt (0.27s) === RUN TestPublishSnapshotLocalKeysCreatedFirst ---- PASS: TestPublishSnapshotLocalKeysCreatedFirst (0.01s) +--- PASS: TestPublishSnapshotLocalKeysCreatedFirst (0.02s) === RUN TestPublishDelegations ---- PASS: TestPublishDelegations (0.15s) +--- PASS: TestPublishDelegations (0.52s) === RUN TestPublishDelegationsX509 ---- PASS: TestPublishDelegationsX509 (0.23s) +--- PASS: TestPublishDelegationsX509 (0.53s) === RUN TestPublishTargetsDelegationScopeFailIfNoKeys -time="2026-03-20T19:21:41-12:00" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist" -time="2026-03-20T19:21:41-12:00" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist" ---- PASS: TestPublishTargetsDelegationScopeFailIfNoKeys (0.13s) +time="2025-02-16T15:08:29+14:00" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist" +time="2025-02-16T15:08:29+14:00" level=error msg="couldn't add target to targets/a/b: tuf: invalid role targets/a/b. delegation does not exist" +--- PASS: TestPublishTargetsDelegationScopeFailIfNoKeys (0.39s) === RUN TestPublishTargetsDelegationSuccessLocallyHasRoles ---- PASS: TestPublishTargetsDelegationSuccessLocallyHasRoles (0.18s) +--- PASS: TestPublishTargetsDelegationSuccessLocallyHasRoles (0.46s) === RUN TestPublishTargetsDelegationNoTargetsKeyNeeded ---- PASS: TestPublishTargetsDelegationNoTargetsKeyNeeded (0.23s) +--- PASS: TestPublishTargetsDelegationNoTargetsKeyNeeded (0.45s) === RUN TestPublishTargetsDelegationSuccessNeedsToDownloadRoles ---- PASS: TestPublishTargetsDelegationSuccessNeedsToDownloadRoles (0.20s) +--- PASS: TestPublishTargetsDelegationSuccessNeedsToDownloadRoles (0.51s) === RUN TestPublishTargetsDelegationFromTwoRepos ---- PASS: TestPublishTargetsDelegationFromTwoRepos (0.15s) +--- PASS: TestPublishTargetsDelegationFromTwoRepos (0.41s) === RUN TestPublishRemoveDelegationKeyFromDelegationRole -time="2026-03-20T19:21:42-12:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2026-03-20T19:21:42-12:00" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: 4e5cdf450f67976ee30a458bf05b65a444f81ee55a33aa832c13c0e5850f3851" ---- PASS: TestPublishRemoveDelegationKeyFromDelegationRole (0.10s) +time="2025-02-16T15:08:31+14:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-16T15:08:31+14:00" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: 9107860ec8b7e6b21a319edd6485b4de4edd4f28cf157205aa6c5fcf0cbc355a" +--- PASS: TestPublishRemoveDelegationKeyFromDelegationRole (0.29s) === RUN TestPublishRemoveDelegation -time="2026-03-20T19:21:42-12:00" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2026-03-20T19:21:42-12:00" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2026-03-20T19:21:42-12:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2026-03-20T19:21:42-12:00" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: " ---- PASS: TestPublishRemoveDelegation (0.08s) +time="2025-02-16T15:08:32+14:00" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-16T15:08:32+14:00" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-16T15:08:32+14:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-16T15:08:32+14:00" level=error msg="couldn't add target to targets/a: could not find necessary signing keys, at least one of these keys must be available: " +--- PASS: TestPublishRemoveDelegation (0.29s) === RUN TestPublishSucceedsDespiteDelegationCorrupt ---- PASS: TestPublishSucceedsDespiteDelegationCorrupt (0.10s) +--- PASS: TestPublishSucceedsDespiteDelegationCorrupt (0.32s) === RUN TestRotateKeyInvalidRole ---- PASS: TestRotateKeyInvalidRole (0.08s) +--- PASS: TestRotateKeyInvalidRole (0.16s) === RUN TestRemoteRotationError ---- PASS: TestRemoteRotationError (0.03s) +--- PASS: TestRemoteRotationError (0.06s) === RUN TestRemoteRotationEndpointError ---- PASS: TestRemoteRotationEndpointError (0.03s) +--- PASS: TestRemoteRotationEndpointError (0.13s) === RUN TestRemoteRotationNoRootKey ---- PASS: TestRemoteRotationNoRootKey (0.08s) +--- PASS: TestRemoteRotationNoRootKey (0.20s) === RUN TestRemoteRotationNoInit -time="2026-03-20T19:21:43-12:00" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time" ---- PASS: TestRemoteRotationNoInit (0.07s) +time="2025-02-16T15:08:33+14:00" level=info msg="No TUF data found locally or remotely - initializing repository docker.com/notary for the first time" +--- PASS: TestRemoteRotationNoInit (0.13s) === RUN TestRotateBeforePublishFromRemoteKeyToLocalKey ---- PASS: TestRotateBeforePublishFromRemoteKeyToLocalKey (0.17s) +--- PASS: TestRotateBeforePublishFromRemoteKeyToLocalKey (0.50s) === RUN TestRotateKeyAfterPublishNoServerManagementChange ---- PASS: TestRotateKeyAfterPublishNoServerManagementChange (0.47s) +--- PASS: TestRotateKeyAfterPublishNoServerManagementChange (1.41s) === RUN TestRotateKeyAfterPublishServerManagementChange ---- PASS: TestRotateKeyAfterPublishServerManagementChange (0.62s) +--- PASS: TestRotateKeyAfterPublishServerManagementChange (1.46s) === RUN TestRotateRootKey ---- PASS: TestRotateRootKey (0.16s) +--- PASS: TestRotateRootKey (0.44s) === RUN TestRotateRootMultiple ---- PASS: TestRotateRootMultiple (0.21s) +--- PASS: TestRotateRootMultiple (0.58s) === RUN TestRotateRootKeyProvided ---- PASS: TestRotateRootKeyProvided (0.29s) +--- PASS: TestRotateRootKeyProvided (0.45s) === RUN TestRotateRootKeyLegacySupport ---- PASS: TestRotateRootKeyLegacySupport (0.25s) +--- PASS: TestRotateRootKeyLegacySupport (0.61s) === RUN TestRemoteServerUnavailableNoLocalCache -time="2026-03-20T19:21:45-12:00" level=error msg="Could not publish Repository since we could not update: unable to reach trust server at this time: 500." ---- PASS: TestRemoteServerUnavailableNoLocalCache (0.00s) +time="2025-02-16T15:08:38+14:00" level=error msg="Could not publish Repository since we could not update: unable to reach trust server at this time: 500." +--- PASS: TestRemoteServerUnavailableNoLocalCache (0.02s) === RUN TestAddDelegationChangefileValid ---- PASS: TestAddDelegationChangefileValid (0.03s) +--- PASS: TestAddDelegationChangefileValid (0.04s) === RUN TestAddDelegationChangefileApplicable ---- PASS: TestAddDelegationChangefileApplicable (0.03s) +--- PASS: TestAddDelegationChangefileApplicable (0.04s) === RUN TestAddDelegationErrorWritingChanges ---- PASS: TestAddDelegationErrorWritingChanges (0.03s) +--- PASS: TestAddDelegationErrorWritingChanges (0.05s) === RUN TestRemoveDelegationChangefileValid --- PASS: TestRemoveDelegationChangefileValid (0.03s) === RUN TestRemoveDelegationChangefileApplicable -time="2026-03-20T19:21:45-12:00" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2026-03-20T19:21:45-12:00" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" ---- PASS: TestRemoveDelegationChangefileApplicable (0.03s) +time="2025-02-16T15:08:38+14:00" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-16T15:08:38+14:00" level=warning msg="role targets/a has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +--- PASS: TestRemoveDelegationChangefileApplicable (0.06s) === RUN TestClearAllPathsDelegationChangefileApplicable ---- PASS: TestClearAllPathsDelegationChangefileApplicable (0.03s) +--- PASS: TestClearAllPathsDelegationChangefileApplicable (0.07s) === RUN TestFullAddDelegationChangefileApplicable ---- PASS: TestFullAddDelegationChangefileApplicable (0.04s) +--- PASS: TestFullAddDelegationChangefileApplicable (0.10s) === RUN TestFullRemoveDelegationChangefileApplicable ---- PASS: TestFullRemoveDelegationChangefileApplicable (0.04s) +--- PASS: TestFullRemoveDelegationChangefileApplicable (0.05s) === RUN TestRemoveDelegationErrorWritingChanges ---- PASS: TestRemoveDelegationErrorWritingChanges (0.02s) +--- PASS: TestRemoveDelegationErrorWritingChanges (0.04s) === RUN TestClientInvalidURL --- PASS: TestClientInvalidURL (0.00s) === RUN TestPublishTargetsDelegationCanUseUserKeyWithArbitraryRole ---- PASS: TestPublishTargetsDelegationCanUseUserKeyWithArbitraryRole (0.35s) +--- PASS: TestPublishTargetsDelegationCanUseUserKeyWithArbitraryRole (0.94s) === RUN TestDeleteRepo ---- PASS: TestDeleteRepo (0.09s) +--- PASS: TestDeleteRepo (0.12s) === RUN TestDeleteRemoteRepo ---- PASS: TestDeleteRemoteRepo (0.21s) +--- PASS: TestDeleteRemoteRepo (0.36s) === RUN TestListRoles ---- PASS: TestListRoles (0.27s) +--- PASS: TestListRoles (0.64s) === RUN TestGetAllTargetInfo ---- PASS: TestGetAllTargetInfo (0.15s) +--- PASS: TestGetAllTargetInfo (0.29s) === RUN TestUpdateSucceedsEvenIfCannotWriteNewRepo -time="2026-03-20T19:21:46-12:00" level=error msg="could not save root to cache: Non-writable" ---- PASS: TestUpdateSucceedsEvenIfCannotWriteNewRepo (0.07s) +time="2025-02-16T15:08:41+14:00" level=error msg="could not save root to cache: Non-writable" +--- PASS: TestUpdateSucceedsEvenIfCannotWriteNewRepo (0.28s) === RUN TestUpdateSucceedsEvenIfCannotWriteExistingRepo ---- PASS: TestUpdateSucceedsEvenIfCannotWriteExistingRepo (0.42s) +--- PASS: TestUpdateSucceedsEvenIfCannotWriteExistingRepo (1.15s) === RUN TestUpdateInOfflineMode -time="2026-03-20T19:21:47-12:00" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" -time="2026-03-20T19:21:47-12:00" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: TestUpdateInOfflineMode (0.04s) +time="2025-02-16T15:08:42+14:00" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +time="2025-02-16T15:08:43+14:00" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: TestUpdateInOfflineMode (0.13s) === RUN TestUpdateReplacesCorruptOrMissingMetadata -time="2026-03-20T19:21:48-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:21:48-12:00" level=error msg="Metadata for root expired" ---- PASS: TestUpdateReplacesCorruptOrMissingMetadata (0.88s) +time="2025-02-16T15:08:43+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:08:43+14:00" level=error msg="Metadata for root expired" +--- PASS: TestUpdateReplacesCorruptOrMissingMetadata (2.15s) === RUN TestUpdateFailsIfServerRootKeyChangedWithoutMultiSign -time="2026-03-20T19:21:48-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:21:48-12:00" level=error msg="Metadata for root expired" ---- PASS: TestUpdateFailsIfServerRootKeyChangedWithoutMultiSign (0.06s) +time="2025-02-16T15:08:45+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:08:45+14:00" level=error msg="Metadata for root expired" +--- PASS: TestUpdateFailsIfServerRootKeyChangedWithoutMultiSign (0.26s) === RUN TestUpdateRemoteRootNotExistNoLocalCache ---- PASS: TestUpdateRemoteRootNotExistNoLocalCache (0.02s) +--- PASS: TestUpdateRemoteRootNotExistNoLocalCache (0.08s) === RUN TestUpdateRemoteRootNotExistCanUseLocalCache ---- PASS: TestUpdateRemoteRootNotExistCanUseLocalCache (0.04s) +--- PASS: TestUpdateRemoteRootNotExistCanUseLocalCache (0.15s) === RUN TestUpdateRemoteRootNotExistCannotUseLocalCache ---- PASS: TestUpdateRemoteRootNotExistCannotUseLocalCache (0.09s) +--- PASS: TestUpdateRemoteRootNotExistCannotUseLocalCache (0.24s) === RUN TestUpdateRemoteRoot50XNoLocalCache ---- PASS: TestUpdateRemoteRoot50XNoLocalCache (0.04s) +--- PASS: TestUpdateRemoteRoot50XNoLocalCache (0.06s) === RUN TestUpdateRemoteRoot50XCanUseLocalCache ---- PASS: TestUpdateRemoteRoot50XCanUseLocalCache (0.07s) +--- PASS: TestUpdateRemoteRoot50XCanUseLocalCache (0.17s) === RUN TestUpdateRemoteRoot50XCannotUseLocalCache ---- PASS: TestUpdateRemoteRoot50XCannotUseLocalCache (0.06s) +--- PASS: TestUpdateRemoteRoot50XCannotUseLocalCache (0.20s) === RUN TestUpdateNonRootRemoteMissingMetadataNoLocalCache ---- PASS: TestUpdateNonRootRemoteMissingMetadataNoLocalCache (0.12s) +--- PASS: TestUpdateNonRootRemoteMissingMetadataNoLocalCache (0.43s) === RUN TestUpdateNonRootRemoteMissingMetadataCanUseLocalCache -time="2026-03-20T19:21:48-12:00" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: TestUpdateNonRootRemoteMissingMetadataCanUseLocalCache (0.21s) +time="2025-02-16T15:08:47+14:00" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: TestUpdateNonRootRemoteMissingMetadataCanUseLocalCache (0.60s) === RUN TestUpdateNonRootRemoteMissingMetadataCannotUseLocalCache -time="2026-03-20T19:21:48-12:00" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: TestUpdateNonRootRemoteMissingMetadataCannotUseLocalCache (0.27s) +time="2025-02-16T15:08:47+14:00" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: TestUpdateNonRootRemoteMissingMetadataCannotUseLocalCache (0.72s) === RUN TestUpdateNonRootRemote50XNoLocalCache ---- PASS: TestUpdateNonRootRemote50XNoLocalCache (0.16s) +--- PASS: TestUpdateNonRootRemote50XNoLocalCache (0.36s) === RUN TestUpdateNonRootRemote50XCanUseLocalCache -time="2026-03-20T19:21:49-12:00" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: TestUpdateNonRootRemote50XCanUseLocalCache (0.19s) +time="2025-02-16T15:08:48+14:00" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: TestUpdateNonRootRemote50XCanUseLocalCache (0.55s) === RUN TestUpdateNonRootRemote50XCannotUseLocalCache -time="2026-03-20T19:21:49-12:00" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" ---- PASS: TestUpdateNonRootRemote50XCannotUseLocalCache (0.35s) +time="2025-02-16T15:08:49+14:00" level=warning msg="Error while downloading remote metadata, using cached timestamp - this might not be the latest version available remotely" +--- PASS: TestUpdateNonRootRemote50XCannotUseLocalCache (0.85s) === RUN TestUpdateRemoteChecksumWrongNoLocalCache ---- PASS: TestUpdateRemoteChecksumWrongNoLocalCache (0.21s) +--- PASS: TestUpdateRemoteChecksumWrongNoLocalCache (0.64s) === RUN TestUpdateRemoteChecksumWrongCanUseLocalCache ---- PASS: TestUpdateRemoteChecksumWrongCanUseLocalCache (0.27s) +--- PASS: TestUpdateRemoteChecksumWrongCanUseLocalCache (0.85s) === RUN TestUpdateRemoteChecksumWrongCannotUseLocalCache ---- PASS: TestUpdateRemoteChecksumWrongCannotUseLocalCache (0.34s) +--- PASS: TestUpdateRemoteChecksumWrongCannotUseLocalCache (1.20s) === RUN TestUpdateRootRemoteCorruptedNoLocalCache -time="2026-03-20T19:21:50-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:21:50-12:00" level=error msg="Metadata for root expired" ---- PASS: TestUpdateRootRemoteCorruptedNoLocalCache (0.47s) +time="2025-02-16T15:08:53+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:08:53+14:00" level=error msg="Metadata for root expired" +--- PASS: TestUpdateRootRemoteCorruptedNoLocalCache (1.52s) === RUN TestUpdateRootRemoteCorruptedCanUseLocalCache ---- PASS: TestUpdateRootRemoteCorruptedCanUseLocalCache (0.90s) +--- PASS: TestUpdateRootRemoteCorruptedCanUseLocalCache (3.23s) === RUN TestUpdateRootRemoteCorruptedCannotUseLocalCache -time="2026-03-20T19:21:52-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:21:52-12:00" level=error msg="Metadata for root expired" ---- PASS: TestUpdateRootRemoteCorruptedCannotUseLocalCache (1.25s) +time="2025-02-16T15:08:59+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:08:59+14:00" level=error msg="Metadata for root expired" +--- PASS: TestUpdateRootRemoteCorruptedCannotUseLocalCache (4.17s) === RUN TestUpdateNonRootRemoteCorruptedNoLocalCache -time="2026-03-20T19:21:53-12:00" level=error msg="Metadata for targets expired" -time="2026-03-20T19:21:53-12:00" level=error msg="Metadata for targets expired" -time="2026-03-20T19:21:53-12:00" level=error msg="Metadata for snapshot expired" -time="2026-03-20T19:21:53-12:00" level=error msg="Metadata for snapshot expired" -time="2026-03-20T19:21:53-12:00" level=error msg="Metadata for timestamp expired" -time="2026-03-20T19:21:53-12:00" level=error msg="Metadata for timestamp expired" -time="2026-03-20T19:21:54-12:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2026-03-20T19:21:54-12:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2026-03-20T19:21:54-12:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2026-03-20T19:21:54-12:00" level=error msg="Metadata for targets/a expired" -time="2026-03-20T19:21:54-12:00" level=warning msg="Error getting targets/a: targets/a expired at Wed Feb 19 19:21:54 -12 2025" -time="2026-03-20T19:21:54-12:00" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2026-03-20T19:21:54-12:00" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2026-03-20T19:21:54-12:00" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2026-03-20T19:21:54-12:00" level=error msg="Metadata for targets/a/b expired" -time="2026-03-20T19:21:54-12:00" level=warning msg="Error getting targets/a/b: targets/a/b expired at Wed Feb 19 19:21:54 -12 2025" -time="2026-03-20T19:21:54-12:00" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2026-03-20T19:21:54-12:00" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2026-03-20T19:21:54-12:00" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2026-03-20T19:21:54-12:00" level=error msg="Metadata for targets/b expired" -time="2026-03-20T19:21:54-12:00" level=warning msg="Error getting targets/b: targets/b expired at Wed Feb 19 19:21:54 -12 2025" ---- PASS: TestUpdateNonRootRemoteCorruptedNoLocalCache (1.59s) +time="2025-02-16T15:09:02+14:00" level=error msg="Metadata for targets expired" +time="2025-02-16T15:09:02+14:00" level=error msg="Metadata for targets expired" +time="2025-02-16T15:09:02+14:00" level=error msg="Metadata for snapshot expired" +time="2025-02-16T15:09:02+14:00" level=error msg="Metadata for snapshot expired" +time="2025-02-16T15:09:03+14:00" level=error msg="Metadata for timestamp expired" +time="2025-02-16T15:09:03+14:00" level=error msg="Metadata for timestamp expired" +time="2025-02-16T15:09:03+14:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-16T15:09:03+14:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-16T15:09:03+14:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-16T15:09:03+14:00" level=error msg="Metadata for targets/a expired" +time="2025-02-16T15:09:03+14:00" level=warning msg="Error getting targets/a: targets/a expired at Mon Jan 15 15:09:03 +14 2024" +time="2025-02-16T15:09:04+14:00" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2025-02-16T15:09:04+14:00" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2025-02-16T15:09:04+14:00" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2025-02-16T15:09:04+14:00" level=error msg="Metadata for targets/a/b expired" +time="2025-02-16T15:09:04+14:00" level=warning msg="Error