0s autopkgtest [21:44:05]: starting date: 2024-03-18 0s autopkgtest [21:44:05]: git checkout: d9c0295b adt_testbed.py: supress warnings from apt using a shell pipeline 0s autopkgtest [21:44:05]: host juju-7f2275-prod-proposed-migration-environment-4; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.l3gx8m7z/out --timeout-copy=6000 --setup-commands 'sed -i "s/ports.ubuntu.com/ftpmaster.internal/; s/ubuntu-ports/ubuntu/" /etc/apt/sources.list `ls /etc/apt/sources.list.d/*.list 2>/dev/null || true`; ln -s /dev/null /etc/systemd/system/bluetooth.service; printf "http_proxy=http://squid.internal:3128\nhttps_proxy=http://squid.internal:3128\nno_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com\n" >> /etc/environment' --apt-pocket=proposed=src:openssl --apt-upgrade openfortivpn --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=openssl/3.0.13-0ubuntu2 -- lxd -r lxd-armhf-10.44.124.220 lxd-armhf-10.44.124.220:autopkgtest/ubuntu/noble/armhf 37s autopkgtest [21:44:42]: @@@@@@@@@@@@@@@@@@@@ test bed setup 39s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 40s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [52.0 kB] 40s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [485 kB] 40s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [3720 kB] 41s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [6540 B] 41s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main armhf Packages [578 kB] 41s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main armhf c-n-f Metadata [2492 B] 41s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted armhf Packages [1372 B] 41s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted armhf c-n-f Metadata [116 B] 41s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe armhf Packages [3577 kB] 42s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe armhf c-n-f Metadata [7776 B] 42s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse armhf Packages [35.6 kB] 42s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse armhf c-n-f Metadata [116 B] 49s Fetched 8583 kB in 3s (2464 kB/s) 49s Reading package lists... 63s tee: /proc/self/fd/2: Permission denied 91s Hit:1 http://ports.ubuntu.com/ubuntu-ports noble InRelease 91s Hit:2 http://ftpmaster.internal/ubuntu noble InRelease 91s Hit:3 http://ports.ubuntu.com/ubuntu-ports noble-updates InRelease 91s Hit:4 http://ftpmaster.internal/ubuntu noble-updates InRelease 91s Hit:5 http://ports.ubuntu.com/ubuntu-ports noble-backports InRelease 91s Hit:6 http://ftpmaster.internal/ubuntu noble-security InRelease 91s Hit:7 http://ports.ubuntu.com/ubuntu-ports noble-security InRelease 91s Hit:8 http://ftpmaster.internal/ubuntu noble-proposed InRelease 96s Reading package lists... 96s Reading package lists... 96s Building dependency tree... 96s Reading state information... 98s Calculating upgrade... 99s The following packages have been kept back: 99s openssl 99s 0 upgraded, 0 newly installed, 0 to remove and 1 not upgraded. 99s Reading package lists... 100s Building dependency tree... 100s Reading state information... 101s 0 upgraded, 0 newly installed, 0 to remove and 1 not upgraded. 103s autopkgtest [21:45:48]: rebooting testbed after setup commands that affected boot 131s autopkgtest [21:46:16]: testbed running kernel: Linux 5.4.0-173-generic #191-Ubuntu SMP Fri Feb 2 13:54:37 UTC 2024 135s autopkgtest [21:46:20]: testbed dpkg architecture: armhf 149s autopkgtest [21:46:34]: @@@@@@@@@@@@@@@@@@@@ apt-source openfortivpn 155s Get:1 http://ftpmaster.internal/ubuntu noble/universe openfortivpn 1.21.0-2 (dsc) [2093 B] 155s Get:2 http://ftpmaster.internal/ubuntu noble/universe openfortivpn 1.21.0-2 (tar) [169 kB] 155s Get:3 http://ftpmaster.internal/ubuntu noble/universe openfortivpn 1.21.0-2 (diff) [5908 B] 155s gpgv: Signature made Wed Nov 22 02:14:51 2023 UTC 155s gpgv: using RSA key D0D085B169C3BFD9404858FA21FC29504B5230DB 155s gpgv: issuer "epsilon@debian.org" 155s gpgv: Can't check signature: No public key 155s dpkg-source: warning: cannot verify inline signature for ./openfortivpn_1.21.0-2.dsc: no acceptable signature found 155s autopkgtest [21:46:40]: testing package openfortivpn version 1.21.0-2 155s autopkgtest [21:46:40]: build not needed 159s autopkgtest [21:46:44]: test command1: preparing testbed 172s Reading package lists... 