getting targets/a/b: targets/a/b expired at Mon Jan 15 15:09:04 +14 2024" +time="2025-02-16T15:09:05+14:00" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2025-02-16T15:09:05+14:00" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2025-02-16T15:09:05+14:00" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2025-02-16T15:09:05+14:00" level=error msg="Metadata for targets/b expired" +time="2025-02-16T15:09:05+14:00" level=warning msg="Error getting targets/b: targets/b expired at Mon Jan 15 15:09:05 +14 2024" +--- PASS: TestUpdateNonRootRemoteCorruptedNoLocalCache (4.30s) === RUN TestUpdateNonRootRemoteCorruptedCanUseLocalCache -time="2026-03-20T19:21:55-12:00" level=error msg="Metadata for timestamp expired" -time="2026-03-20T19:21:55-12:00" level=error msg="Metadata for timestamp expired" ---- PASS: TestUpdateNonRootRemoteCorruptedCanUseLocalCache (1.91s) +time="2025-02-16T15:09:08+14:00" level=error msg="Metadata for timestamp expired" +time="2025-02-16T15:09:08+14:00" level=error msg="Metadata for timestamp expired" +--- PASS: TestUpdateNonRootRemoteCorruptedCanUseLocalCache (6.33s) === RUN TestUpdateNonRootRemoteCorruptedCannotUseLocalCache -time="2026-03-20T19:21:57-12:00" level=error msg="Metadata for targets expired" -time="2026-03-20T19:21:57-12:00" level=error msg="Metadata for snapshot expired" -time="2026-03-20T19:21:57-12:00" level=error msg="Metadata for snapshot expired" -time="2026-03-20T19:21:57-12:00" level=error msg="Metadata for timestamp expired" -time="2026-03-20T19:21:57-12:00" level=error msg="Metadata for timestamp expired" -time="2026-03-20T19:21:58-12:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2026-03-20T19:21:58-12:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2026-03-20T19:21:58-12:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2026-03-20T19:21:58-12:00" level=error msg="Metadata for targets/a expired" -time="2026-03-20T19:21:58-12:00" level=warning msg="Error getting targets/a: targets/a expired at Wed Feb 19 19:21:58 -12 2025" -time="2026-03-20T19:21:58-12:00" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2026-03-20T19:21:58-12:00" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2026-03-20T19:21:58-12:00" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2026-03-20T19:21:58-12:00" level=error msg="Metadata for targets/a/b expired" -time="2026-03-20T19:21:58-12:00" level=warning msg="Error getting targets/a/b: targets/a/b expired at Wed Feb 19 19:21:58 -12 2025" -time="2026-03-20T19:21:59-12:00" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2026-03-20T19:21:59-12:00" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2026-03-20T19:21:59-12:00" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" -time="2026-03-20T19:21:59-12:00" level=error msg="Metadata for targets/b expired" -time="2026-03-20T19:21:59-12:00" level=warning msg="Error getting targets/b: targets/b expired at Wed Feb 19 19:21:59 -12 2025" ---- PASS: TestUpdateNonRootRemoteCorruptedCannotUseLocalCache (2.76s) +time="2025-02-16T15:09:13+14:00" level=error msg="Metadata for targets expired" +time="2025-02-16T15:09:14+14:00" level=error msg="Metadata for snapshot expired" +time="2025-02-16T15:09:14+14:00" level=error msg="Metadata for snapshot expired" +time="2025-02-16T15:09:15+14:00" level=error msg="Metadata for timestamp expired" +time="2025-02-16T15:09:15+14:00" level=error msg="Metadata for timestamp expired" +time="2025-02-16T15:09:16+14:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-16T15:09:16+14:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-16T15:09:16+14:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-16T15:09:16+14:00" level=error msg="Metadata for targets/a expired" +time="2025-02-16T15:09:16+14:00" level=warning msg="Error getting targets/a: targets/a expired at Mon Jan 15 15:09:16 +14 2024" +time="2025-02-16T15:09:17+14:00" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2025-02-16T15:09:17+14:00" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2025-02-16T15:09:18+14:00" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2025-02-16T15:09:18+14:00" level=error msg="Metadata for targets/a/b expired" +time="2025-02-16T15:09:18+14:00" level=warning msg="Error getting targets/a/b: targets/a/b expired at Mon Jan 15 15:09:18 +14 2024" +time="2025-02-16T15:09:19+14:00" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2025-02-16T15:09:19+14:00" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2025-02-16T15:09:19+14:00" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +time="2025-02-16T15:09:19+14:00" level=error msg="Metadata for targets/b expired" +time="2025-02-16T15:09:19+14:00" level=warning msg="Error getting targets/b: targets/b expired at Mon Jan 15 15:09:19 +14 2024" +--- PASS: TestUpdateNonRootRemoteCorruptedCannotUseLocalCache (8.06s) === RUN TestUpdateLocalAndRemoteRootCorrupt -time="2026-03-20T19:22:00-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:00-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" -time="2026-03-20T19:22:02-12:00" level=error msg="Metadata for root expired" ---- PASS: TestUpdateLocalAndRemoteRootCorrupt (3.27s) +time="2025-02-16T15:09:23+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:23+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:27+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:27+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:27+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:27+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:27+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:27+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:27+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:27+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:27+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:27+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:28+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:28+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:28+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:28+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:28+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:28+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:28+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:28+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:28+14:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:09:28+14:00" level=error msg="Metadata for root expired" +--- PASS: TestUpdateLocalAndRemoteRootCorrupt (8.60s) === RUN TestUpdateRemoteKeyRotated -time="2026-03-20T19:22:02-12:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" -time="2026-03-20T19:22:02-12:00" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" -time="2026-03-20T19:22:02-12:00" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" ---- PASS: TestUpdateRemoteKeyRotated (0.21s) +time="2025-02-16T15:09:29+14:00" level=warning msg="Error getting targets/a: valid signatures did not meet threshold for targets/a" +time="2025-02-16T15:09:29+14:00" level=warning msg="Error getting targets/a/b: valid signatures did not meet threshold for targets/a/b" +time="2025-02-16T15:09:29+14:00" level=warning msg="Error getting targets/b: valid signatures did not meet threshold for targets/b" +--- PASS: TestUpdateRemoteKeyRotated (0.73s) === RUN TestValidateRootRotationWithOldRole ---- PASS: TestValidateRootRotationWithOldRole (0.12s) +--- PASS: TestValidateRootRotationWithOldRole (0.35s) === RUN TestRootRoleInvariant ---- PASS: TestRootRoleInvariant (0.09s) +--- PASS: TestRootRoleInvariant (0.30s) === RUN TestBadIntermediateTransitions ---- PASS: TestBadIntermediateTransitions (0.03s) +--- PASS: TestBadIntermediateTransitions (0.13s) === RUN TestExpiredIntermediateTransitions -time="2026-03-20T19:22:03-12:00" level=warning msg="root is nearing expiry, you should re-sign the role metadata" ---- PASS: TestExpiredIntermediateTransitions (0.05s) +time="2025-02-16T15:09:30+14:00" level=warning msg="root is nearing expiry, you should re-sign the role metadata" +--- PASS: TestExpiredIntermediateTransitions (0.15s) === RUN TestDownloadTargetsLarge ---- PASS: TestDownloadTargetsLarge (7.97s) +--- PASS: TestDownloadTargetsLarge (9.17s) === RUN TestDownloadTargetsDeep ---- PASS: TestDownloadTargetsDeep (0.02s) +--- PASS: TestDownloadTargetsDeep (0.05s) === RUN TestDownloadSnapshotLargeDelegationsMany ---- PASS: TestDownloadSnapshotLargeDelegationsMany (5.44s) +--- PASS: TestDownloadSnapshotLargeDelegationsMany (6.77s) === RUN TestRootOnDiskTrustPinning ---- PASS: TestRootOnDiskTrustPinning (0.01s) +--- PASS: TestRootOnDiskTrustPinning (0.04s) === RUN TestLoadTUFRepoBadURL --- PASS: TestLoadTUFRepoBadURL (0.00s) === RUN TestApplyTargetsChange @@ -2469,7 +2505,7 @@ === RUN TestApplyChangelist --- PASS: TestApplyChangelist (0.00s) === RUN TestApplyChangelistMulti ---- PASS: TestApplyChangelistMulti (0.00s) +--- PASS: TestApplyChangelistMulti (0.01s) === RUN TestApplyTargetsDelegationCreateDelete --- PASS: TestApplyTargetsDelegationCreateDelete (0.00s) === RUN TestApplyTargetsDelegationCreate2SharedKey @@ -2477,49 +2513,49 @@ === RUN TestApplyTargetsDelegationCreateEdit --- PASS: TestApplyTargetsDelegationCreateEdit (0.00s) === RUN TestApplyTargetsDelegationEditNonExisting ---- PASS: TestApplyTargetsDelegationEditNonExisting (0.00s) +--- PASS: TestApplyTargetsDelegationEditNonExisting (0.01s) === RUN TestApplyTargetsDelegationCreateAlreadyExisting ---- PASS: TestApplyTargetsDelegationCreateAlreadyExisting (0.00s) +--- PASS: TestApplyTargetsDelegationCreateAlreadyExisting (0.01s) === RUN TestApplyTargetsDelegationAlreadyExistingMergePaths --- PASS: TestApplyTargetsDelegationAlreadyExistingMergePaths (0.00s) === RUN TestApplyTargetsDelegationInvalidRole ---- PASS: TestApplyTargetsDelegationInvalidRole (0.00s) +--- PASS: TestApplyTargetsDelegationInvalidRole (0.01s) === RUN TestApplyTargetsDelegationInvalidJSONContent --- PASS: TestApplyTargetsDelegationInvalidJSONContent (0.00s) === RUN TestApplyTargetsDelegationInvalidAction ---- PASS: TestApplyTargetsDelegationInvalidAction (0.00s) +--- PASS: TestApplyTargetsDelegationInvalidAction (0.01s) === RUN TestApplyTargetsChangeInvalidType --- PASS: TestApplyTargetsChangeInvalidType (0.00s) === RUN TestApplyTargetsDelegationCreate2Deep ---- PASS: TestApplyTargetsDelegationCreate2Deep (0.00s) +--- PASS: TestApplyTargetsDelegationCreate2Deep (0.01s) === RUN TestApplyTargetsDelegationParentDoesntExist --- PASS: TestApplyTargetsDelegationParentDoesntExist (0.00s) === RUN TestApplyChangelistCreatesDelegation ---- PASS: TestApplyChangelistCreatesDelegation (0.00s) +--- PASS: TestApplyChangelistCreatesDelegation (0.01s) === RUN TestApplyChangelistTargetsToMultipleRoles --- PASS: TestApplyChangelistTargetsToMultipleRoles (0.00s) === RUN TestApplyChangelistTargetsFailsNonexistentRole -time="2026-03-20T19:22:16-12:00" level=error msg="couldn't add target to targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist" -time="2026-03-20T19:22:16-12:00" level=error msg="couldn't remove target from targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist" ---- PASS: TestApplyChangelistTargetsFailsNonexistentRole (0.00s) +time="2025-02-16T15:09:46+14:00" level=error msg="couldn't add target to targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist" +time="2025-02-16T15:09:46+14:00" level=error msg="couldn't remove target from targets/level1/level2/level3/level4: tuf: invalid role targets/level1/level2/level3/level4. delegation does not exist" +--- PASS: TestApplyChangelistTargetsFailsNonexistentRole (0.01s) === RUN TestChangeTargetMetaFailsInvalidRole -time="2026-03-20T19:22:16-12:00" level=error msg="couldn't add target to ruhroh: tuf: invalid role ruhroh. does not exist" ---- PASS: TestChangeTargetMetaFailsInvalidRole (0.00s) +time="2025-02-16T15:09:46+14:00" level=error msg="couldn't add target to ruhroh: tuf: invalid role ruhroh. does not exist" +--- PASS: TestChangeTargetMetaFailsInvalidRole (0.01s) === RUN TestChangeTargetMetaFailsIfPrefixError -time="2026-03-20T19:22:16-12:00" level=error msg="couldn't add target to targets/level1: could not add all targets" +time="2025-02-16T15:09:46+14:00" level=error msg="couldn't add target to targets/level1: could not add all targets" --- PASS: TestChangeTargetMetaFailsIfPrefixError (0.00s) === RUN TestAllNearExpiry ---- PASS: TestAllNearExpiry (0.00s) +--- PASS: TestAllNearExpiry (0.01s) === RUN TestAllNotNearExpiry --- PASS: TestAllNotNearExpiry (0.00s) === RUN TestRotateRemoteKeyOffline --- PASS: TestRotateRemoteKeyOffline (0.00s) PASS -ok github.com/theupdateframework/notary/client 40.556s +ok github.com/theupdateframework/notary/client 89.872s === RUN TestTUFDelegation --- PASS: TestTUFDelegation (0.00s) === RUN TestMemChangelist ---- PASS: TestMemChangelist (0.00s) +--- PASS: TestMemChangelist (0.01s) === RUN TestMemChangeIterator --- PASS: TestMemChangeIterator (0.00s) === RUN TestMemChangelistRemove @@ -2527,14 +2563,14 @@ === RUN TestAdd --- PASS: TestAdd (0.00s) === RUN TestErrorConditions -time="2026-03-20T19:21:36-12:00" level=warning msg="invalid character '\\x05' looking for beginning of value" +time="2025-02-16T15:08:16+14:00" level=warning msg="invalid character '\\x05' looking for beginning of value" --- PASS: TestErrorConditions (0.00s) === RUN TestListOrder --- PASS: TestListOrder (0.00s) === RUN TestFileChangeIterator --- PASS: TestFileChangeIterator (0.00s) PASS -ok github.com/theupdateframework/notary/client/changelist 0.033s +ok github.com/theupdateframework/notary/client/changelist 0.088s === RUN TestParseConfigError --- PASS: TestParseConfigError (0.00s) === RUN TestSetupGRPCServer @@ -2544,7 +2580,7 @@ === RUN TestSetupNetListener --- PASS: TestSetupNetListener (0.00s) PASS -ok github.com/theupdateframework/notary/cmd/escrow 0.025s +ok github.com/theupdateframework/notary/cmd/escrow 0.072s === RUN TestPurgeDelegationKeys Usage: delegation [command] @@ -2568,13 +2604,13 @@ Use "delegation [command] --help" for more information about a command. Removal of the following keys from all delegations in gun staged for next publish: - abc ---- PASS: TestPurgeDelegationKeys (0.05s) +--- PASS: TestPurgeDelegationKeys (0.00s) === RUN TestAddInvalidDelegationName --- PASS: TestAddInvalidDelegationName (0.01s) === RUN TestAddInvalidDelegationCert ---- PASS: TestAddInvalidDelegationCert (0.01s) +--- PASS: TestAddInvalidDelegationCert (0.00s) === RUN TestAddInvalidShortPubkeyCert ---- PASS: TestAddInvalidShortPubkeyCert (0.00s) +--- PASS: TestAddInvalidShortPubkeyCert (0.01s) === RUN TestRemoveInvalidDelegationName --- PASS: TestRemoveInvalidDelegationName (0.00s) === RUN TestRemoveAllInvalidDelegationName @@ -2602,7 +2638,7 @@ remove Remove KeyID(s) from the specified Role delegation. Use "delegation [command] --help" for more information about a command. ---- PASS: TestListInvalidNumArgs (0.00s) +--- PASS: TestListInvalidNumArgs (0.01s) === RUN TestRemoveInvalidNumArgs Usage: delegation [command] @@ -2616,105 +2652,105 @@ Use "delegation [command] --help" for more information about a command. --- PASS: TestRemoveInvalidNumArgs (0.00s) === RUN TestInitWithRootKey ---- PASS: TestInitWithRootKey (0.48s) +--- PASS: TestInitWithRootKey (0.33s) === RUN TestInitWithRootCert integration_test.go:189: Disable FTBFS timebomb. https://bugs.debian.org/1078632 --- SKIP: TestInitWithRootCert (0.00s) === RUN TestClientTUFInteraction ---- PASS: TestClientTUFInteraction (0.46s) +--- PASS: TestClientTUFInteraction (0.53s) === RUN TestClientDeleteTUFInteraction -time="2026-03-20T19:21:37-12:00" level=error msg="could not reach https://invalid-server: Get \"https://invalid-server/v2/\": dial tcp: lookup invalid-server on [::1]:53: read udp [::1]:41326->[::1]:53: read: connection refused" ---- PASS: TestClientDeleteTUFInteraction (0.29s) +time="2025-02-16T15:08:19+14:00" level=error msg="could not reach https://invalid-server: Get \"https://invalid-server/v2/\": dial tcp: lookup invalid-server on [::1]:53: read udp [::1]:54094->[::1]:53: read: connection refused" +--- PASS: TestClientDeleteTUFInteraction (0.73s) === RUN TestClientTUFAddByHashInteraction ---- PASS: TestClientTUFAddByHashInteraction (0.39s) +--- PASS: TestClientTUFAddByHashInteraction (1.10s) === RUN TestClientDelegationsInteraction -time="2026-03-20T19:21:38-12:00" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2026-03-20T19:21:38-12:00" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" ---- PASS: TestClientDelegationsInteraction (1.01s) +time="2025-02-16T15:08:21+14:00" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-16T15:08:21+14:00" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +--- PASS: TestClientDelegationsInteraction (3.22s) === RUN TestClientDelegationsPublishing ---- PASS: TestClientDelegationsPublishing (1.00s) +--- PASS: TestClientDelegationsPublishing (2.68s) === RUN TestClientKeyGenerationRotation ---- PASS: TestClientKeyGenerationRotation (1.22s) +--- PASS: TestClientKeyGenerationRotation (2.83s) === RUN TestKeyRotation ---- PASS: TestKeyRotation (0.20s) +--- PASS: TestKeyRotation (0.40s) === RUN TestKeyRotationNonRoot ---- PASS: TestKeyRotationNonRoot (0.24s) +--- PASS: TestKeyRotationNonRoot (0.55s) === RUN TestDefaultRootKeyGeneration ---- PASS: TestDefaultRootKeyGeneration (0.01s) +--- PASS: TestDefaultRootKeyGeneration (0.02s) === RUN TestLogLevelFlags --- PASS: TestLogLevelFlags (0.00s) === RUN TestClientKeyPassphraseChange ---- PASS: TestClientKeyPassphraseChange (0.26s) +--- PASS: TestClientKeyPassphraseChange (0.49s) === RUN TestPurgeSingleKey Removal of the following keys from all delegations in gun staged for next publish: - - 04b97c62f82e4c967da5600c64afc21fb1bbca1ad49f75d2434d419e0760a350 ---- PASS: TestPurgeSingleKey (0.19s) + - bcf34f8152e65c249b8b0375f4f46e163ab80c91eb111109dd49827b37fd119b +--- PASS: TestPurgeSingleKey (0.39s) === RUN TestWitness -time="2026-03-20T19:21:42-12:00" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" -time="2026-03-20T19:21:42-12:00" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" -time="2026-03-20T19:21:42-12:00" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" -time="2026-03-20T19:21:42-12:00" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" -time="2026-03-20T19:21:42-12:00" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2026-03-20T19:21:42-12:00" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2026-03-20T19:21:42-12:00" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" ---- PASS: TestWitness (0.65s) +time="2025-02-16T15:08:31+14:00" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" +time="2025-02-16T15:08:31+14:00" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" +time="2025-02-16T15:08:32+14:00" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" +time="2025-02-16T15:08:32+14:00" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" +time="2025-02-16T15:08:32+14:00" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-16T15:08:32+14:00" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-16T15:08:32+14:00" level=warning msg="Error getting targets/delegation: valid signatures did not meet threshold for targets/delegation" +--- PASS: TestWitness (1.21s) === RUN TestClientTUFInitWithAutoPublish -time="2026-03-20T19:21:42-12:00" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get \"https://notary-server-on-the-moon:12306/v2/\": dial tcp: lookup notary-server-on-the-moon on [::1]:53: read udp [::1]:58249->[::1]:53: read: connection refused" ---- PASS: TestClientTUFInitWithAutoPublish (0.20s) +time="2025-02-16T15:08:32+14:00" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get \"https://notary-server-on-the-moon:12306/v2/\": dial tcp: lookup notary-server-on-the-moon on [::1]:53: read udp [::1]:34199->[::1]:53: read: connection refused" +--- PASS: TestClientTUFInitWithAutoPublish (0.27s) === RUN TestClientTUFAddWithAutoPublish -time="2026-03-20T19:21:43-12:00" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:44023->[::1]:53: read: connection refused" -time="2026-03-20T19:21:43-12:00" level=error msg="Could not publish Repository since we could not update: client is offline" -time="2026-03-20T19:21:43-12:00" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get \"https://notary-server-on-the-moon:12306/v2/\": dial tcp: lookup notary-server-on-the-moon on [::1]:53: read udp [::1]:42600->[::1]:53: read: connection refused" -time="2026-03-20T19:21:43-12:00" level=error msg="Could not publish Repository since we could not update: client is offline" ---- PASS: TestClientTUFAddWithAutoPublish (0.11s) +time="2025-02-16T15:08:32+14:00" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:38457->[::1]:53: read: connection refused" +time="2025-02-16T15:08:32+14:00" level=error msg="Could not publish Repository since we could not update: client is offline" +time="2025-02-16T15:08:32+14:00" level=error msg="could not reach https://notary-server-on-the-moon:12306: Get \"https://notary-server-on-the-moon:12306/v2/\": dial tcp: lookup notary-server-on-the-moon on [::1]:53: read udp [::1]:54269->[::1]:53: read: connection refused" +time="2025-02-16T15:08:32+14:00" level=error msg="Could not publish Repository since we could not update: client is offline" +--- PASS: TestClientTUFAddWithAutoPublish (0.34s) === RUN TestClientTUFRemoveWithAutoPublish ---- PASS: TestClientTUFRemoveWithAutoPublish (0.30s) +--- PASS: TestClientTUFRemoveWithAutoPublish (0.58s) === RUN TestClientDelegationAddWithAutoPublish ---- PASS: TestClientDelegationAddWithAutoPublish (0.14s) +--- PASS: TestClientDelegationAddWithAutoPublish (0.30s) === RUN TestClientDelegationRemoveWithAutoPublish -time="2026-03-20T19:21:44-12:00" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2026-03-20T19:21:44-12:00" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" ---- PASS: TestClientDelegationRemoveWithAutoPublish (0.35s) +time="2025-02-16T15:08:34+14:00" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-16T15:08:34+14:00" level=warning msg="role targets/delegation has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +--- PASS: TestClientDelegationRemoveWithAutoPublish (0.76s) === RUN TestClientTUFAddByHashWithAutoPublish ---- PASS: TestClientTUFAddByHashWithAutoPublish (0.13s) +--- PASS: TestClientTUFAddByHashWithAutoPublish (0.31s) === RUN TestClientKeyImport -time="2026-03-20T19:21:44-12:00" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header" -time="2026-03-20T19:21:44-12:00" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to" ---- PASS: TestClientKeyImport (0.08s) +time="2025-02-16T15:08:35+14:00" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header" +time="2025-02-16T15:08:35+14:00" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to" +--- PASS: TestClientKeyImport (0.19s) === RUN TestAddDelImportKeyPublishFlow -time="2026-03-20T19:21:44-12:00" level=error msg="couldn't add target to targets/releases: could not find necessary signing keys, at least one of these keys must be available: 0570f9fdca00bdaf62f3f79bf84e70748ba2c8bff926f20dd996bac49e6164fc" ---- PASS: TestAddDelImportKeyPublishFlow (0.35s) +time="2025-02-16T15:08:35+14:00" level=error msg="couldn't add target to targets/releases: could not find necessary signing keys, at least one of these keys must be available: 0570f9fdca00bdaf62f3f79bf84e70748ba2c8bff926f20dd996bac49e6164fc" +--- PASS: TestAddDelImportKeyPublishFlow (0.78s) === RUN TestExportImportFlow ---- PASS: TestExportImportFlow (0.11s) +--- PASS: TestExportImportFlow (0.25s) === RUN TestDelegationKeyImportExport ---- PASS: TestDelegationKeyImportExport (0.02s) +--- PASS: TestDelegationKeyImportExport (0.04s) === RUN TestImportKeysNoYubikey ---- PASS: TestImportKeysNoYubikey (0.02s) +--- PASS: TestImportKeysNoYubikey (0.03s) === RUN TestExportImportKeysNoYubikey ---- PASS: TestExportImportKeysNoYubikey (0.20s) +--- PASS: TestExportImportKeysNoYubikey (0.04s) === RUN TestRemoveIfNoKey --- PASS: TestRemoveIfNoKey (0.00s) === RUN TestRemoveOneKeyAbort ---- PASS: TestRemoveOneKeyAbort (0.01s) +--- PASS: TestRemoveOneKeyAbort (0.03s) === RUN TestRemoveOneKeyConfirm --- PASS: TestRemoveOneKeyConfirm (0.02s) === RUN TestRemoveMultikeysInvalidInput --- PASS: TestRemoveMultikeysInvalidInput (0.02s) === RUN TestRemoveMultikeysAbortChoice ---- PASS: TestRemoveMultikeysAbortChoice (0.02s) +--- PASS: TestRemoveMultikeysAbortChoice (0.03s) === RUN TestRemoveMultikeysRemoveOnlyChosenKey --- PASS: TestRemoveMultikeysRemoveOnlyChosenKey (0.02s) === RUN TestRotateKeyInvalidRoles -time="2026-03-20T19:21:45-12:00" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:44287->[::1]:53: read: connection refused" -time="2026-03-20T19:21:45-12:00" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:47354->[::1]:53: read: connection refused" -time="2026-03-20T19:21:45-12:00" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:58066->[::1]:53: read: connection refused" -time="2026-03-20T19:21:45-12:00" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:33559->[::1]:53: read: connection refused" +time="2025-02-16T15:08:36+14:00" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:59371->[::1]:53: read: connection refused" +time="2025-02-16T15:08:36+14:00" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:45540->[::1]:53: read: connection refused" +time="2025-02-16T15:08:36+14:00" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:38627->[::1]:53: read: connection refused" +time="2025-02-16T15:08:36+14:00" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:36415->[::1]:53: read: connection refused" --- PASS: TestRotateKeyInvalidRoles (0.01s) === RUN TestRotateKeyTargetCannotBeServerManaged -time="2026-03-20T19:21:45-12:00" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:37390->[::1]:53: read: connection refused" ---- PASS: TestRotateKeyTargetCannotBeServerManaged (0.00s) +time="2025-02-16T15:08:36+14:00" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:37387->[::1]:53: read: connection refused" +--- PASS: TestRotateKeyTargetCannotBeServerManaged (0.01s) === RUN TestRotateKeyTimestampCannotBeLocallyManaged -time="2026-03-20T19:21:45-12:00" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:41936->[::1]:53: read: connection refused" +time="2025-02-16T15:08:36+14:00" level=error msg="could not reach https://notary-server:4443: Get \"https://notary-server:4443/v2/\": dial tcp: lookup notary-server on [::1]:53: read udp [::1]:35607->[::1]:53: read: connection refused" --- PASS: TestRotateKeyTimestampCannotBeLocallyManaged (0.00s) === RUN TestRotateKeyNoGUN Usage: @@ -2722,55 +2758,55 @@ === RUN TestRotateKeyRemoteServerManagesKey Successfully rotated snapshot key for repository docker.com/notary Successfully rotated timestamp key for repository docker.com/notary ---- PASS: TestRotateKeyRemoteServerManagesKey (0.16s) +--- PASS: TestRotateKeyRemoteServerManagesKey (0.37s) === RUN TestRotateKeyBothKeys Successfully rotated targets key for repository docker.com/notary Successfully rotated snapshot key for repository docker.com/notary ---- PASS: TestRotateKeyBothKeys (0.12s) +--- PASS: TestRotateKeyBothKeys (0.27s) === RUN TestRotateKeyRootIsInteractive ---- PASS: TestRotateKeyRootIsInteractive (0.04s) +--- PASS: TestRotateKeyRootIsInteractive (0.09s) === RUN TestChangeKeyPassphraseInvalidID --- PASS: TestChangeKeyPassphraseInvalidID (0.00s) === RUN TestChangeKeyPassphraseInvalidNumArgs Usage: ---- PASS: TestChangeKeyPassphraseInvalidNumArgs (0.01s) +--- PASS: TestChangeKeyPassphraseInvalidNumArgs (0.00s) === RUN TestChangeKeyPassphraseNonexistentID --- PASS: TestChangeKeyPassphraseNonexistentID (0.00s) === RUN TestExportKeys ---- PASS: TestExportKeys (0.00s) +--- PASS: TestExportKeys (0.01s) === RUN TestExportKeysByGUN --- PASS: TestExportKeysByGUN (0.01s) === RUN TestExportKeysByID ---- PASS: TestExportKeysByID (0.00s) +--- PASS: TestExportKeysByID (0.01s) === RUN TestExportKeysBadFlagCombo --- PASS: TestExportKeysBadFlagCombo (0.00s) === RUN TestImportKeysNonexistentFile --- PASS: TestImportKeysNonexistentFile (0.00s) === RUN TestKeyGeneration -time="2026-03-20T19:21:45-12:00" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to" ---- PASS: TestKeyGeneration (0.03s) +time="2025-02-16T15:08:37+14:00" level=warning msg="failed to import key () to store: Cannot have canonical role key without a gun, don't know what gun it belongs to" +--- PASS: TestKeyGeneration (0.06s) === RUN TestNotaryConfigFileDefault --- PASS: TestNotaryConfigFileDefault (0.00s) === RUN TestRemoteServerDefault --- PASS: TestRemoteServerDefault (0.00s) === RUN TestRemoteServerUsesConfigFile ---- PASS: TestRemoteServerUsesConfigFile (0.00s) +--- PASS: TestRemoteServerUsesConfigFile (0.01s) === RUN TestRemoteServerCommandLineFlagOverridesConfig --- PASS: TestRemoteServerCommandLineFlagOverridesConfig (0.00s) === RUN TestInvalidAddHashCommands ---- PASS: TestInvalidAddHashCommands (0.00s) +--- PASS: TestInvalidAddHashCommands (0.01s) === RUN TestConfigParsingErrorsPropagatedByCommands ---- PASS: TestConfigParsingErrorsPropagatedByCommands (0.01s) +--- PASS: TestConfigParsingErrorsPropagatedByCommands (0.04s) === RUN TestInsufficientArgumentsReturnsErrorAndPrintsUsage ---- PASS: TestInsufficientArgumentsReturnsErrorAndPrintsUsage (0.02s) +--- PASS: TestInsufficientArgumentsReturnsErrorAndPrintsUsage (0.08s) === RUN TestBareCommandPrintsUsageAndNoError ---- PASS: TestBareCommandPrintsUsageAndNoError (0.00s) +--- PASS: TestBareCommandPrintsUsageAndNoError (0.01s) === RUN TestConfigFileTLSCannotBeRelativeToCWD ---- PASS: TestConfigFileTLSCannotBeRelativeToCWD (0.01s) +--- PASS: TestConfigFileTLSCannotBeRelativeToCWD (0.04s) === RUN TestConfigFileTLSCanBeRelativeToConfigOrAbsolute ---- PASS: TestConfigFileTLSCanBeRelativeToConfigOrAbsolute (0.06s) +--- PASS: TestConfigFileTLSCanBeRelativeToConfigOrAbsolute (0.10s) === RUN TestConfigFileOverridenByCmdLineFlags ---- PASS: TestConfigFileOverridenByCmdLineFlags (0.05s) +--- PASS: TestConfigFileOverridenByCmdLineFlags (0.14s) === RUN TestConfigFileTrustPinning --- PASS: TestConfigFileTrustPinning (0.00s) === RUN TestPassphraseRetrieverCaching @@ -2780,11 +2816,11 @@ === RUN TestTruncateWithEllipsis --- PASS: TestTruncateWithEllipsis (0.00s) === RUN TestKeyInfoSorter ---- PASS: TestKeyInfoSorter (0.00s) +--- PASS: TestKeyInfoSorter (0.01s) === RUN TestPrettyPrintZeroKeys --- PASS: TestPrettyPrintZeroKeys (0.00s) === RUN TestPrettyPrintRootAndSigningKeys ---- PASS: TestPrettyPrintRootAndSigningKeys (0.05s) +--- PASS: TestPrettyPrintRootAndSigningKeys (0.07s) === RUN TestPrettyPrintZeroTargets --- PASS: TestPrettyPrintZeroTargets (0.00s) === RUN TestPrettyPrintSortedTargets @@ -2796,10 +2832,10 @@ === RUN TestImportRootCert --- PASS: TestImportRootCert (0.00s) === RUN TestTokenAuth -time="2026-03-20T19:21:45-12:00" level=error msg="could not reach https://localhost:9999: Get \"https://localhost:9999/v2/\": dial tcp 127.0.0.1:9999: connect: connection refused" +time="2025-02-16T15:08:37+14:00" level=error msg="could not reach https://localhost:9999: Get \"https://localhost:9999/v2/\": dial tcp 127.0.0.1:9999: connect: connection refused" --- PASS: TestTokenAuth (0.00s) === RUN TestAdminTokenAuth -time="2026-03-20T19:21:45-12:00" level=error msg="could not reach https://localhost:9999: Get \"https://localhost:9999/v2/\": dial tcp 127.0.0.1:9999: connect: connection refused" +time="2025-02-16T15:08:37+14:00" level=error msg="could not reach https://localhost:9999: Get \"https://localhost:9999/v2/\": dial tcp 127.0.0.1:9999: connect: connection refused" --- PASS: TestAdminTokenAuth (0.00s) === RUN TestTokenAuth200Status --- PASS: TestTokenAuth200Status (0.00s) @@ -2810,44 +2846,44 @@ === RUN TestAdminTokenAuth401Status --- PASS: TestAdminTokenAuth401Status (0.00s) === RUN TestTokenAuthNon200Non401Status -time="2026-03-20T19:21:45-12:00" level=error msg="could not reach http://127.0.0.1:32809: 404" ---- PASS: TestTokenAuthNon200Non401Status (0.00s) +time="2025-02-16T15:08:37+14:00" level=error msg="could not reach http://127.0.0.1:38769: 404" +--- PASS: TestTokenAuthNon200Non401Status (0.01s) === RUN TestAdminTokenAuthNon200Non401Status -time="2026-03-20T19:21:45-12:00" level=error msg="could not reach http://127.0.0.1:44745: 404" +time="2025-02-16T15:08:37+14:00" level=error msg="could not reach http://127.0.0.1:33287: 404" --- PASS: TestAdminTokenAuthNon200Non401Status (0.00s) === RUN TestConfigureRepo ---- PASS: TestConfigureRepo (0.00s) +--- PASS: TestConfigureRepo (0.01s) === RUN TestConfigureRepoRW -Enter username: time="2026-03-20T19:21:45-12:00" level=error msg="error processing username input: EOF" +Enter username: time="2025-02-16T15:08:37+14:00" level=error msg="error processing username input: EOF" --- PASS: TestConfigureRepoRW (0.01s) === RUN TestConfigureRepoAdmin -Enter username: time="2026-03-20T19:21:45-12:00" level=error msg="error processing username input: EOF" ---- PASS: TestConfigureRepoAdmin (0.01s) +Enter username: time="2025-02-16T15:08:37+14:00" level=error msg="error processing username input: EOF" +--- PASS: TestConfigureRepoAdmin (0.02s) === RUN TestStatusUnstageAndReset Successfully reset specified changes for repository gun Addition of target "test1" by sha256 hash to repository "gun" staged for next publish. Addition of target "test2" by sha256 hash to repository "gun" staged for next publish. Addition of target "test3" by sha256 hash to repository "gun" staged for next publish. Addition of target "test4" by sha256 hash to repository "gun" staged for next publish. ---- PASS: TestStatusUnstageAndReset (0.01s) +--- PASS: TestStatusUnstageAndReset (0.04s) === RUN TestGetTrustPinningErrors Pushing changes to gun --- PASS: TestGetTrustPinningErrors (0.00s) === RUN TestPasswordStore -Enter username: time="2026-03-20T19:21:45-12:00" level=error msg="error processing username input: EOF" +Enter username: time="2025-02-16T15:08:37+14:00" level=error msg="error processing username input: EOF" --- PASS: TestPasswordStore (0.00s) === RUN TestPasswordStoreWithEnvvar -time="2026-03-20T19:21:45-12:00" level=error msg="Authentication string with zero-length username" -time="2026-03-20T19:21:45-12:00" level=error msg="Could not base64-decode authentication string" +time="2025-02-16T15:08:37+14:00" level=error msg="Authentication string with zero-length username" +time="2025-02-16T15:08:37+14:00" level=error msg="Could not base64-decode authentication string" --- PASS: TestPasswordStoreWithEnvvar (0.00s) === RUN TestGetPayload ---- PASS: TestGetPayload (0.00s) +--- PASS: TestGetPayload (0.01s) === RUN TestFeedback --- PASS: TestFeedback (0.00s) === RUN TestHomeExpand --- PASS: TestHomeExpand (0.00s) PASS -ok github.com/theupdateframework/notary/cmd/notary 9.298s +ok github.com/theupdateframework/notary/cmd/notary 20.264s === RUN TestBootstrap --- PASS: TestBootstrap (0.00s) === RUN TestGetAddrAndTLSConfigInvalidTLS @@ -2863,48 +2899,48 @@ === RUN TestGetInvalidTrustService --- PASS: TestGetInvalidTrustService (0.00s) === RUN TestGetLocalTrustService -time="2026-03-20T19:21:36-12:00" level=info msg="Using local signing service, which requires ED25519. Ignoring all other trust_service parameters, including keyAlgorithm" +time="2025-02-16T15:08:21+14:00" level=info msg="Using local signing service, which requires ED25519. Ignoring all other trust_service parameters, including keyAlgorithm" --- PASS: TestGetLocalTrustService (0.00s) === RUN TestGetTrustServiceInvalidKeyAlgorithm --- PASS: TestGetTrustServiceInvalidKeyAlgorithm (0.00s) === RUN TestGetTrustServiceTLSMissingCertOrKey --- PASS: TestGetTrustServiceTLSMissingCertOrKey (0.00s) === RUN TestGetTrustServiceNoTLSConfig -time="2026-03-20T19:21:36-12:00" level=info msg="Using remote signing service" +time="2025-02-16T15:08:21+14:00" level=info msg="Using remote signing service" --- PASS: TestGetTrustServiceNoTLSConfig (0.00s) === RUN TestGetTrustServiceTLSSuccess -time="2026-03-20T19:21:36-12:00" level=info msg="Using remote signing service" ---- PASS: TestGetTrustServiceTLSSuccess (0.01s) +time="2025-02-16T15:08:21+14:00" level=info msg="Using remote signing service" +--- PASS: TestGetTrustServiceTLSSuccess (0.00s) === RUN TestGetTrustServiceTLSFailure --- PASS: TestGetTrustServiceTLSFailure (0.00s) === RUN TestGetStoreInvalid -time="2026-03-20T19:21:36-12:00" level=info msg="Using asdf backend" +time="2025-02-16T15:08:21+14:00" level=info msg="Using asdf backend" --- PASS: TestGetStoreInvalid (0.00s) === RUN TestGetStoreDBStore -time="2026-03-20T19:21:36-12:00" level=info msg="Using sqlite3 backend" ---- PASS: TestGetStoreDBStore (0.02s) +time="2025-02-16T15:08:21+14:00" level=info msg="Using sqlite3 backend" +--- PASS: TestGetStoreDBStore (0.00s) === RUN TestGetStoreRethinkDBStoreConnectionFails -time="2026-03-20T19:21:36-12:00" level=info msg="Using rethinkdb backend" +time="2025-02-16T15:08:21+14:00" level=info msg="Using rethinkdb backend" --- PASS: TestGetStoreRethinkDBStoreConnectionFails (0.00s) === RUN TestGetMemoryStore -time="2026-03-20T19:21:36-12:00" level=info msg="Using memory backend" +time="2025-02-16T15:08:21+14:00" level=info msg="Using memory backend" --- PASS: TestGetMemoryStore (0.00s) === RUN TestGetCacheConfig ---- PASS: TestGetCacheConfig (0.00s) +--- PASS: TestGetCacheConfig (0.01s) === RUN TestGetGUNPRefixes --- PASS: TestGetGUNPRefixes (0.00s) === RUN TestSampleConfig -time="2026-03-20T19:21:36-12:00" level=info msg="Using remote signing service" -time="2026-03-20T19:21:36-12:00" level=info msg="Using sqlite3 backend" ---- PASS: TestSampleConfig (0.02s) +time="2025-02-16T15:08:21+14:00" level=info msg="Using remote signing service" +time="2025-02-16T15:08:21+14:00" level=info msg="Using sqlite3 backend" +--- PASS: TestSampleConfig (0.00s) PASS -ok github.com/theupdateframework/notary/cmd/notary-server 0.149s +ok github.com/theupdateframework/notary/cmd/notary-server 0.167s === RUN TestGetAddrAndTLSConfigInvalidTLS --- PASS: TestGetAddrAndTLSConfigInvalidTLS (0.00s) === RUN TestGetAddrAndTLSConfigNoGRPCAddr --- PASS: TestGetAddrAndTLSConfigNoGRPCAddr (0.00s) === RUN TestGetAddrAndTLSConfigSuccess ---- PASS: TestGetAddrAndTLSConfigSuccess (0.00s) +--- PASS: TestGetAddrAndTLSConfigSuccess (0.01s) === RUN TestSetupCryptoServicesDBStoreNoDefaultAlias --- PASS: TestSetupCryptoServicesDBStoreNoDefaultAlias (0.00s) === RUN TestSetupCryptoServicesRethinkDBStoreNoDefaultAlias @@ -2913,15 +2949,15 @@ main_test.go:121: DM - skipping malfunctioning test, fails on sbuild --- SKIP: TestSetupCryptoServicesRethinkDBStoreConnectionFails (0.00s) === RUN TestSetupCryptoServicesDBStoreSuccess ---- PASS: TestSetupCryptoServicesDBStoreSuccess (0.14s) +--- PASS: TestSetupCryptoServicesDBStoreSuccess (0.25s) === RUN TestSetupCryptoServicesMemoryStore ---- PASS: TestSetupCryptoServicesMemoryStore (0.01s) +--- PASS: TestSetupCryptoServicesMemoryStore (0.04s) === RUN TestSetupCryptoServicesInvalidStore --- PASS: TestSetupCryptoServicesInvalidStore (0.00s) === RUN TestSetupGRPCServerInvalidAddress --- PASS: TestSetupGRPCServerInvalidAddress (0.00s) === RUN TestSetupGRPCServerSuccess ---- PASS: TestSetupGRPCServerSuccess (0.01s) +--- PASS: TestSetupGRPCServerSuccess (0.00s) === RUN TestBootstrap --- PASS: TestBootstrap (0.00s) === RUN TestGetEnv @@ -2929,19 +2965,19 @@ === RUN TestPassphraseRetrieverInvalid --- PASS: TestPassphraseRetrieverInvalid (0.00s) === RUN TestSampleConfig ---- PASS: TestSampleConfig (0.00s) +--- PASS: TestSampleConfig (0.03s) PASS -ok github.com/theupdateframework/notary/cmd/notary-signer 0.224s +ok github.com/theupdateframework/notary/cmd/notary-signer 0.444s === RUN TestGenerateCertificate --- PASS: TestGenerateCertificate (0.00s) === RUN TestCryptoServiceWithNonEmptyGUN ---- PASS: TestCryptoServiceWithNonEmptyGUN (1.95s) +--- PASS: TestCryptoServiceWithNonEmptyGUN (2.41s) === RUN TestCryptoServiceWithEmptyGUN ---- PASS: TestCryptoServiceWithEmptyGUN (1.45s) +--- PASS: TestCryptoServiceWithEmptyGUN (2.58s) === RUN TestCryptoSignerInterfaceBehavior ---- PASS: TestCryptoSignerInterfaceBehavior (0.00s) +--- PASS: TestCryptoSignerInterfaceBehavior (0.01s) PASS -ok github.com/theupdateframework/notary/cryptoservice 3.447s +ok github.com/theupdateframework/notary/cryptoservice 5.064s === RUN TestGetPassphraseForUsingDelegationKey --- PASS: TestGetPassphraseForUsingDelegationKey (0.00s) === RUN TestGetPassphraseLimitsShortPassphrases @@ -2957,283 +2993,283 @@ === RUN TestGetPassphrase --- PASS: TestGetPassphrase (0.00s) PASS -ok github.com/theupdateframework/notary/passphrase 0.042s +ok github.com/theupdateframework/notary/passphrase 0.080s ? github.com/theupdateframework/notary/proto [no test files] ? github.com/theupdateframework/notary/proto/github.com/theupdateframework/notary/proto [no test files] === RUN TestValidationErrorFormat -time="2026-03-20T19:21:36-12:00" level=info msg="invalid update: Update sent by the client is invalid.: &{ErrBadHierarchy Metadata hierarchy is incomplete: no snapshot was included in update and server does not hold current snapshot key for repository}" go.version=go1.24.0 http.request.contenttype="multipart/form-data; boundary=ffd5b2db7abeab17f1bd967ff197db00496214167c98b151fd9f5da83b20" http.request.host="127.0.0.1:37687" http.request.id=a7aba747-a221-40ec-b620-b5a994487ad6 http.request.method=POST http.request.remoteaddr="127.0.0.1:57504" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.contenttype="multipart/form-data; boundary=ffd5b2db7abeab17f1bd967ff197db00496214167c98b151fd9f5da83b20" http.request.host="127.0.0.1:37687" http.request.id=a7aba747-a221-40ec-b620-b5a994487ad6 http.request.method=POST http.request.remoteaddr="127.0.0.1:57504" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration=2.382704ms http.response.status=400 http.response.written=260 ---- PASS: TestValidationErrorFormat (0.04s) +time="2025-02-16T15:08:21+14:00" level=info msg="invalid update: Update sent by the client is invalid.: &{ErrBadHierarchy Metadata hierarchy is incomplete: no snapshot was included in update and server does not hold current snapshot key for repository}" go.version=go1.24.0 http.request.contenttype="multipart/form-data; boundary=f056cadfedb4f3b325f99408b058566a7f7c386e1400209fc0360557e419" http.request.host="127.0.0.1:33031" http.request.id=708051c5-7534-44cc-9988-f491b35533f2 http.request.method=POST http.request.remoteaddr="127.0.0.1:52148" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 +time="2025-02-16T15:08:21+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.contenttype="multipart/form-data; boundary=f056cadfedb4f3b325f99408b058566a7f7c386e1400209fc0360557e419" http.request.host="127.0.0.1:33031" http.request.id=708051c5-7534-44cc-9988-f491b35533f2 http.request.method=POST http.request.remoteaddr="127.0.0.1:52148" http.request.uri=/v2/docker.com/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration=16.656499ms http.response.status=400 http.response.written=260 +--- PASS: TestValidationErrorFormat (0.09s) === RUN TestRunBadAddr --- PASS: TestRunBadAddr (0.00s) === RUN TestRepoPrefixMatches -time="2026-03-20T19:21:36-12:00" level=info msg="updated docker.io/notary to timestamp version 1, checksum 5cf26999b40432b839b023ba9b2106a4454bbd1429660dbfaaf723a2f2dfa78d" docker.io/notary=gun go.version=go1.24.0 http.request.contenttype="multipart/form-data; boundary=ffebf15cc6b5973fbb427da45378757e8adbb1dd8618cf3e6f62ea4551a8" http.request.host="127.0.0.1:46637" http.request.id=fe60b0ef-9fb9-4f13-935c-7d26c23d9726 http.request.method=POST http.request.remoteaddr="127.0.0.1:49878" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.contenttype="multipart/form-data; boundary=ffebf15cc6b5973fbb427da45378757e8adbb1dd8618cf3e6f62ea4551a8" http.request.host="127.0.0.1:46637" http.request.id=fe60b0ef-9fb9-4f13-935c-7d26c23d9726 http.request.method=POST http.request.remoteaddr="127.0.0.1:49878" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration=10.233151ms http.response.status=0 http.response.written=0 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:46637" http.request.id=f89581da-0937-46a7-ac48-8e041c69fa7a http.request.method=GET http.request.remoteaddr="127.0.0.1:49878" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.json http.request.useragent=Go-http-client/1.1 http.response.duration="568.179µs" http.response.status=200 http.response.written=688 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:46637" http.request.id=f20f089a-f069-4ebc-8a3d-3a3d14d529cb http.request.method=GET http.request.remoteaddr="127.0.0.1:49878" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.6a8a2ecb622b98f5a4baca07abd4e26c802e2baa24d49e1f0c2f234fe3d69f0f.json http.request.useragent=Go-http-client/1.1 http.response.duration="59.947µs" http.response.status=200 http.response.written=688 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:46637" http.request.id=85668677-96bf-4572-a855-0d4bff2c80e8 http.request.method=GET http.request.remoteaddr="127.0.0.1:49878" http.request.uri=/v2/docker.io/notary/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="458.736µs" http.response.status=200 http.response.written=181 -time="2026-03-20T19:21:36-12:00" level=info msg="trust data deleted for docker.io/notary" docker.io/notary=gun go.version=go1.24.0 http.request.host="127.0.0.1:46637" http.request.id=89bf9e94-5bf9-4644-80bc-8c2f53b1fe1e http.request.method=DELETE http.request.remoteaddr="127.0.0.1:49878" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:46637" http.request.id=89bf9e94-5bf9-4644-80bc-8c2f53b1fe1e http.request.method=DELETE http.request.remoteaddr="127.0.0.1:49878" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration="58.375µs" http.response.status=0 http.response.written=0 ---- PASS: TestRepoPrefixMatches (0.04s) +time="2025-02-16T15:08:21+14:00" level=info msg="updated docker.io/notary to timestamp version 1, checksum 0656e0a524583b90b6940f9d8ee063869ce0832efb347681da3111b3aab2e0d2" docker.io/notary=gun go.version=go1.24.0 http.request.contenttype="multipart/form-data; boundary=a5091c222174d1bb124ff62e9f6012523365708054d1041fe99891680dd5" http.request.host="127.0.0.1:38267" http.request.id=637c726c-e909-4d26-8af9-5098ee9ff2df http.request.method=POST http.request.remoteaddr="127.0.0.1:53344" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 +time="2025-02-16T15:08:21+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.contenttype="multipart/form-data; boundary=a5091c222174d1bb124ff62e9f6012523365708054d1041fe99891680dd5" http.request.host="127.0.0.1:38267" http.request.id=637c726c-e909-4d26-8af9-5098ee9ff2df http.request.method=POST http.request.remoteaddr="127.0.0.1:53344" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration=8.503337ms http.response.status=0 http.response.written=0 +time="2025-02-16T15:08:21+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:38267" http.request.id=20d3d932-60cd-4b3d-9d64-dadd645483ce http.request.method=GET http.request.remoteaddr="127.0.0.1:53344" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.json http.request.useragent=Go-http-client/1.1 http.response.duration=1.441914ms http.response.status=200 http.response.written=688 +time="2025-02-16T15:08:21+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:38267" http.request.id=45358c63-05b5-4d0f-b2d2-f042bc265257 http.request.method=GET http.request.remoteaddr="127.0.0.1:53344" http.request.uri=/v2/docker.io/notary/_trust/tuf/snapshot.9519959339fcf977c9394b016bcae89546f6adafeb22a5598a5814c931b72795.json http.request.useragent=Go-http-client/1.1 http.response.duration="157.572µs" http.response.status=200 http.response.written=688 +time="2025-02-16T15:08:21+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:38267" http.request.id=bfd7e8a7-ef3a-4465-b9ff-9f1fabb370bf http.request.method=GET http.request.remoteaddr="127.0.0.1:53344" http.request.uri=/v2/docker.io/notary/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="514.062µs" http.response.status=200 http.response.written=181 +time="2025-02-16T15:08:21+14:00" level=info msg="trust data deleted for docker.io/notary" docker.io/notary=gun go.version=go1.24.0 http.request.host="127.0.0.1:38267" http.request.id=4e0c4ef7-b2c4-4c69-88c3-08f83490b533 http.request.method=DELETE http.request.remoteaddr="127.0.0.1:53344" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 +time="2025-02-16T15:08:21+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:38267" http.request.id=4e0c4ef7-b2c4-4c69-88c3-08f83490b533 http.request.method=DELETE http.request.remoteaddr="127.0.0.1:53344" http.request.uri=/v2/docker.io/notary/_trust/tuf/ http.request.useragent=Go-http-client/1.1 http.response.duration="59.83µs" http.response.status=0 http.response.written=0 +--- PASS: TestRepoPrefixMatches (0.09s) === RUN TestRepoPrefixDoesNotMatch ---- PASS: TestRepoPrefixDoesNotMatch (0.04s) +--- PASS: TestRepoPrefixDoesNotMatch (0.07s) === RUN TestMetricsEndpoint ---- PASS: TestMetricsEndpoint (0.03s) +--- PASS: TestMetricsEndpoint (0.07s) === RUN TestGetKeysEndpoint -time="2026-03-20T19:21:36-12:00" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.24.0 http.request.host="127.0.0.1:36887" http.request.id=d8c5f71f-f89a-4670-8195-aafaffa0dfce http.request.method=GET http.request.remoteaddr="127.0.0.1:55440" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:36887" http.request.id=d8c5f71f-f89a-4670-8195-aafaffa0dfce http.request.method=GET http.request.remoteaddr="127.0.0.1:55440" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="207.111µs" http.response.status=404 http.response.written=104 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:36887" http.request.id=85c8d683-bdeb-465b-8c59-69f71de41e28 http.request.method=GET http.request.remoteaddr="127.0.0.1:55450" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration=2.18413ms http.response.status=200 http.response.written=103 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:36887" http.request.id=905526d0-1b7c-4611-b403-75066bc88b2f http.request.method=GET http.request.remoteaddr="127.0.0.1:55454" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="144.357µs" http.response.status=200 http.response.written=103 -time="2026-03-20T19:21:36-12:00" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.24.0 http.request.host="127.0.0.1:36887" http.request.id=9d5ebbe6-46a7-42b8-9eaf-b65b9cc8ba90 http.request.method=GET http.request.remoteaddr="127.0.0.1:55468" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:36887" http.request.id=9d5ebbe6-46a7-42b8-9eaf-b65b9cc8ba90 http.request.method=GET http.request.remoteaddr="127.0.0.1:55468" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="133.488µs" http.response.status=404 http.response.written=104 -time="2026-03-20T19:21:36-12:00" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.24.0 http.request.host="127.0.0.1:36887" http.request.id=ad2950c4-4051-46e8-bd17-9676f4ab41c3 http.request.method=GET http.request.remoteaddr="127.0.0.1:55482" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:36887" http.request.id=ad2950c4-4051-46e8-bd17-9676f4ab41c3 http.request.method=GET http.request.remoteaddr="127.0.0.1:55482" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="133.199µs" http.response.status=404 http.response.written=104 ---- PASS: TestGetKeysEndpoint (0.03s) +time="2025-02-16T15:08:22+14:00" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.24.0 http.request.host="127.0.0.1:36581" http.request.id=fb6a4e09-ea2a-4864-b294-36e3da06ec90 http.request.method=GET http.request.remoteaddr="127.0.0.1:34438" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 +time="2025-02-16T15:08:22+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:36581" http.request.id=fb6a4e09-ea2a-4864-b294-36e3da06ec90 http.request.method=GET http.request.remoteaddr="127.0.0.1:34438" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="330.002µs" http.response.status=404 http.response.written=104 +time="2025-02-16T15:08:22+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:36581" http.request.id=fba51112-f354-4124-ab7f-e1ff6b2da87d http.request.method=GET http.request.remoteaddr="127.0.0.1:34448" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration=17.177318ms http.response.status=200 http.response.written=103 +time="2025-02-16T15:08:22+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:36581" http.request.id=d9896e5c-b168-406f-9d76-3840d713318e http.request.method=GET http.request.remoteaddr="127.0.0.1:34458" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="308.108µs" http.response.status=200 http.response.written=103 +time="2025-02-16T15:08:22+14:00" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.24.0 http.request.host="127.0.0.1:36581" http.request.id=23a3592f-2399-4b0e-a598-fd71aed88b37 http.request.method=GET http.request.remoteaddr="127.0.0.1:34464" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 +time="2025-02-16T15:08:22+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:36581" http.request.id=23a3592f-2399-4b0e-a598-fd71aed88b37 http.request.method=GET http.request.remoteaddr="127.0.0.1:34464" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="126.349µs" http.response.status=404 http.response.written=104 +time="2025-02-16T15:08:22+14:00" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.24.0 http.request.host="127.0.0.1:36581" http.request.id=de634133-b079-4576-acf5-d8df7ce50ca6 http.request.method=GET http.request.remoteaddr="127.0.0.1:34466" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 +time="2025-02-16T15:08:22+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:36581" http.request.id=de634133-b079-4576-acf5-d8df7ce50ca6 http.request.method=GET http.request.remoteaddr="127.0.0.1:34466" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="77.451µs" http.response.status=404 http.response.written=104 +--- PASS: TestGetKeysEndpoint (0.05s) === RUN TestGetRoleByHash -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:38841" http.request.id=17aa66f9-0a3e-4da4-890a-112e739dfc74 http.request.method=GET http.request.remoteaddr="127.0.0.1:40124" http.request.uri=/v2/gun/_trust/tuf/timestamp.769ee9375e997c76ce01ddccb8b0aaed4785a764f71748c435827a1a8c1d1bf2.json http.request.useragent=Go-http-client/1.1 http.response.duration="100.584µs" http.response.status=200 http.response.written=120 ---- PASS: TestGetRoleByHash (0.02s) +time="2025-02-16T15:08:22+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:44103" http.request.id=92bfe53d-21a4-4a6f-aad7-49ee43e7432b http.request.method=GET http.request.remoteaddr="127.0.0.1:44630" http.request.uri=/v2/gun/_trust/tuf/timestamp.9c6b70c9ccdb4070292ea78d27ed93733eb25de64add396324814150cf0d96bc.json http.request.useragent=Go-http-client/1.1 http.response.duration="139.425µs" http.response.status=200 http.response.written=120 +--- PASS: TestGetRoleByHash (0.01s) === RUN TestGetRoleByVersion -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:39389" http.request.id=77975177-1798-4052-afc8-abacd55bdca6 http.request.method=GET http.request.remoteaddr="127.0.0.1:52564" http.request.uri=/v2/gun/_trust/tuf/1.timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration="73.59µs" http.response.status=200 http.response.written=120 ---- PASS: TestGetRoleByVersion (0.00s) +time="2025-02-16T15:08:22+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:39739" http.request.id=54b90a8a-0811-42ac-b5b3-ca517e35369b http.request.method=GET http.request.remoteaddr="127.0.0.1:44224" http.request.uri=/v2/gun/_trust/tuf/1.timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration="198.858µs" http.response.status=200 http.response.written=120 +--- PASS: TestGetRoleByVersion (0.04s) === RUN TestGetCurrentRole -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:45589" http.request.id=84d021ec-0988-49aa-9ed6-8ec52aaf4cf9 http.request.method=GET http.request.remoteaddr="127.0.0.1:35868" http.request.uri=/v2/gun/_trust/tuf/timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration="632.577µs" http.response.status=200 http.response.written=500 ---- PASS: TestGetCurrentRole (0.02s) +time="2025-02-16T15:08:22+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:40175" http.request.id=5fe13102-75de-4397-b248-455d6157c3bd http.request.method=GET http.request.remoteaddr="127.0.0.1:48666" http.request.uri=/v2/gun/_trust/tuf/timestamp.json http.request.useragent=Go-http-client/1.1 http.response.duration="670.234µs" http.response.status=200 http.response.written=500 +--- PASS: TestGetCurrentRole (0.03s) === RUN TestRotateKeyEndpoint -time="2026-03-20T19:21:36-12:00" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:45903" http.request.id=b7d71468-f469-4d18-9103-f31bcdabe3a1 http.request.method=POST http.request.remoteaddr="127.0.0.1:58518" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:45903" http.request.id=b7d71468-f469-4d18-9103-f31bcdabe3a1 http.request.method=POST http.request.remoteaddr="127.0.0.1:58518" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="144.188µs" http.response.status=404 http.response.written=104 -time="2026-03-20T19:21:36-12:00" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:45903" http.request.id=fbde7762-dac5-4c4f-ac06-ccf710594fc7 http.request.method=POST http.request.remoteaddr="127.0.0.1:58524" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:45903" http.request.id=fbde7762-dac5-4c4f-ac06-ccf710594fc7 http.request.method=POST http.request.remoteaddr="127.0.0.1:58524" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration=7.954271ms http.response.status=404 http.response.written=104 -time="2026-03-20T19:21:36-12:00" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:45903" http.request.id=c8ec2573-7fd2-4f57-89db-0f6d687a61e6 http.request.method=POST http.request.remoteaddr="127.0.0.1:58530" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:45903" http.request.id=c8ec2573-7fd2-4f57-89db-0f6d687a61e6 http.request.method=POST http.request.remoteaddr="127.0.0.1:58530" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="121.626µs" http.response.status=404 http.response.written=104 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:45903" http.request.id=f5ff543f-7bef-49b3-be5e-c82e904ace97 http.request.method=POST http.request.remoteaddr="127.0.0.1:58540" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="158.002µs" http.response.status=200 http.response.written=103 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:45903" http.request.id=edaf7385-ec15-4139-87f0-240a3597162e http.request.method=POST http.request.remoteaddr="127.0.0.1:58542" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="114.026µs" http.response.status=200 http.response.written=103 -time="2026-03-20T19:21:36-12:00" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:45903" http.request.id=89a1cb08-c09b-40cc-97c3-4361b6d5c3ae http.request.method=POST http.request.remoteaddr="127.0.0.1:58544" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:45903" http.request.id=89a1cb08-c09b-40cc-97c3-4361b6d5c3ae http.request.method=POST http.request.remoteaddr="127.0.0.1:58544" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="83.38µs" http.response.status=404 http.response.written=104 ---- PASS: TestRotateKeyEndpoint (0.02s) +time="2025-02-16T15:08:22+14:00" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:39059" http.request.id=3ee66e4a-1505-4fec-be90-2b4b4c89191e http.request.method=POST http.request.remoteaddr="127.0.0.1:60674" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 +time="2025-02-16T15:08:22+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:39059" http.request.id=3ee66e4a-1505-4fec-be90-2b4b4c89191e http.request.method=POST http.request.remoteaddr="127.0.0.1:60674" http.request.uri=/v2/gun/_trust/tuf/somerandomrole.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="286.203µs" http.response.status=404 http.response.written=104 +time="2025-02-16T15:08:22+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:39059" http.request.id=ffe55f80-6f6d-48ec-ac38-02e337cd1886 http.request.method=POST http.request.remoteaddr="127.0.0.1:60688" http.request.uri=/v2/gun/_trust/tuf/timestamp.key http.request.useragent=Go-http-client/1.1 http.response.duration="343.782µs" http.response.status=200 http.response.written=103 +time="2025-02-16T15:08:22+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:39059" http.request.id=eaf8ce3f-dff4-43b4-8e62-4a83bef2c7d0 http.request.method=POST http.request.remoteaddr="127.0.0.1:60700" http.request.uri=/v2/gun/_trust/tuf/snapshot.key http.request.useragent=Go-http-client/1.1 http.response.duration="184.911µs" http.response.status=200 http.response.written=103 +time="2025-02-16T15:08:22+14:00" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:39059" http.request.id=e9e9d352-973e-47b0-95e0-5c581e657c05 http.request.method=POST http.request.remoteaddr="127.0.0.1:60712" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 +time="2025-02-16T15:08:22+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:39059" http.request.id=e9e9d352-973e-47b0-95e0-5c581e657c05 http.request.method=POST http.request.remoteaddr="127.0.0.1:60712" http.request.uri=/v2/gun/_trust/tuf/targets.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration=8.176218ms http.response.status=404 http.response.written=104 +time="2025-02-16T15:08:22+14:00" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:39059" http.request.id=22629fbc-799a-4fa0-a61d-1dc894421d67 http.request.method=POST http.request.remoteaddr="127.0.0.1:60728" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 +time="2025-02-16T15:08:22+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:39059" http.request.id=22629fbc-799a-4fa0-a61d-1dc894421d67 http.request.method=POST http.request.remoteaddr="127.0.0.1:60728" http.request.uri=/v2/gun/_trust/tuf/root.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="308.02µs" http.response.status=404 http.response.written=104 +time="2025-02-16T15:08:22+14:00" level=info msg="metadata not found: You have requested metadata that does not exist.: " go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:39059" http.request.id=d59d8053-566f-494e-a010-43b8a3bcdb3d http.request.method=POST http.request.remoteaddr="127.0.0.1:60734" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1 +time="2025-02-16T15:08:22+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.contenttype=text/plain http.request.host="127.0.0.1:39059" http.request.id=d59d8053-566f-494e-a010-43b8a3bcdb3d http.request.method=POST http.request.remoteaddr="127.0.0.1:60734" http.request.uri=/v2/gun/_trust/tuf/targets/delegation.key http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="390.359µs" http.response.status=404 http.response.written=104 +--- PASS: TestRotateKeyEndpoint (0.06s) PASS -ok github.com/theupdateframework/notary/server 0.305s +ok github.com/theupdateframework/notary/server 0.636s ? github.com/theupdateframework/notary/server/errors [no test files] === RUN Test_changefeed ---- PASS: Test_changefeed (0.01s) +--- PASS: Test_changefeed (0.00s) === RUN Test_checkChangefeedInputs -time="2026-03-20T19:21:36-12:00" level=error msg="500 GET unable to retrieve storage" -time="2026-03-20T19:21:36-12:00" level=error msg="400 GET invalid pageSize: not_a_number" +time="2025-02-16T15:08:21+14:00" level=error msg="500 GET unable to retrieve storage" +time="2025-02-16T15:08:21+14:00" level=error msg="400 GET invalid pageSize: not_a_number" --- PASS: Test_checkChangefeedInputs (0.00s) === RUN TestMainHandlerGet -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:37765" http.request.id=aaab09ae-4b99-47b8-93ac-eed47f617664 http.request.method=GET http.request.remoteaddr="127.0.0.1:34016" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.duration="82.278µs" http.response.status=200 http.response.written=2 ---- PASS: TestMainHandlerGet (0.01s) +time="2025-02-16T15:08:21+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:34001" http.request.id=c9157f97-7b00-4072-827a-ed6b7c00aff9 http.request.method=GET http.request.remoteaddr="127.0.0.1:36562" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.duration="56.609µs" http.response.status=200 http.response.written=2 +--- PASS: TestMainHandlerGet (0.00s) === RUN TestMainHandlerNotGet -time="2026-03-20T19:21:36-12:00" level=info msg="generic not found: You have requested a resource that does not exist.: " go.version=go1.24.0 http.request.host="127.0.0.1:42365" http.request.id=9661e1aa-cc60-4f52-afa7-08f34379b3a1 http.request.method=HEAD http.request.remoteaddr="127.0.0.1:40838" http.request.uri=/ http.request.useragent=Go-http-client/1.1 -time="2026-03-20T19:21:36-12:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:42365" http.request.id=9661e1aa-cc60-4f52-afa7-08f34379b3a1 http.request.method=HEAD http.request.remoteaddr="127.0.0.1:40838" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="241.363µs" http.response.status=404 http.response.written=105 ---- PASS: TestMainHandlerNotGet (0.00s) +time="2025-02-16T15:08:21+14:00" level=info msg="generic not found: You have requested a resource that does not exist.: " go.version=go1.24.0 http.request.host="127.0.0.1:41661" http.request.id=e821c9da-c28c-4d0e-a677-f423b9baf89e http.request.method=HEAD http.request.remoteaddr="127.0.0.1:36278" http.request.uri=/ http.request.useragent=Go-http-client/1.1 +time="2025-02-16T15:08:21+14:00" level=info msg="response completed" go.version=go1.24.0 http.request.host="127.0.0.1:41661" http.request.id=e821c9da-c28c-4d0e-a677-f423b9baf89e http.request.method=HEAD http.request.remoteaddr="127.0.0.1:36278" http.request.uri=/ http.request.useragent=Go-http-client/1.1 http.response.contenttype="application/json; charset=utf-8" http.response.duration="435.435µs" http.response.status=404 http.response.written=105 +--- PASS: TestMainHandlerNotGet (0.02s) === RUN TestKeyHandlersInvalidConfiguration -time="2026-03-20T19:21:36-12:00" level=error msg="500 GET storage not configured" go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=error msg="500 GET storage not configured" go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=error msg="500 GET crypto service not configured" go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=error msg="500 GET crypto service not configured" go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=error msg="500 GET key algorithm not configured" go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=error msg="500 GET key algorithm not configured" go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=error msg="500 POST storage not configured" go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=error msg="500 POST storage not configured" go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=error msg="500 POST crypto service not configured" go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=error msg="500 POST crypto service not configured" go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=error msg="500 POST key algorithm not configured" go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=error msg="500 POST key algorithm not configured" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=error msg="500 GET storage not configured" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=error msg="500 GET storage not configured" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=error msg="500 GET crypto service not configured" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=error msg="500 GET crypto service not configured" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=error msg="500 GET key algorithm not configured" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=error msg="500 GET key algorithm not configured" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=error msg="500 POST key algorithm not configured" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=error msg="500 POST key algorithm not configured" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=error msg="500 POST storage not configured" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=error msg="500 POST storage not configured" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=error msg="500 POST crypto service not configured" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=error msg="500 POST crypto service not configured" go.version=go1.24.0 gun=gun --- PASS: TestKeyHandlersInvalidConfiguration (0.00s) === RUN TestKeyHandlersNoRoleOrRepo -time="2026-03-20T19:21:36-12:00" level=info msg="400 GET no gun in request" =gun go.version=go1.24.0 -time="2026-03-20T19:21:36-12:00" level=info msg="400 GET no gun in request" =gun go.version=go1.24.0 -time="2026-03-20T19:21:36-12:00" level=info msg="400 GET no role in request" go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=info msg="400 GET no role in request" go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=info msg="400 POST no gun in request" =gun go.version=go1.24.0 -time="2026-03-20T19:21:36-12:00" level=info msg="400 POST no gun in request" =gun go.version=go1.24.0 -time="2026-03-20T19:21:36-12:00" level=info msg="400 POST no role in request" go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=info msg="400 POST no role in request" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=info msg="400 GET no gun in request" =gun go.version=go1.24.0 +time="2025-02-16T15:08:21+14:00" level=info msg="400 GET no gun in request" =gun go.version=go1.24.0 +time="2025-02-16T15:08:21+14:00" level=info msg="400 GET no role in request" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=info msg="400 GET no role in request" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=info msg="400 POST no gun in request" =gun go.version=go1.24.0 +time="2025-02-16T15:08:21+14:00" level=info msg="400 POST no gun in request" =gun go.version=go1.24.0 +time="2025-02-16T15:08:21+14:00" level=info msg="400 POST no role in request" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=info msg="400 POST no role in request" go.version=go1.24.0 gun=gun --- PASS: TestKeyHandlersNoRoleOrRepo (0.00s) === RUN TestKeyHandlersInvalidRole -time="2026-03-20T19:21:36-12:00" level=info msg="400 GET root key: " go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=info msg="400 GET targets key: " go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=info msg="400 GET targets/a key: " go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=info msg="400 GET invalidrole key: " go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=info msg="400 POST root key: " go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=info msg="400 POST targets key: " go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=info msg="400 POST targets/a key: " go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=info msg="400 POST invalidrole key: " go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=info msg="400 GET root key: " go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=info msg="400 GET targets key: " go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=info msg="400 GET targets/a key: " go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=info msg="400 GET invalidrole key: " go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=info msg="400 POST root key: " go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=info msg="400 POST targets key: " go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=info msg="400 POST targets/a key: " go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=info msg="400 POST invalidrole key: " go.version=go1.24.0 gun=gun --- PASS: TestKeyHandlersInvalidRole (0.00s) === RUN TestGetKeyHandlerCreatesOnce ---- PASS: TestGetKeyHandlerCreatesOnce (0.01s) +--- PASS: TestGetKeyHandlerCreatesOnce (0.02s) === RUN TestKeyHandlersInvalidKeyAlgo -time="2026-03-20T19:21:36-12:00" level=error msg="500 GET timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=error msg="500 GET snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=error msg="500 POST timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.24.0 gun=gun -time="2026-03-20T19:21:36-12:00" level=error msg="500 POST snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=error msg="500 GET timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=error msg="500 GET snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=error msg="500 POST timestamp key: only ED25519 supported by this cryptoservice" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=error msg="500 POST snapshot key: only ED25519 supported by this cryptoservice" go.version=go1.24.0 gun=gun --- PASS: TestKeyHandlersInvalidKeyAlgo (0.00s) === RUN TestRotateKeyHandlerSuccessfulRotation --- PASS: TestRotateKeyHandlerSuccessfulRotation (0.00s) === RUN TestGetHandlerRoot -time="2026-03-20T19:21:36-12:00" level=info msg="404 GET root role" go.version=go1.24.0 gun=gun ---- PASS: TestGetHandlerRoot (0.01s) +time="2025-02-16T15:08:21+14:00" level=info msg="404 GET root role" go.version=go1.24.0 gun=gun +--- PASS: TestGetHandlerRoot (0.00s) === RUN TestGetHandlerTimestamp ---- PASS: TestGetHandlerTimestamp (0.00s) +--- PASS: TestGetHandlerTimestamp (0.04s) === RUN TestGetHandlerSnapshot ---- PASS: TestGetHandlerSnapshot (0.02s) +--- PASS: TestGetHandlerSnapshot (0.03s) === RUN TestGetHandler404 -time="2026-03-20T19:21:36-12:00" level=info msg="404 GET root role" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=info msg="404 GET root role" go.version=go1.24.0 gun=gun --- PASS: TestGetHandler404 (0.00s) === RUN TestGetHandlerNilData -time="2026-03-20T19:21:36-12:00" level=info msg="404 GET root role" go.version=go1.24.0 gun=gun +time="2025-02-16T15:08:21+14:00" level=info msg="404 GET root role" go.version=go1.24.0 gun=gun --- PASS: TestGetHandlerNilData (0.00s) === RUN TestGetHandlerNoStorage -time="2026-03-20T19:21:36-12:00" level=error msg="500 GET: no storage exists" =gun go.version=go1.24.0 +time="2025-02-16T15:08:21+14:00" level=error msg="500 GET: no storage exists" =gun go.version=go1.24.0 --- PASS: TestGetHandlerNoStorage (0.00s) === RUN TestAtomicUpdateValidationFailurePropagated ---- PASS: TestAtomicUpdateValidationFailurePropagated (0.03s) +--- PASS: TestAtomicUpdateValidationFailurePropagated (0.05s) === RUN TestAtomicUpdateNonValidationFailureNotPropagated -time="2026-03-20T19:21:36-12:00" level=info msg="400 POST error validating update" go.version=go1.24.0 testGUN=gun ---- PASS: TestAtomicUpdateNonValidationFailureNotPropagated (0.01s) +time="2025-02-16T15:08:21+14:00" level=info msg="400 POST error validating update" go.version=go1.24.0 testGUN=gun +--- PASS: TestAtomicUpdateNonValidationFailureNotPropagated (0.04s) === RUN TestAtomicUpdateVersionErrorPropagated -time="2026-03-20T19:21:36-12:00" level=info msg="400 POST old version error" go.version=go1.24.0 testGUN=gun ---- PASS: TestAtomicUpdateVersionErrorPropagated (0.03s) +time="2025-02-16T15:08:21+14:00" level=info msg="400 POST old version error" go.version=go1.24.0 testGUN=gun +--- PASS: TestAtomicUpdateVersionErrorPropagated (0.04s) === RUN TestGetMaybeServerSignedNoCrypto --- PASS: TestGetMaybeServerSignedNoCrypto (0.00s) === RUN TestGetMaybeServerSignedNoKey --- PASS: TestGetMaybeServerSignedNoKey (0.00s) === RUN TestValidateEmptyNew ---- PASS: TestValidateEmptyNew (0.02s) +--- PASS: TestValidateEmptyNew (0.05s) === RUN TestValidateRootCanContainOnlyx509KeysWithRightGun --- PASS: TestValidateRootCanContainOnlyx509KeysWithRightGun (0.05s) === RUN TestValidatePrevTimestamp ---- PASS: TestValidatePrevTimestamp (0.04s) +--- PASS: TestValidatePrevTimestamp (0.05s) === RUN TestValidatePreviousTimestampCorrupt -time="2026-03-20T19:21:36-12:00" level=error msg="Failed to unmarshal existing timestamp for GUN docker.com/notary" +time="2025-02-16T15:08:22+14:00" level=error msg="Failed to unmarshal existing timestamp for GUN docker.com/notary" --- PASS: TestValidatePreviousTimestampCorrupt (0.04s) === RUN TestValidateGetCurrentTimestampBroken ---- PASS: TestValidateGetCurrentTimestampBroken (0.03s) +--- PASS: TestValidateGetCurrentTimestampBroken (0.06s) === RUN TestValidateNoNewRoot --- PASS: TestValidateNoNewRoot (0.04s) === RUN TestValidateNoNewTargets ---- PASS: TestValidateNoNewTargets (0.02s) +--- PASS: TestValidateNoNewTargets (0.03s) === RUN TestValidateOnlySnapshot ---- PASS: TestValidateOnlySnapshot (0.03s) +--- PASS: TestValidateOnlySnapshot (0.04s) === RUN TestValidateOldRoot ---- PASS: TestValidateOldRoot (0.03s) +--- PASS: TestValidateOldRoot (0.09s) === RUN TestValidateOldRootCorrupt ---- PASS: TestValidateOldRootCorrupt (0.01s) +--- PASS: TestValidateOldRootCorrupt (0.05s) === RUN TestValidateOldRootCorruptRootRole ---- PASS: TestValidateOldRootCorruptRootRole (0.02s) +--- PASS: TestValidateOldRootCorruptRootRole (0.07s) === RUN TestValidateRootGetCurrentRootBroken --- PASS: TestValidateRootGetCurrentRootBroken (0.02s) === RUN TestValidateRootRotationWithOldSigs ---- PASS: TestValidateRootRotationWithOldSigs (0.08s) +--- PASS: TestValidateRootRotationWithOldSigs (0.05s) === RUN TestValidateRootRotationMultipleKeysThreshold1 --- PASS: TestValidateRootRotationMultipleKeysThreshold1 (0.05s) === RUN TestRootRotationNotSignedWithOldKeysForOldRole ---- PASS: TestRootRotationNotSignedWithOldKeysForOldRole (0.10s) +--- PASS: TestRootRotationNotSignedWithOldKeysForOldRole (0.09s) === RUN TestRootRotationVersionIncrement ---- PASS: TestRootRotationVersionIncrement (0.06s) +--- PASS: TestRootRotationVersionIncrement (0.08s) === RUN TestValidateNoRoot ---- PASS: TestValidateNoRoot (0.03s) +--- PASS: TestValidateNoRoot (0.02s) === RUN TestValidateSnapshotMissingNoSnapshotKey ---- PASS: TestValidateSnapshotMissingNoSnapshotKey (0.04s) +--- PASS: TestValidateSnapshotMissingNoSnapshotKey (0.03s) === RUN TestValidateSnapshotGenerateNoPrev ---- PASS: TestValidateSnapshotGenerateNoPrev (0.04s) +--- PASS: TestValidateSnapshotGenerateNoPrev (0.05s) === RUN TestValidateSnapshotGenerateWithPrev ---- PASS: TestValidateSnapshotGenerateWithPrev (0.05s) +--- PASS: TestValidateSnapshotGenerateWithPrev (0.03s) === RUN TestValidateSnapshotGeneratePrevCorrupt -time="2026-03-20T19:21:37-12:00" level=error msg="Failed to unmarshal existing snapshot for GUN docker.com/notary" ---- PASS: TestValidateSnapshotGeneratePrevCorrupt (0.02s) +time="2025-02-16T15:08:23+14:00" level=error msg="Failed to unmarshal existing snapshot for GUN docker.com/notary" +--- PASS: TestValidateSnapshotGeneratePrevCorrupt (0.05s) === RUN TestValidateSnapshotGenerateStoreGetCurrentSnapshotBroken ---- PASS: TestValidateSnapshotGenerateStoreGetCurrentSnapshotBroken (0.02s) +--- PASS: TestValidateSnapshotGenerateStoreGetCurrentSnapshotBroken (0.03s) === RUN TestValidateSnapshotGenerateNoTargets ---- PASS: TestValidateSnapshotGenerateNoTargets (0.01s) +--- PASS: TestValidateSnapshotGenerateNoTargets (0.03s) === RUN TestValidateSnapshotGenerate ---- PASS: TestValidateSnapshotGenerate (0.03s) +--- PASS: TestValidateSnapshotGenerate (0.02s) === RUN TestValidateRootNoTimestampKey ---- PASS: TestValidateRootNoTimestampKey (0.00s) +--- PASS: TestValidateRootNoTimestampKey (0.01s) === RUN TestValidateRootInvalidTimestampKey ---- PASS: TestValidateRootInvalidTimestampKey (0.01s) +--- PASS: TestValidateRootInvalidTimestampKey (0.04s) === RUN TestValidateRootInvalidTimestampThreshold ---- PASS: TestValidateRootInvalidTimestampThreshold (0.01s) +--- PASS: TestValidateRootInvalidTimestampThreshold (0.07s) === RUN TestValidateRootInvalidZeroThreshold ---- PASS: TestValidateRootInvalidZeroThreshold (0.06s) +--- PASS: TestValidateRootInvalidZeroThreshold (0.15s) === RUN TestValidateRootRoleMissing ---- PASS: TestValidateRootRoleMissing (0.01s) +--- PASS: TestValidateRootRoleMissing (0.04s) === RUN TestValidateTargetsRoleMissing ---- PASS: TestValidateTargetsRoleMissing (0.03s) +--- PASS: TestValidateTargetsRoleMissing (0.04s) === RUN TestValidateSnapshotRoleMissing ---- PASS: TestValidateSnapshotRoleMissing (0.02s) +--- PASS: TestValidateSnapshotRoleMissing (0.04s) === RUN TestValidateRootSigMissing ---- PASS: TestValidateRootSigMissing (0.01s) +--- PASS: TestValidateRootSigMissing (0.04s) === RUN TestValidateTargetsSigMissing -time="2026-03-20T19:21:37-12:00" level=error msg="ErrBadTargets: tuf: data has no signatures" ---- PASS: TestValidateTargetsSigMissing (0.01s) +time="2025-02-16T15:08:23+14:00" level=error msg="ErrBadTargets: tuf: data has no signatures" +--- PASS: TestValidateTargetsSigMissing (0.05s) === RUN TestValidateSnapshotSigMissing ---- PASS: TestValidateSnapshotSigMissing (0.02s) +--- PASS: TestValidateSnapshotSigMissing (0.03s) === RUN TestValidateRootCorrupt --- PASS: TestValidateRootCorrupt (0.01s) === RUN TestValidateTargetsCorrupt -time="2026-03-20T19:21:37-12:00" level=error msg="ErrBadTargets: invalid character '\\u0084' looking for beginning of value" +time="2025-02-16T15:08:23+14:00" level=error msg="ErrBadTargets: invalid character '\\u0084' looking for beginning of value" --- PASS: TestValidateTargetsCorrupt (0.02s) === RUN TestValidateSnapshotCorrupt ---- PASS: TestValidateSnapshotCorrupt (0.02s) +--- PASS: TestValidateSnapshotCorrupt (0.05s) === RUN TestValidateRootModifiedSize ---- PASS: TestValidateRootModifiedSize (0.01s) +--- PASS: TestValidateRootModifiedSize (0.06s) === RUN TestValidateTargetsModifiedSize ---- PASS: TestValidateTargetsModifiedSize (0.02s) +--- PASS: TestValidateTargetsModifiedSize (0.06s) === RUN TestValidateRootModifiedHash ---- PASS: TestValidateRootModifiedHash (0.02s) +--- PASS: TestValidateRootModifiedHash (0.04s) === RUN TestValidateTargetsModifiedHash ---- PASS: TestValidateTargetsModifiedHash (0.02s) +--- PASS: TestValidateTargetsModifiedHash (0.06s) === RUN TestGenerateSnapshotRootNotLoaded --- PASS: TestGenerateSnapshotRootNotLoaded (0.00s) === RUN TestGenerateSnapshotNoKey ---- PASS: TestGenerateSnapshotNoKey (0.00s) +--- PASS: TestGenerateSnapshotNoKey (0.05s) === RUN TestLoadTargetsLoadsNothingIfNoUpdates --- PASS: TestLoadTargetsLoadsNothingIfNoUpdates (0.00s) === RUN TestValidateTargetsRequiresStoredParent -time="2026-03-20T19:21:37-12:00" level=error msg="ErrBadTargets: targets must be loaded first" ---- PASS: TestValidateTargetsRequiresStoredParent (0.02s) +time="2025-02-16T15:08:24+14:00" level=error msg="ErrBadTargets: targets must be loaded first" +--- PASS: TestValidateTargetsRequiresStoredParent (0.03s) === RUN TestValidateTargetsParentInUpdate -time="2026-03-20T19:21:37-12:00" level=error msg="ErrBadTargets: invalid character 'I' looking for beginning of value" +time="2025-02-16T15:08:24+14:00" level=error msg="ErrBadTargets: invalid character 'I' looking for beginning of value" --- PASS: TestValidateTargetsParentInUpdate (0.01s) === RUN TestValidateTargetsRoleNotInParent -time="2026-03-20T19:21:37-12:00" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist" -time="2026-03-20T19:21:37-12:00" level=error msg="ErrBadTargets: targets has already been loaded" -time="2026-03-20T19:21:37-12:00" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist" ---- PASS: TestValidateTargetsRoleNotInParent (0.01s) +time="2025-02-16T15:08:24+14:00" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist" +time="2025-02-16T15:08:24+14:00" level=error msg="ErrBadTargets: targets has already been loaded" +time="2025-02-16T15:08:24+14:00" level=error msg="ErrBadTargets: tuf: invalid role targets/level1. delegation does not exist" +--- PASS: TestValidateTargetsRoleNotInParent (0.04s) PASS -ok github.com/theupdateframework/notary/server/handlers 1.458s +ok github.com/theupdateframework/notary/server/handlers 2.480s === RUN TestSnapshotExpired --- PASS: TestSnapshotExpired (0.00s) === RUN TestSnapshotNotExpired --- PASS: TestSnapshotNotExpired (0.00s) === RUN TestGetSnapshotKeyCreate ---- PASS: TestGetSnapshotKeyCreate (0.00s) +--- PASS: TestGetSnapshotKeyCreate (0.02s) === RUN TestGetSnapshotKeyCreateWithFailingStore -time="2026-03-20T19:21:36-12:00" level=error msg="Error when retrieving root role for GUN gun: failing store failed" +time="2025-02-16T15:08:21+14:00" level=error msg="Error when retrieving root role for GUN gun: failing store failed" --- PASS: TestGetSnapshotKeyCreateWithFailingStore (0.00s) === RUN TestGetSnapshotKeyCreateWithCorruptedStore -time="2026-03-20T19:21:36-12:00" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve snapshot key ID" +time="2025-02-16T15:08:21+14:00" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve snapshot key ID" --- PASS: TestGetSnapshotKeyCreateWithCorruptedStore (0.00s) === RUN TestGetSnapshotKeyCreateWithInvalidAlgo --- PASS: TestGetSnapshotKeyCreateWithInvalidAlgo (0.00s) === RUN TestGetSnapshotKeyExistingMetadata ---- PASS: TestGetSnapshotKeyExistingMetadata (0.00s) +--- PASS: TestGetSnapshotKeyExistingMetadata (0.03s) === RUN TestGetSnapshotNoPreviousSnapshot -time="2026-03-20T19:21:36-12:00" level=error msg="Failed to unmarshal existing snapshot for GUN gun" ---- PASS: TestGetSnapshotNoPreviousSnapshot (0.01s) +time="2025-02-16T15:08:21+14:00" level=error msg="Failed to unmarshal existing snapshot for GUN gun" +--- PASS: TestGetSnapshotNoPreviousSnapshot (0.02s) === RUN TestGetSnapshotReturnsPreviousSnapshotIfUnexpired ---- PASS: TestGetSnapshotReturnsPreviousSnapshotIfUnexpired (0.00s) +--- PASS: TestGetSnapshotReturnsPreviousSnapshotIfUnexpired (0.02s) === RUN TestGetSnapshotOldSnapshotExpired ---- PASS: TestGetSnapshotOldSnapshotExpired (0.01s) +--- PASS: TestGetSnapshotOldSnapshotExpired (0.03s) === RUN TestCannotMakeNewSnapshotIfNoRoot ---- PASS: TestCannotMakeNewSnapshotIfNoRoot (0.01s) +--- PASS: TestCannotMakeNewSnapshotIfNoRoot (0.03s) === RUN TestCreateSnapshotNoKeyInCrypto ---- PASS: TestCreateSnapshotNoKeyInCrypto (0.02s) +--- PASS: TestCreateSnapshotNoKeyInCrypto (0.01s) PASS -ok github.com/theupdateframework/notary/server/snapshot 0.124s +ok github.com/theupdateframework/notary/server/snapshot 0.244s === RUN TestMemoryUpdateCurrentEmpty ---- PASS: TestMemoryUpdateCurrentEmpty (0.00s) +--- PASS: TestMemoryUpdateCurrentEmpty (0.01s) === RUN TestMemoryUpdateCurrentVersionCheckOldVersionExists --- PASS: TestMemoryUpdateCurrentVersionCheckOldVersionExists (0.00s) === RUN TestMemoryUpdateCurrentVersionCheckOldVersionNotExist @@ -3257,112 +3293,112 @@ === RUN TestRDBTUFFileJSONUnmarshallingFailure --- PASS: TestRDBTUFFileJSONUnmarshallingFailure (0.00s) === RUN TestSQLUpdateCurrentEmpty ---- PASS: TestSQLUpdateCurrentEmpty (0.21s) +--- PASS: TestSQLUpdateCurrentEmpty (0.45s) === RUN TestSQLUpdateCurrentVersionCheckOldVersionExists ---- PASS: TestSQLUpdateCurrentVersionCheckOldVersionExists (0.07s) +--- PASS: TestSQLUpdateCurrentVersionCheckOldVersionExists (0.23s) === RUN TestSQLUpdateCurrentVersionCheckOldVersionNotExist ---- PASS: TestSQLUpdateCurrentVersionCheckOldVersionNotExist (0.51s) +--- PASS: TestSQLUpdateCurrentVersionCheckOldVersionNotExist (0.21s) === RUN TestSQLUpdateManyNoConflicts ---- PASS: TestSQLUpdateManyNoConflicts (0.06s) +--- PASS: TestSQLUpdateManyNoConflicts (0.25s) === RUN TestSQLUpdateManyConflictRollback ---- PASS: TestSQLUpdateManyConflictRollback (0.08s) +--- PASS: TestSQLUpdateManyConflictRollback (0.15s) === RUN TestSQLDelete ---- PASS: TestSQLDelete (0.10s) +--- PASS: TestSQLDelete (0.40s) === RUN TestSQLDBCheckHealthTableMissing ---- PASS: TestSQLDBCheckHealthTableMissing (0.04s) +--- PASS: TestSQLDBCheckHealthTableMissing (0.10s) === RUN TestSQLDBCheckHealthDBConnectionFail ---- PASS: TestSQLDBCheckHealthDBConnectionFail (0.04s) +--- PASS: TestSQLDBCheckHealthDBConnectionFail (0.07s) === RUN TestSQLDBCheckHealthSucceeds ---- PASS: TestSQLDBCheckHealthSucceeds (0.03s) +--- PASS: TestSQLDBCheckHealthSucceeds (0.07s) === RUN TestSQLDBGetChecksum ---- PASS: TestSQLDBGetChecksum (0.05s) +--- PASS: TestSQLDBGetChecksum (0.18s) === RUN TestSQLDBGetChecksumNotFound ---- PASS: TestSQLDBGetChecksumNotFound (0.03s) +--- PASS: TestSQLDBGetChecksumNotFound (0.11s) === RUN TestSQLTUFMetaStoreGetCurrent ---- PASS: TestSQLTUFMetaStoreGetCurrent (0.11s) +--- PASS: TestSQLTUFMetaStoreGetCurrent (0.30s) === RUN TestSQLGetChanges ---- PASS: TestSQLGetChanges (0.09s) +--- PASS: TestSQLGetChanges (0.37s) === RUN TestSQLDBGetVersion ---- PASS: TestSQLDBGetVersion (0.04s) +--- PASS: TestSQLDBGetVersion (0.11s) PASS -ok github.com/theupdateframework/notary/server/storage 1.529s +ok github.com/theupdateframework/notary/server/storage 3.092s === RUN TestTimestampExpired --- PASS: TestTimestampExpired (0.00s) === RUN TestTimestampNotExpired --- PASS: TestTimestampNotExpired (0.00s) === RUN TestGetTimestampKey ---- PASS: TestGetTimestampKey (0.00s) +--- PASS: TestGetTimestampKey (0.05s) === RUN TestGetTimestampNoPreviousTimestamp -time="2026-03-20T19:21:36-12:00" level=error msg="Failed to unmarshal existing timestamp" ---- PASS: TestGetTimestampNoPreviousTimestamp (0.03s) +time="2025-02-16T15:08:21+14:00" level=error msg="Failed to unmarshal existing timestamp" +--- PASS: TestGetTimestampNoPreviousTimestamp (0.06s) === RUN TestGetTimestampReturnsPreviousTimestampIfUnexpired ---- PASS: TestGetTimestampReturnsPreviousTimestampIfUnexpired (0.01s) +--- PASS: TestGetTimestampReturnsPreviousTimestampIfUnexpired (0.03s) === RUN TestGetTimestampOldTimestampExpired ---- PASS: TestGetTimestampOldTimestampExpired (0.02s) +--- PASS: TestGetTimestampOldTimestampExpired (0.09s) === RUN TestCannotMakeNewTimestampIfNoRootOrSnapshot -time="2026-03-20T19:21:36-12:00" level=error msg="Failed to create a new timestamp" -time="2026-03-20T19:21:36-12:00" level=error msg="Failed to create a new timestamp" ---- PASS: TestCannotMakeNewTimestampIfNoRootOrSnapshot (0.02s) +time="2025-02-16T15:08:21+14:00" level=error msg="Failed to create a new timestamp" +time="2025-02-16T15:08:21+14:00" level=error msg="Failed to create a new timestamp" +--- PASS: TestCannotMakeNewTimestampIfNoRootOrSnapshot (0.04s) === RUN TestCreateTimestampNoKeyInCrypto -time="2026-03-20T19:21:36-12:00" level=error msg="Failed to create a new timestamp" +time="2025-02-16T15:08:21+14:00" level=error msg="Failed to create a new timestamp" --- PASS: TestCreateTimestampNoKeyInCrypto (0.01s) === RUN TestGetTimestampKeyCreateWithFailingStore -time="2026-03-20T19:21:36-12:00" level=error msg="Error when retrieving root role for GUN gun: failing store failed" +time="2025-02-16T15:08:21+14:00" level=error msg="Error when retrieving root role for GUN gun: failing store failed" --- PASS: TestGetTimestampKeyCreateWithFailingStore (0.00s) === RUN TestGetTimestampKeyCreateWithCorruptedStore -time="2026-03-20T19:21:36-12:00" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve timestamp key ID" +time="2025-02-16T15:08:21+14:00" level=error msg="Failed