173s Building dependency tree... 173s Reading state information... 174s Correcting dependencies...Starting pkgProblemResolver with broken count: 0 174s Starting 2 pkgProblemResolver with broken count: 0 174s Done 175s Done 176s Starting pkgProblemResolver with broken count: 0 176s Starting 2 pkgProblemResolver with broken count: 0 176s Done 177s The following additional packages will be installed: 177s openfortivpn ppp 177s The following NEW packages will be installed: 177s openfortivpn ppp 178s 0 upgraded, 2 newly installed, 0 to remove and 1 not upgraded. 178s 1 not fully installed or removed. 178s Need to get 381 kB of archives. 178s After this operation, 1763 kB of additional disk space will be used. 178s Get:1 http://ftpmaster.internal/ubuntu noble/main armhf ppp armhf 2.4.9-1+1.1ubuntu1 [327 kB] 178s Get:2 http://ftpmaster.internal/ubuntu noble/universe armhf openfortivpn armhf 1.21.0-2 [53.6 kB] 179s Fetched 381 kB in 1s (567 kB/s) 179s Selecting previously unselected package ppp. 179s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 58620 files and directories currently installed.) 179s Preparing to unpack .../ppp_2.4.9-1+1.1ubuntu1_armhf.deb ... 180s Unpacking ppp (2.4.9-1+1.1ubuntu1) ... 180s Selecting previously unselected package openfortivpn. 180s Preparing to unpack .../openfortivpn_1.21.0-2_armhf.deb ... 180s Unpacking openfortivpn (1.21.0-2) ... 180s Setting up ppp (2.4.9-1+1.1ubuntu1) ... 180s Setting up openfortivpn (1.21.0-2) ... 180s Setting up autopkgtest-satdep (0) ... 180s Processing triggers for man-db (2.12.0-3) ... 197s (Reading database ... 58748 files and directories currently installed.) 197s Removing autopkgtest-satdep (0) ... 208s autopkgtest [21:47:33]: test command1: openfortivpn -h 208s autopkgtest [21:47:33]: test command1: [----------------------- 211s Usage: openfortivpn [[:]] [-u ] [-p ] 211s [--cookie=] [--cookie-on-stdin] 211s [--otp=] [--otp-delay=] [--otp-prompt=] 211s [--pinentry=] [--realm=] 211s [--ifname=] [--set-routes=<0|1>] 211s [--half-internet-routes=<0|1>] [--set-dns=<0|1>] 211s [--pppd-use-peerdns=<0|1>] [--pppd-log=] 211s [--pppd-ifname=] [--pppd-ipparam=] 211s [--pppd-call=] [--pppd-plugin=] 211s [--pppd-accept-remote=<0|1>] 211s [--use-resolvconf=<0|1>] [--ca-file=] 211s [--user-cert=] [--user-key=] 211s [--use-syslog] [--trusted-cert=] 211s [--persistent=] [-c ] [-v|-q] 211s openfortivpn --help 211s openfortivpn --version 211s 211s Client for PPP+SSL VPN tunnel services. 211s openfortivpn connects to a VPN by setting up a tunnel to the gateway at 211s :. It spawns a pppd process and operates the communication between 211s the gateway and this process. 211s 211s Options: 211s -h --help Show this help message and exit. 211s --version Show version and exit. 211s -c , --config= Specify a custom configuration file (default: 211s /etc/openfortivpn/config). 211s -u , --username= VPN account username. 211s -p , --password= VPN account password. 211s --cookie= A valid session cookie (SVPNCOOKIE). 211s --cookie-on-stdin Read the cookie (SVPNCOOKIE) from standard input. 211s -o , --otp= One-Time-Password. 211s --otp-prompt= Search for the OTP prompt starting with this string. 211s --otp-delay= Wait seconds before sending the OTP. 211s --no-ftm-push Do not use FTM push if the server provides the option. 211s --pinentry= Use the program to supply a secret instead of asking for it. 211s --realm= Use specified authentication realm. 211s --ifname= Bind to interface. 211s --set-routes=[01] Set if openfortivpn should configure routes 211s when tunnel is up. 211s --no-routes Do not configure routes, same as --set-routes=0. 211s --half-internet-routes=[01] Add two 0.0.0.0/1 and 128.0.0.0/1 routes with higher 211s priority instead of replacing the default route. 