to unmarshal existing root for GUN gun to retrieve timestamp key ID" --- PASS: TestGetTimestampKeyCreateWithCorruptedStore (0.00s) === RUN TestGetTimestampKeyCreateWithInvalidAlgo --- PASS: TestGetTimestampKeyCreateWithInvalidAlgo (0.00s) === RUN TestGetTimestampKeyExistingMetadata --- PASS: TestGetTimestampKeyExistingMetadata (0.01s) PASS -ok github.com/theupdateframework/notary/server/timestamp 0.169s +ok github.com/theupdateframework/notary/server/timestamp 0.345s ? github.com/theupdateframework/notary/signer [no test files] ? github.com/theupdateframework/notary/signer/api [no test files] ? github.com/theupdateframework/notary/signer/client [no test files] === RUN TestGetSuccessPopulatesCache ---- PASS: TestGetSuccessPopulatesCache (0.03s) +--- PASS: TestGetSuccessPopulatesCache (0.02s) === RUN TestAddKeyPopulatesCacheIfSuccessful ---- PASS: TestAddKeyPopulatesCacheIfSuccessful (0.01s) +--- PASS: TestAddKeyPopulatesCacheIfSuccessful (0.02s) === RUN TestDeleteKeyRemovesKeyFromCache ---- PASS: TestDeleteKeyRemovesKeyFromCache (0.01s) +--- PASS: TestDeleteKeyRemovesKeyFromCache (0.02s) === RUN TestRDBPrivateKeyJSONUnmarshalling ---- PASS: TestRDBPrivateKeyJSONUnmarshalling (0.00s) +--- PASS: TestRDBPrivateKeyJSONUnmarshalling (0.02s) === RUN TestRDBPrivateKeyJSONUnmarshallingFailure --- PASS: TestRDBPrivateKeyJSONUnmarshallingFailure (0.00s) === RUN TestNewSQLKeyDBStorePropagatesDBError `nodb` is not officially supported, running under compatibility mode. --- PASS: TestNewSQLKeyDBStorePropagatesDBError (0.00s) === RUN TestSQLDBHealthCheckMissingTable ---- PASS: TestSQLDBHealthCheckMissingTable (0.05s) +--- PASS: TestSQLDBHealthCheckMissingTable (0.15s) === RUN TestSQLDBHealthCheckNoConnection ---- PASS: TestSQLDBHealthCheckNoConnection (0.04s) +--- PASS: TestSQLDBHealthCheckNoConnection (0.13s) === RUN TestSQLKeyCanOnlyBeAddedOnce (/build/reproducible-path/notary-0.7.0+git20240416.9d2b3b3+ds1/_build/src/github.com/theupdateframework/notary/signer/keydbstore/sql_keydbstore.go:98) -[2026-03-20 19:21:36]  UNIQUE constraint failed: private_keys.key_id  ---- PASS: TestSQLKeyCanOnlyBeAddedOnce (0.56s) +[2025-02-16 15:08:22]  UNIQUE constraint failed: private_keys.key_id  +--- PASS: TestSQLKeyCanOnlyBeAddedOnce (0.40s) === RUN TestSQLCreateDelete ---- PASS: TestSQLCreateDelete (0.28s) +--- PASS: TestSQLCreateDelete (0.45s) === RUN TestSQLKeyRotation ---- PASS: TestSQLKeyRotation (0.22s) +--- PASS: TestSQLKeyRotation (0.62s) === RUN TestSQLSigningMarksKeyActive -time="2026-03-20T19:21:38-12:00" level=error msg="Key 65a964a733a925c3914a892516923668c67d5d971ff066479fbba578588a4eb9 was just used to sign hash successful, db closed, error when trying to mark key as active: sql: database is closed" +time="2025-02-16T15:08:24+14:00" level=error msg="Key 96e13ef355c11f008670a34bebdd08c95a4b4abcbb14fb0bf5c262ec252f1785 was just used to sign hash successful, db closed, error when trying to mark key as active: sql: database is closed" +--- PASS: TestSQLSigningMarksKeyActive (0.64s) +=== RUN TestSQLCreateKey (/build/reproducible-path/notary-0.7.0+git20240416.9d2b3b3+ds1/_build/src/github.com/theupdateframework/notary/signer/keydbstore/sql_keydbstore.go:197) -[2026-03-20 19:21:38]  sql: database is closed  ---- PASS: TestSQLSigningMarksKeyActive (0.32s) -=== RUN TestSQLCreateKey ---- PASS: TestSQLCreateKey (0.32s) +[2025-02-16 15:08:24]  sql: database is closed  +--- PASS: TestSQLCreateKey (0.64s) === RUN TestSQLUnimplementedInterfaceBehavior ---- PASS: TestSQLUnimplementedInterfaceBehavior (0.10s) +--- PASS: TestSQLUnimplementedInterfaceBehavior (0.23s) PASS -ok github.com/theupdateframework/notary/signer/keydbstore 2.023s +ok github.com/theupdateframework/notary/signer/keydbstore 3.467s === RUN TestSet --- PASS: TestSet (0.00s) === RUN TestSetWithNoParentDirectory ---- PASS: TestSetWithNoParentDirectory (0.00s) +--- PASS: TestSetWithNoParentDirectory (0.02s) === RUN TestSetRemovesExistingFileBeforeWriting --- PASS: TestSetRemovesExistingFileBeforeWriting (0.00s) === RUN TestGetSized @@ -3378,7 +3414,7 @@ === RUN TestRemoveFile --- PASS: TestRemoveFile (0.00s) === RUN TestListFiles ---- PASS: TestListFiles (0.01s) +--- PASS: TestListFiles (0.03s) === RUN TestGetPath --- PASS: TestGetPath (0.00s) === RUN TestGetPathProtection @@ -3388,19 +3424,19 @@ === RUN TestCreateDirectory --- PASS: TestCreateDirectory (0.00s) === RUN TestCreatePrivateDirectory ---- PASS: TestCreatePrivateDirectory (0.00s) +--- PASS: TestCreatePrivateDirectory (0.02s) === RUN TestFileStoreConsistency ---- PASS: TestFileStoreConsistency (0.01s) +--- PASS: TestFileStoreConsistency (0.00s) === RUN TestHTTPStoreGetSized --- PASS: TestHTTPStoreGetSized (0.01s) === RUN TestHTTPStoreGetAllMeta --- PASS: TestHTTPStoreGetAllMeta (0.00s) === RUN TestSetSingleAndSetMultiMeta ---- PASS: TestSetSingleAndSetMultiMeta (0.01s) +--- PASS: TestSetSingleAndSetMultiMeta (0.00s) === RUN Test404Error --- PASS: Test404Error (0.00s) === RUN Test50XErrors ---- PASS: Test50XErrors (0.02s) +--- PASS: Test50XErrors (0.06s) === RUN Test400Error --- PASS: Test400Error (0.00s) === RUN TestTranslateErrorsParse400Errors @@ -3410,9 +3446,9 @@ === RUN TestTranslateErrorsLimitsErrorSize --- PASS: TestTranslateErrorsLimitsErrorSize (0.00s) === RUN TestHTTPStoreRemoveAll ---- PASS: TestHTTPStoreRemoveAll (0.00s) +--- PASS: TestHTTPStoreRemoveAll (0.01s) === RUN TestHTTPStoreRotateKey ---- PASS: TestHTTPStoreRotateKey (0.00s) +--- PASS: TestHTTPStoreRotateKey (0.01s) === RUN TestHTTPStoreGetKey --- PASS: TestHTTPStoreGetKey (0.00s) === RUN TestHTTPStoreGetRotateKeySizeLimited @@ -3437,7 +3473,7 @@ === RUN TestMemoryStoreMetadata --- PASS: TestMemoryStoreMetadata (0.00s) PASS -ok github.com/theupdateframework/notary/storage 0.144s +ok github.com/theupdateframework/notary/storage 0.277s ? github.com/theupdateframework/notary/storage/rethinkdb [no test files] === RUN TestExportKeys --- PASS: TestExportKeys (0.00s) @@ -3452,132 +3488,132 @@ === RUN TestImportNoPath --- PASS: TestImportNoPath (0.02s) === RUN TestNonRootPathInference ---- PASS: TestNonRootPathInference (0.01s) +--- PASS: TestNonRootPathInference (0.03s) === RUN TestBlockHeaderPrecedenceRoleAndGun --- PASS: TestBlockHeaderPrecedenceRoleAndGun (0.01s) === RUN TestBlockHeaderPrecedenceGunFromPath ---- PASS: TestBlockHeaderPrecedenceGunFromPath (0.00s) +--- PASS: TestBlockHeaderPrecedenceGunFromPath (0.01s) === RUN TestImportKeys2InOneFile --- PASS: TestImportKeys2InOneFile (0.00s) === RUN TestImportKeys2InOneFileNoPath ---- PASS: TestImportKeys2InOneFileNoPath (0.03s) +--- PASS: TestImportKeys2InOneFileNoPath (0.04s) === RUN TestEncryptedKeyImportFail -time="2026-03-20T19:21:36-12:00" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header" +time="2025-02-16T15:08:21+14:00" level=warning msg="failed to import key to store: Invalid key generated, key may be encrypted and does not contain path header" --- PASS: TestEncryptedKeyImportFail (0.01s) === RUN TestEncryptedKeyImportSuccess ---- PASS: TestEncryptedKeyImportSuccess (0.02s) +--- PASS: TestEncryptedKeyImportSuccess (0.03s) === RUN TestEncryption --- PASS: TestEncryption (0.02s) === RUN TestAddKey ---- PASS: TestAddKey (0.08s) +--- PASS: TestAddKey (0.12s) === RUN TestKeyStoreInternalState ---- PASS: TestKeyStoreInternalState (0.03s) +--- PASS: TestKeyStoreInternalState (0.01s) === RUN TestGet ---- PASS: TestGet (0.05s) +--- PASS: TestGet (0.11s) === RUN TestGetLegacyKey ---- PASS: TestGetLegacyKey (0.00s) +--- PASS: TestGetLegacyKey (0.01s) === RUN TestListKeys ---- PASS: TestListKeys (0.32s) +--- PASS: TestListKeys (0.10s) === RUN TestAddGetKeyMemStore ---- PASS: TestAddGetKeyMemStore (0.00s) +--- PASS: TestAddGetKeyMemStore (0.01s) === RUN TestAddGetKeyInfoMemStore --- PASS: TestAddGetKeyInfoMemStore (0.03s) === RUN TestGetDecryptedWithTamperedCipherText -time="2026-03-20T19:21:37-12:00" level=error msg="PEM block is empty" ---- PASS: TestGetDecryptedWithTamperedCipherText (0.09s) +time="2025-02-16T15:08:22+14:00" level=error msg="PEM block is empty" +--- PASS: TestGetDecryptedWithTamperedCipherText (0.03s) === RUN TestGetDecryptedWithInvalidPassphrase ---- PASS: TestGetDecryptedWithInvalidPassphrase (0.07s) +--- PASS: TestGetDecryptedWithInvalidPassphrase (0.11s) === RUN TestGetDecryptedWithConsistentlyInvalidPassphrase ---- PASS: TestGetDecryptedWithConsistentlyInvalidPassphrase (0.10s) +--- PASS: TestGetDecryptedWithConsistentlyInvalidPassphrase (0.21s) === RUN TestRemoveKey ---- PASS: TestRemoveKey (0.08s) +--- PASS: TestRemoveKey (0.11s) === RUN TestKeysAreCached --- PASS: TestKeysAreCached (0.02s) PASS -ok github.com/theupdateframework/notary/trustmanager 1.037s +ok github.com/theupdateframework/notary/trustmanager 1.120s === RUN TestRemoteStore -time="2026-03-20T19:21:36-12:00" level=info msg="listing files from localhost:9888" -time="2026-03-20T19:21:36-12:00" level=info msg="listing files from localhost:9888" ---- PASS: TestRemoteStore (0.10s) +time="2025-02-16T15:08:28+14:00" level=info msg="listing files from localhost:9888" +time="2025-02-16T15:08:28+14:00" level=info msg="listing files from localhost:9888" +--- PASS: TestRemoteStore (0.11s) === RUN TestErrors -time="2026-03-20T19:21:36-12:00" level=error msg="failed to store: test error" ---- PASS: TestErrors (0.12s) +time="2025-02-16T15:08:28+14:00" level=error msg="failed to store: test error" +--- PASS: TestErrors (0.09s) === RUN TestNewGRPCStorage --- PASS: TestNewGRPCStorage (0.00s) === RUN TestGRPCStorage --- PASS: TestGRPCStorage (0.00s) PASS -ok github.com/theupdateframework/notary/trustmanager/remoteks 0.274s +ok github.com/theupdateframework/notary/trustmanager/remoteks 0.249s ? github.com/theupdateframework/notary/trustmanager/remoteks/github.com/theupdateframework/notary/trustmanager/remoteks [no test files] ? github.com/theupdateframework/notary/trustmanager/yubikey [no test files] === RUN TestWildcardMatch --- PASS: TestWildcardMatch (0.00s) === RUN TestValidateRoot -2026/03/20 19:21:36 [INFO] generate received request -2026/03/20 19:21:36 [INFO] received CSR -2026/03/20 19:21:36 [INFO] generating key: ecdsa-256 -2026/03/20 19:21:36 [INFO] encoded CSR -2026/03/20 19:21:36 [INFO] signed certificate with serial number 530668532657886514361151034351670131197688830310 -2026/03/20 19:21:36 [INFO] received CSR -2026/03/20 19:21:36 [INFO] generating key: ecdsa-256 -2026/03/20 19:21:36 [INFO] encoded CSR -2026/03/20 19:21:36 [INFO] signed certificate with serial number 280362129815284067948607393504446197671134332731 -2026/03/20 19:21:36 [INFO] received CSR -2026/03/20 19:21:36 [INFO] generating key: ecdsa-256 -2026/03/20 19:21:36 [INFO] encoded CSR -2026/03/20 19:21:36 [INFO] signed certificate with serial number 159211596014419260672758741167350325183337078661 ---- PASS: TestValidateRoot (0.07s) +2025/02/16 15:08:32 [INFO] generate received request +2025/02/16 15:08:32 [INFO] received CSR +2025/02/16 15:08:32 [INFO] generating key: ecdsa-256 +2025/02/16 15:08:32 [INFO] encoded CSR +2025/02/16 15:08:32 [INFO] signed certificate with serial number 544303471033479698580437683982505246522212311392 +2025/02/16 15:08:32 [INFO] received CSR +2025/02/16 15:08:32 [INFO] generating key: ecdsa-256 +2025/02/16 15:08:32 [INFO] encoded CSR +2025/02/16 15:08:32 [INFO] signed certificate with serial number 567342650001681783744096911919320086403248092912 +2025/02/16 15:08:32 [INFO] received CSR +2025/02/16 15:08:32 [INFO] generating key: ecdsa-256 +2025/02/16 15:08:32 [INFO] encoded CSR +2025/02/16 15:08:32 [INFO] signed certificate with serial number 115328706953463592736002785225917442834854514516 +--- PASS: TestValidateRoot (0.06s) === RUN TestValidateRootWithoutTOFUS --- PASS: TestValidateRootWithoutTOFUS (0.00s) === RUN TestValidateRootWithPinnedCert ---- PASS: TestValidateRootWithPinnedCert (0.00s) +--- PASS: TestValidateRootWithPinnedCert (0.01s) === RUN TestValidateRootWithPinnedCertAndIntermediates ---- PASS: TestValidateRootWithPinnedCertAndIntermediates (0.04s) +--- PASS: TestValidateRootWithPinnedCertAndIntermediates (0.07s) === RUN TestValidateRootFailuresWithPinnedCert ---- PASS: TestValidateRootFailuresWithPinnedCert (0.01s) +--- PASS: TestValidateRootFailuresWithPinnedCert (0.02s) === RUN TestValidateRootWithPinnedCA ---- PASS: TestValidateRootWithPinnedCA (0.08s) +--- PASS: TestValidateRootWithPinnedCA (0.12s) === RUN TestValidateSuccessfulRootRotation ---- PASS: TestValidateSuccessfulRootRotation (0.10s) +--- PASS: TestValidateSuccessfulRootRotation (0.11s) === RUN TestValidateRootRotationMissingOrigSig ---- PASS: TestValidateRootRotationMissingOrigSig (0.08s) +--- PASS: TestValidateRootRotationMissingOrigSig (0.11s) === RUN TestValidateRootRotationMissingNewSig ---- PASS: TestValidateRootRotationMissingNewSig (0.04s) +--- PASS: TestValidateRootRotationMissingNewSig (0.08s) === RUN TestValidateRootRotationTrustPinning ---- PASS: TestValidateRootRotationTrustPinning (0.04s) +--- PASS: TestValidateRootRotationTrustPinning (0.08s) === RUN TestValidateRootRotationTrustPinningInvalidCA ---- PASS: TestValidateRootRotationTrustPinningInvalidCA (0.28s) +--- PASS: TestValidateRootRotationTrustPinningInvalidCA (0.06s) === RUN TestParsePEMPublicKey -time="2026-03-20T19:21:37-12:00" level=warning msg="certificate with CN notary is near expiry" +time="2025-02-16T15:08:33+14:00" level=warning msg="certificate with CN notary is near expiry" --- PASS: TestParsePEMPublicKey (0.02s) === RUN TestCheckingCertExpiry -time="2026-03-20T19:21:37-12:00" level=warning msg="certificate with CN notary is near expiry" ---- PASS: TestCheckingCertExpiry (0.01s) +time="2025-02-16T15:08:33+14:00" level=warning msg="certificate with CN notary is near expiry" +--- PASS: TestCheckingCertExpiry (0.03s) === RUN TestValidateRootWithExpiredIntermediate ---- PASS: TestValidateRootWithExpiredIntermediate (0.01s) +--- PASS: TestValidateRootWithExpiredIntermediate (0.03s) === RUN TestCheckingWildcardCert --- PASS: TestCheckingWildcardCert (0.03s) === RUN TestWildcardMatching --- PASS: TestWildcardMatching (0.00s) PASS -ok github.com/theupdateframework/notary/trustpinning 0.889s +ok github.com/theupdateframework/notary/trustpinning 0.929s === RUN TestInitSnapshotNoTargets ---- PASS: TestInitSnapshotNoTargets (0.00s) +--- PASS: TestInitSnapshotNoTargets (0.01s) === RUN TestInitRepo ---- PASS: TestInitRepo (0.01s) +--- PASS: TestInitRepo (0.03s) === RUN TestUpdateDelegations --- PASS: TestUpdateDelegations (0.00s) === RUN TestPurgeDelegationsKeyFromTop -time="2026-03-20T19:21:36-12:00" level=warning msg="role targets/sybil has fewer keys than its threshold of 1; it will not be usable until keys are added to it" -time="2026-03-20T19:21:36-12:00" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-16T15:08:32+14:00" level=warning msg="role targets/sybil has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +time="2025-02-16T15:08:32+14:00" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it" --- PASS: TestPurgeDelegationsKeyFromTop (0.00s) === RUN TestPurgeDelegationsKeyFromDeep -time="2026-03-20T19:21:36-12:00" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it" ---- PASS: TestPurgeDelegationsKeyFromDeep (0.00s) +time="2025-02-16T15:08:32+14:00" level=warning msg="role targets/vimes/carrot has fewer keys than its threshold of 1; it will not be usable until keys are added to it" +--- PASS: TestPurgeDelegationsKeyFromDeep (0.01s) === RUN TestPurgeDelegationsKeyBadWildRole --- PASS: TestPurgeDelegationsKeyBadWildRole (0.00s) === RUN TestUpdateDelegationsParentMissing ---- PASS: TestUpdateDelegationsParentMissing (0.00s) +--- PASS: TestUpdateDelegationsParentMissing (0.01s) === RUN TestUpdateDelegationsMissingParentKey --- PASS: TestUpdateDelegationsMissingParentKey (0.00s) === RUN TestUpdateDelegationsInvalidRole @@ -3585,10 +3621,10 @@ === RUN TestUpdateDelegationsRoleThatIsMissingDelegationKey --- PASS: TestUpdateDelegationsRoleThatIsMissingDelegationKey (0.00s) === RUN TestUpdateDelegationsNotEnoughKeys -time="2026-03-20T19:21:36-12:00" level=warning msg="role targets/role has fewer keys than its threshold of 2; it will not be usable until keys are added to it" +time="2025-02-16T15:08:32+14:00" level=warning msg="role targets/role has fewer keys than its threshold of 2; it will not be usable until keys are added to it" --- PASS: TestUpdateDelegationsNotEnoughKeys (0.00s) === RUN TestUpdateDelegationsAddKeyToRole ---- PASS: TestUpdateDelegationsAddKeyToRole (0.00s) +--- PASS: TestUpdateDelegationsAddKeyToRole (0.01s) === RUN TestDeleteDelegations --- PASS: TestDeleteDelegations (0.00s) === RUN TestDeleteDelegationsRoleNotExistBecauseNoParentMeta @@ -3600,7 +3636,7 @@ === RUN TestDeleteDelegationsParentMissing --- PASS: TestDeleteDelegationsParentMissing (0.00s) === RUN TestDeleteDelegationsMissingParentSigningKey ---- PASS: TestDeleteDelegationsMissingParentSigningKey (0.00s) +--- PASS: TestDeleteDelegationsMissingParentSigningKey (0.01s) === RUN TestDeleteDelegationsMidSliceRole --- PASS: TestDeleteDelegationsMidSliceRole (0.00s) === RUN TestGetDelegationRoleAndMetadataExistDelegationExists @@ -3608,7 +3644,7 @@ === RUN TestGetDelegationRoleAndMetadataExistDelegationDoesntExists --- PASS: TestGetDelegationRoleAndMetadataExistDelegationDoesntExists (0.00s) === RUN TestGetDelegationRoleAndMetadataDoesntExists ---- PASS: TestGetDelegationRoleAndMetadataDoesntExists (0.00s) +--- PASS: TestGetDelegationRoleAndMetadataDoesntExists (0.01s) === RUN TestGetDelegationParentMissing --- PASS: TestGetDelegationParentMissing (0.00s) === RUN TestAddTargetsRoleAndMetadataExist @@ -3620,17 +3656,17 @@ === RUN TestAddTargetsNoSigningKeys --- PASS: TestAddTargetsNoSigningKeys (0.00s) === RUN TestRemoveExistingAndNonexistingTargets ---- PASS: TestRemoveExistingAndNonexistingTargets (0.00s) +--- PASS: TestRemoveExistingAndNonexistingTargets (0.01s) === RUN TestRemoveTargetsRoleDoesntExist --- PASS: TestRemoveTargetsRoleDoesntExist (0.00s) === RUN TestRemoveTargetsNoSigningKeys --- PASS: TestRemoveTargetsNoSigningKeys (0.00s) === RUN TestAddBaseKeysToRoot ---- PASS: TestAddBaseKeysToRoot (0.00s) +--- PASS: TestAddBaseKeysToRoot (0.01s) === RUN TestRemoveBaseKeysFromRoot --- PASS: TestRemoveBaseKeysFromRoot (0.00s) === RUN TestReplaceBaseKeysInRoot ---- PASS: TestReplaceBaseKeysInRoot (0.00s) +--- PASS: TestReplaceBaseKeysInRoot (0.02s) === RUN TestGetAllRoles --- PASS: TestGetAllRoles (0.00s) === RUN TestGetBaseRoles @@ -3638,7 +3674,7 @@ === RUN TestGetBaseRolesInvalidName --- PASS: TestGetBaseRolesInvalidName (0.00s) === RUN TestGetDelegationValidRoles ---- PASS: TestGetDelegationValidRoles (0.00s) +--- PASS: TestGetDelegationValidRoles (0.01s) === RUN TestGetDelegationRolesInvalidName --- PASS: TestGetDelegationRolesInvalidName (0.00s) === RUN TestGetDelegationRolesInvalidPaths @@ -3652,41 +3688,41 @@ === RUN TestGetDelegationRoleKeyMissing --- PASS: TestGetDelegationRoleKeyMissing (0.00s) === RUN TestSignRootOldKeyCertExists ---- PASS: TestSignRootOldKeyCertExists (0.04s) +--- PASS: TestSignRootOldKeyCertExists (0.07s) === RUN TestSignRootOldKeyCertMissing ---- PASS: TestSignRootOldKeyCertMissing (0.03s) +--- PASS: TestSignRootOldKeyCertMissing (0.07s) === RUN TestRootKeyRotation ---- PASS: TestRootKeyRotation (0.12s) +--- PASS: TestRootKeyRotation (0.17s) === RUN TestBuilderLoadsValidRolesOnly ---- PASS: TestBuilderLoadsValidRolesOnly (0.00s) +--- PASS: TestBuilderLoadsValidRolesOnly (0.02s) === RUN TestBuilderOnlyAcceptsRootFirstWhenLoading ---- PASS: TestBuilderOnlyAcceptsRootFirstWhenLoading (0.01s) +--- PASS: TestBuilderOnlyAcceptsRootFirstWhenLoading (0.00s) === RUN TestBuilderOnlyAcceptsDelegationsAfterParent ---- PASS: TestBuilderOnlyAcceptsDelegationsAfterParent (0.00s) +--- PASS: TestBuilderOnlyAcceptsDelegationsAfterParent (0.01s) === RUN TestMarkingIsValid --- PASS: TestMarkingIsValid (0.00s) === RUN TestBuilderLoadInvalidDelegations ---- PASS: TestBuilderLoadInvalidDelegations (0.01s) +--- PASS: TestBuilderLoadInvalidDelegations (0.02s) === RUN TestBuilderLoadInvalidDelegationsOldVersion --- PASS: TestBuilderLoadInvalidDelegationsOldVersion (0.01s) === RUN TestBuilderAcceptRoleOnce ---- PASS: TestBuilderAcceptRoleOnce (0.00s) +--- PASS: TestBuilderAcceptRoleOnce (0.01s) === RUN TestBuilderStopsAcceptingOrProducingDataOnceDone ---- PASS: TestBuilderStopsAcceptingOrProducingDataOnceDone (0.00s) +--- PASS: TestBuilderStopsAcceptingOrProducingDataOnceDone (0.01s) === RUN TestGenerateSnapshotInvalidOperations ---- PASS: TestGenerateSnapshotInvalidOperations (0.05s) +--- PASS: TestGenerateSnapshotInvalidOperations (0.07s) === RUN TestGenerateTimestampInvalidOperations ---- PASS: TestGenerateTimestampInvalidOperations (0.04s) +--- PASS: TestGenerateTimestampInvalidOperations (0.07s) === RUN TestGetConsistentInfo ---- PASS: TestGetConsistentInfo (0.01s) +--- PASS: TestGetConsistentInfo (0.02s) === RUN TestTimestampPreAndPostChecksumming ---- PASS: TestTimestampPreAndPostChecksumming (0.02s) +--- PASS: TestTimestampPreAndPostChecksumming (0.05s) === RUN TestSnapshotLoadedFirstChecksumsOthers ---- PASS: TestSnapshotLoadedFirstChecksumsOthers (0.01s) +--- PASS: TestSnapshotLoadedFirstChecksumsOthers (0.05s) === RUN TestSnapshotLoadedAfterChecksumsOthersRetroactively ---- PASS: TestSnapshotLoadedAfterChecksumsOthersRetroactively (0.04s) +--- PASS: TestSnapshotLoadedAfterChecksumsOthersRetroactively (0.08s) PASS -ok github.com/theupdateframework/notary/tuf 0.561s +ok github.com/theupdateframework/notary/tuf 0.976s === RUN TestMergeStrSlicesExclusive --- PASS: TestMergeStrSlicesExclusive (0.00s) === RUN TestMergeStrSlicesOverlap @@ -3736,7 +3772,7 @@ === RUN TestRootFromSignedValidatesRoleData --- PASS: TestRootFromSignedValidatesRoleData (0.01s) === RUN TestRootFromSignedValidatesRoleType ---- PASS: TestRootFromSignedValidatesRoleType (0.00s) +--- PASS: TestRootFromSignedValidatesRoleType (0.01s) === RUN TestRootFromSignedValidatesVersion --- PASS: TestRootFromSignedValidatesVersion (0.00s) === RUN TestSnapshotToSignedMarshalsSignedPortionWithCanonicalJSON @@ -3752,7 +3788,7 @@ === RUN TestSnapshotFromSignedUnmarshallingErrorsPropagated --- PASS: TestSnapshotFromSignedUnmarshallingErrorsPropagated (0.00s) === RUN TestSnapshotFromSignedCopiesSignatures ---- PASS: TestSnapshotFromSignedCopiesSignatures (0.01s) +--- PASS: TestSnapshotFromSignedCopiesSignatures (0.00s) === RUN TestSnapshotFromSignedValidatesMeta --- PASS: TestSnapshotFromSignedValidatesMeta (0.00s) === RUN TestSnapshotFromSignedValidatesRoleType @@ -3776,7 +3812,7 @@ === RUN TestTargetsFromSignedCopiesSignatures --- PASS: TestTargetsFromSignedCopiesSignatures (0.00s) === RUN TestTargetsFromSignedValidatesDelegations ---- PASS: TestTargetsFromSignedValidatesDelegations (0.01s) +--- PASS: TestTargetsFromSignedValidatesDelegations (0.00s) === RUN TestTargetsFromSignedValidatesRoleType --- PASS: TestTargetsFromSignedValidatesRoleType (0.00s) === RUN TestTargetsFromSignedValidatesRoleName @@ -3800,7 +3836,7 @@ === RUN TestTimestampFromSignedValidatesMeta --- PASS: TestTimestampFromSignedValidatesMeta (0.00s) === RUN TestTimestampFromSignedValidatesRoleType ---- PASS: TestTimestampFromSignedValidatesRoleType (0.00s) +--- PASS: TestTimestampFromSignedValidatesRoleType (0.01s) === RUN TestTimestampFromSignedValidatesVersion --- PASS: TestTimestampFromSignedValidatesVersion (0.00s) === RUN TestTimestampGetSnapshot @@ -3820,9 +3856,9 @@ === RUN TestFileMetaEquals --- PASS: TestFileMetaEquals (0.00s) PASS -ok github.com/theupdateframework/notary/tuf/data 0.075s +ok github.com/theupdateframework/notary/tuf/data 0.116s === RUN TestListKeys ---- PASS: TestListKeys (0.01s) +--- PASS: TestListKeys (0.00s) === RUN TestGetKeys --- PASS: TestGetKeys (0.00s) === RUN TestBasicSign @@ -3834,7 +3870,7 @@ === RUN TestSignReturnsNoSigs --- PASS: TestSignReturnsNoSigs (0.00s) === RUN TestSignWithX509 ---- PASS: TestSignWithX509 (0.01s) +--- PASS: TestSignWithX509 (0.00s) === RUN TestSignRemovesValidSigByInvalidKey --- PASS: TestSignRemovesValidSigByInvalidKey (0.00s) === RUN TestSignRemovesInvalidSig @@ -3846,34 +3882,34 @@ === RUN TestErrInsufficientSignaturesMessaging --- PASS: TestErrInsufficientSignaturesMessaging (0.00s) === RUN TestRSAPSSVerifier ---- PASS: TestRSAPSSVerifier (0.02s) +--- PASS: TestRSAPSSVerifier (0.01s) === RUN TestRSAPSSx509Verifier ---- PASS: TestRSAPSSx509Verifier (0.00s) +--- PASS: TestRSAPSSx509Verifier (0.01s) === RUN TestRSAPSSVerifierWithInvalidKeyType --- PASS: TestRSAPSSVerifierWithInvalidKeyType (0.00s) === RUN TestRSAPSSVerifierWithInvalidKeyLength ---- PASS: TestRSAPSSVerifierWithInvalidKeyLength (0.05s) +--- PASS: TestRSAPSSVerifierWithInvalidKeyLength (0.16s) === RUN TestRSAPSSVerifierWithInvalidKey --- PASS: TestRSAPSSVerifierWithInvalidKey (0.00s) === RUN TestRSAPSSVerifierWithInvalidSignature ---- PASS: TestRSAPSSVerifierWithInvalidSignature (0.00s) +--- PASS: TestRSAPSSVerifierWithInvalidSignature (0.01s) === RUN TestRSAPKCS1v15Verifier ---- PASS: TestRSAPKCS1v15Verifier (0.00s) +--- PASS: TestRSAPKCS1v15Verifier (0.01s) === RUN TestRSAPKCS1v15x509Verifier ---- PASS: TestRSAPKCS1v15x509Verifier (0.00s) +--- PASS: TestRSAPKCS1v15x509Verifier (0.01s) === RUN TestRSAPKCS1v15VerifierWithInvalidKeyType --- PASS: TestRSAPKCS1v15VerifierWithInvalidKeyType (0.00s) === RUN TestRSAPKCS1v15VerifierWithInvalidKey --- PASS: TestRSAPKCS1v15VerifierWithInvalidKey (0.00s) === RUN TestRSAPKCS1v15VerifierWithInvalidSignature -time="2026-03-20T19:21:36-12:00" level=error msg="Failed verification: crypto/rsa: verification error" ---- PASS: TestRSAPKCS1v15VerifierWithInvalidSignature (0.00s) +time="2025-02-16T15:08:33+14:00" level=error msg="Failed verification: crypto/rsa: verification error" +--- PASS: TestRSAPKCS1v15VerifierWithInvalidSignature (0.01s) === RUN TestECDSAVerifier --- PASS: TestECDSAVerifier (0.00s) === RUN TestECDSAVerifierOtherCurves ---- PASS: TestECDSAVerifierOtherCurves (0.03s) +--- PASS: TestECDSAVerifierOtherCurves (0.08s) === RUN TestECDSAx509Verifier ---- PASS: TestECDSAx509Verifier (0.00s) +--- PASS: TestECDSAx509Verifier (0.01s) === RUN TestECDSAVerifierWithInvalidKeyType --- PASS: TestECDSAVerifierWithInvalidKeyType (0.00s) === RUN TestECDSAVerifierWithInvalidKey @@ -3909,72 +3945,72 @@ === RUN TestVerifyVersion --- PASS: TestVerifyVersion (0.00s) === RUN TestVerifyExpiry -time="2026-03-20T19:21:36-12:00" level=error msg="Metadata for root expired" +time="2025-02-16T15:08:33+14:00" level=error msg="Metadata for root expired" --- PASS: TestVerifyExpiry (0.00s) === RUN TestVerifyPublicKeyMatchesPrivateKeyHappyCase --- PASS: TestVerifyPublicKeyMatchesPrivateKeyHappyCase (0.00s) === RUN TestVerifyPublicKeyMatchesPrivateKeyFails --- PASS: TestVerifyPublicKeyMatchesPrivateKeyFails (0.00s) PASS -ok github.com/theupdateframework/notary/tuf/signed 0.185s +ok github.com/theupdateframework/notary/tuf/signed 0.364s === RUN TestNewSwizzler ---- PASS: TestNewSwizzler (0.02s) +--- PASS: TestNewSwizzler (0.03s) === RUN TestSwizzlerSetInvalidJSON --- PASS: TestSwizzlerSetInvalidJSON (0.02s) === RUN TestSwizzlerAddExtraSpace ---- PASS: TestSwizzlerAddExtraSpace (0.02s) +--- PASS: TestSwizzlerAddExtraSpace (0.03s) === RUN TestSwizzlerSetInvalidSigned ---- PASS: TestSwizzlerSetInvalidSigned (0.00s) +--- PASS: TestSwizzlerSetInvalidSigned (0.01s) === RUN TestSwizzlerSetInvalidSignedMeta ---- PASS: TestSwizzlerSetInvalidSignedMeta (0.02s) +--- PASS: TestSwizzlerSetInvalidSignedMeta (0.03s) === RUN TestSwizzlerSetInvalidMetadataType ---- PASS: TestSwizzlerSetInvalidMetadataType (0.01s) +--- PASS: TestSwizzlerSetInvalidMetadataType (0.02s) === RUN TestSwizzlerInvalidateMetadataSignatures ---- PASS: TestSwizzlerInvalidateMetadataSignatures (0.01s) +--- PASS: TestSwizzlerInvalidateMetadataSignatures (0.03s) === RUN TestSwizzlerRemoveMetadata ---- PASS: TestSwizzlerRemoveMetadata (0.02s) +--- PASS: TestSwizzlerRemoveMetadata (0.03s) === RUN TestSwizzlerSignMetadataWithInvalidKey ---- PASS: TestSwizzlerSignMetadataWithInvalidKey (0.01s) +--- PASS: TestSwizzlerSignMetadataWithInvalidKey (0.02s) === RUN TestSwizzlerOffsetMetadataVersion --- PASS: TestSwizzlerOffsetMetadataVersion (0.01s) === RUN TestSwizzlerExpireMetadata ---- PASS: TestSwizzlerExpireMetadata (0.01s) +--- PASS: TestSwizzlerExpireMetadata (0.02s) === RUN TestSwizzlerSetThresholdBaseRole ---- PASS: TestSwizzlerSetThresholdBaseRole (0.01s) +--- PASS: TestSwizzlerSetThresholdBaseRole (0.02s) === RUN TestSwizzlerSetThresholdDelegatedRole --- PASS: TestSwizzlerSetThresholdDelegatedRole (0.02s) === RUN TestSwizzlerChangeRootKey ---- PASS: TestSwizzlerChangeRootKey (0.02s) +--- PASS: TestSwizzlerChangeRootKey (0.03s) === RUN TestSwizzlerUpdateSnapshotHashesSpecifiedRoles ---- PASS: TestSwizzlerUpdateSnapshotHashesSpecifiedRoles (0.01s) +--- PASS: TestSwizzlerUpdateSnapshotHashesSpecifiedRoles (0.02s) === RUN TestSwizzlerUpdateSnapshotHashesNoSpecifiedRoles ---- PASS: TestSwizzlerUpdateSnapshotHashesNoSpecifiedRoles (0.02s) +--- PASS: TestSwizzlerUpdateSnapshotHashesNoSpecifiedRoles (0.05s) === RUN TestSwizzlerUpdateTimestamp ---- PASS: TestSwizzlerUpdateTimestamp (0.01s) +--- PASS: TestSwizzlerUpdateTimestamp (0.02s) === RUN TestMissingSigningKey ---- PASS: TestMissingSigningKey (0.01s) +--- PASS: TestMissingSigningKey (0.02s) === RUN TestSwizzlerMutateRoot ---- PASS: TestSwizzlerMutateRoot (0.02s) +--- PASS: TestSwizzlerMutateRoot (0.03s) === RUN TestSwizzlerMutateTimestamp --- PASS: TestSwizzlerMutateTimestamp (0.03s) === RUN TestSwizzlerMutateSnapshot ---- PASS: TestSwizzlerMutateSnapshot (0.03s) +--- PASS: TestSwizzlerMutateSnapshot (0.01s) === RUN TestSwizzlerMutateTargets ---- PASS: TestSwizzlerMutateTargets (0.02s) +--- PASS: TestSwizzlerMutateTargets (0.03s) === RUN TestSwizzlerRotateKeyBaseRole ---- PASS: TestSwizzlerRotateKeyBaseRole (0.01s) +--- PASS: TestSwizzlerRotateKeyBaseRole (0.04s) === RUN TestSwizzlerRotateKeyDelegationRole ---- PASS: TestSwizzlerRotateKeyDelegationRole (0.02s) +--- PASS: TestSwizzlerRotateKeyDelegationRole (0.05s) PASS -ok github.com/theupdateframework/notary/tuf/testutils 0.575s +ok github.com/theupdateframework/notary/tuf/testutils 0.686s ? github.com/theupdateframework/notary/tuf/testutils/interfaces [no test files] ? github.com/theupdateframework/notary/tuf/testutils/keys [no test files] === RUN TestConvertTUFKeyToPKCS8 --- PASS: TestConvertTUFKeyToPKCS8 (0.09s) === RUN TestParsePKCS8ToTufKey ---- PASS: TestParsePKCS8ToTufKey (0.21s) +--- PASS: TestParsePKCS8ToTufKey (0.25s) === RUN TestPEMtoPEM ---- PASS: TestPEMtoPEM (0.00s) +--- PASS: TestPEMtoPEM (0.01s) === RUN TestRoleListLen --- PASS: TestRoleListLen (0.00s) === RUN TestRoleListLess @@ -4020,23 +4056,23 @@ === RUN TestKeyOperations --- PASS: TestKeyOperations (0.09s) === RUN TestRSAX509PublickeyID ---- PASS: TestRSAX509PublickeyID (0.00s) +--- PASS: TestRSAX509PublickeyID (0.01s) === RUN TestECDSAX509PublickeyID --- PASS: TestECDSAX509PublickeyID (0.00s) === RUN TestExtractPrivateKeyAttributes --- PASS: TestExtractPrivateKeyAttributes (0.00s) === RUN TestParsePEMPrivateKeyLegacy ---- PASS: TestParsePEMPrivateKeyLegacy (0.01s) +--- PASS: TestParsePEMPrivateKeyLegacy (0.00s) === RUN TestValidateCertificateWithSHA1 --- PASS: TestValidateCertificateWithSHA1 (0.00s) === RUN TestValidateCertificateWithExpiredCert ---- PASS: TestValidateCertificateWithExpiredCert (0.00s) +--- PASS: TestValidateCertificateWithExpiredCert (0.01s) === RUN TestValidateCertificateWithInvalidExpiry --- PASS: TestValidateCertificateWithInvalidExpiry (0.00s) === RUN TestValidateCertificateWithShortKey ---- PASS: TestValidateCertificateWithShortKey (0.19s) +--- PASS: TestValidateCertificateWithShortKey (0.49s) PASS -ok github.com/theupdateframework/notary/tuf/utils 0.748s +ok github.com/theupdateframework/notary/tuf/utils 1.015s === RUN TestNewSerializableErrorNonValidationError --- PASS: TestNewSerializableErrorNonValidationError (0.00s) === RUN TestNewSerializableErrorValidationError @@ -4052,9 +4088,9 @@ === RUN TestUnmarshalInvalidJSON --- PASS: TestUnmarshalInvalidJSON (0.00s) PASS -ok github.com/theupdateframework/notary/tuf/validation 0.051s +ok github.com/theupdateframework/notary/tuf/validation 0.056s === RUN TestSetSignalTrap ---- PASS: TestSetSignalTrap (0.00s) +--- PASS: TestSetSignalTrap (0.02s) === RUN TestLogLevelSignalHandle Attempt to increase log level failed, will remain at debug level, error: log level can not be set higher than Debug Successfully setting log level to debug @@ -4090,7 +4126,7 @@ === RUN TestParseInvalidSQLStorageNoDBSource --- PASS: TestParseInvalidSQLStorageNoDBSource (0.00s) === RUN TestParseInvalidDBSourceInSQLStorage ---- PASS: TestParseInvalidDBSourceInSQLStorage (0.00s) +--- PASS: TestParseInvalidDBSourceInSQLStorage (0.01s) === RUN TestParseSQLStorageDBStore --- PASS: TestParseSQLStorageDBStore (0.00s) === RUN TestParseRethinkStorageDBStoreInvalidBackend @@ -4114,19 +4150,19 @@ === RUN TestParseTLSNoTLSNotRequired --- PASS: TestParseTLSNoTLSNotRequired (0.00s) === RUN TestParseTLSWithTLS ---- PASS: TestParseTLSWithTLS (0.00s) +--- PASS: TestParseTLSWithTLS (0.01s) === RUN TestParseTLSWithTLSRelativeToConfigFile --- PASS: TestParseTLSWithTLSRelativeToConfigFile (0.00s) === RUN TestParseTLSWithEnvironmentVariables --- PASS: TestParseTLSWithEnvironmentVariables (0.00s) === RUN TestParseViperWithInvalidFile ---- PASS: TestParseViperWithInvalidFile (0.00s) +--- PASS: TestParseViperWithInvalidFile (0.01s) === RUN TestParseViperWithValidFile --- PASS: TestParseViperWithValidFile (0.00s) === RUN TestAdjustLogLevel --- PASS: TestAdjustLogLevel (0.00s) === RUN TestRootHandlerFactory ---- PASS: TestRootHandlerFactory (0.00s) +--- PASS: TestRootHandlerFactory (0.01s) === RUN TestRootHandlerError --- PASS: TestRootHandlerError (0.00s) === RUN TestWrapWithCacheHeaderNilCacheControlConfig @@ -4152,7 +4188,7 @@ === RUN TestDoAuthWildcardImage --- PASS: TestDoAuthWildcardImage (0.00s) PASS -ok github.com/theupdateframework/notary/utils 0.058s +ok github.com/theupdateframework/notary/utils 0.140s ? github.com/theupdateframework/notary/version [no test files] create-stamp debian/debhelper-build-stamp dh_testroot -O--builddirectory=/build/reproducible-path/notary-0.7.0\+git20240416.9d2b3b3\+ds1/_build -O--buildsystem=golang @@ -4190,9 +4226,9 @@ dpkg-gencontrol: warning: package notary: substitution variable ${misc:Static-Built-Using} unused, but is defined dh_md5sums -O--builddirectory=/build/reproducible-path/notary-0.7.0\+git20240416.9d2b3b3\+ds1/_build -O--buildsystem=golang dh_builddeb -O--builddirectory=/build/reproducible-path/notary-0.7.0\+git20240416.9d2b3b3\+ds1/_build -O--buildsystem=golang +dpkg-deb: building package 'notary-dbgsym' in '../notary-dbgsym_0.7.0+git20240416.9d2b3b3+ds1-3_amd64.deb'. dpkg-deb: building package 'notary' in '../notary_0.7.0+git20240416.9d2b3b3+ds1-3_amd64.deb'. dpkg-deb: building package 'golang-github-docker-notary-dev' in '../golang-github-docker-notary-dev_0.7.0+git20240416.9d2b3b3+ds1-3_all.deb'. -dpkg-deb: building package 'notary-dbgsym' in '../notary-dbgsym_0.7.0+git20240416.9d2b3b3+ds1-3_amd64.deb'. dpkg-genbuildinfo --build=binary -O../notary_0.7.0+git20240416.9d2b3b3+ds1-3_amd64.buildinfo dpkg-genchanges --build=binary -O../notary_0.7.0+git20240416.9d2b3b3+ds1-3_amd64.changes dpkg-genchanges: info: binary-only upload (no source code included) @@ -4200,12 +4236,14 @@ dpkg-buildpackage: info: binary-only upload (no source included) dpkg-genchanges: info: not including original source code in upload I: copying local configuration +I: user script /srv/workspace/pbuilder/85135/tmp/hooks/B01_cleanup starting +I: user script /srv/workspace/pbuilder/85135/tmp/hooks/B01_cleanup finished I: unmounting dev/ptmx filesystem I: unmounting dev/pts filesystem I: unmounting dev/shm filesystem I: unmounting proc filesystem I: unmounting sys filesystem I: cleaning the build env -I: removing directory /srv/workspace/pbuilder/3141796 and its subdirectories -I: Current time: Fri Mar 20 19:23:24 -12 2026 -I: pbuilder-time-stamp: 1774077804 +I: removing directory /srv/workspace/pbuilder/85135 and its subdirectories +I: Current time: Sun Feb 16 15:11:20 +14 2025 +I: pbuilder-time-stamp: 1739668280