211s --set-dns=[01] Set if openfortivpn should add DNS name servers 211s and domain search list in /etc/resolv.conf. 211s If installed resolvconf is used for the update. 211s --no-dns Do not reconfigure DNS, same as --set-dns=0. 211s --ca-file= Use specified PEM-encoded certificate bundle 211s instead of system-wide store to verify the gateway 211s certificate. 211s --user-cert= Use specified PEM-encoded certificate if the server 211s requires authentication with a certificate. 211s --user-cert=pkcs11: Use smartcard. Takes also partial or full PKCS11-URI. 211s --user-key= Use specified PEM-encoded key if the server requires 211s authentication with a certificate. 211s --pem-passphrase= Pass phrase for the PEM-encoded key. 211s --use-syslog Log to syslog instead of terminal. 211s --trusted-cert= Trust a given gateway. If classical SSL 211s certificate validation fails, the gateway 211s certificate will be matched against this value. 211s is the X509 certificate's sha256 sum. 211s This option can be used multiple times to trust 211s several certificates. 211s --insecure-ssl Do not disable insecure SSL protocols/ciphers. 211s Also enable TLS v1.0 if applicable. 211s If your server requires a specific cipher or protocol, 211s consider using --cipher-list and/or --min-tls instead. 211s --cipher-list= OpenSSL ciphers to use. If default does not work 211s you can try with the cipher suggested in the output 211s of 'openssl s_client -connect ' 211s (e.g. AES256-GCM-SHA384). Applies to TLS v1.2 or 211s lower only, not to be used with TLS v1.3 ciphers. 211s --min-tls Use minimum TLS version instead of system default. 211s Valid values are 1.0, 1.1, 1.2, 1.3. 211s --seclevel-1 If --cipher-list is not specified, add @SECLEVEL=1 to 211s (compiled in) list of ciphers. This lowers limits on 211s dh key. Applies to TLS v1.2 or lower only. 211s --persistent= Run the vpn persistently in a loop and try to re- 211s connect every seconds when dropping out. 211s -v Increase verbosity. Can be used multiple times 211s to be even more verbose. 211s -q Decrease verbosity. Can be used multiple times 211s to be even less verbose. 211s --pppd-use-peerdns=[01] Whether to ask peer ppp server for DNS server 211s addresses and make pppd rewrite /etc/resolv.conf. 211s --pppd-no-peerdns Same as --pppd-use-peerdns=0. pppd will not 211s modify DNS resolution then. 211s --pppd-log= Set pppd in debug mode and save its logs into 211s . 211s --pppd-plugin= Use specified pppd plugin instead of configuring 211s resolver and routes directly. 211s --pppd-ifname= Set the pppd interface name, if supported by pppd. 211s --pppd-ipparam= Provides an extra parameter to the ip-up, ip-pre-up 211s and ip-down scripts. See man (8) pppd. 211s --pppd-call= Move most pppd options from pppd cmdline to 211s /etc/ppp/peers/ and invoke pppd with 211s 'call '. 211s --pppd-accept-remote=[01] Whether to invoke pppd with 'ipcp-accept-remote'. 211s Disable for pppd < 2.5.0. 211s --use-resolvconf=[01] If possible use resolvconf to update /etc/resolv.conf. 211s 211s Configuration file: 211s Options can be taken from a configuration file. Options passed in the 211s command line will override those from the configuration file, though. The 211s default configuration file is /etc/openfortivpn/config, 211s but this can be set using the -c option. 211s A simple configuration file example looks like: 211s # this is a comment 211s host = vpn-gateway 211s port = 8443 211s username = foo 211s password = bar 211s trusted-cert = certificatedigest4daa8c5fe6c... 211s trusted-cert = othercertificatedigest6631bf... 211s For a full-featured configuration see man openfortivpn(1). 211s autopkgtest [21:47:36]: test command1: -----------------------] 216s command1 PASS (superficial) 216s autopkgtest [21:47:41]: test command1: - - - - - - - - - - results - - - - - - - - - - 220s autopkgtest [21:47:45]: @@@@@@@@@@@@@@@@@@@@ summary 220s command1 PASS (superficial)