0s autopkgtest [02:15:54]: starting date and time: 2024-03-19 02:15:54+0000 0s autopkgtest [02:15:54]: git checkout: b506e79c ssh-setup/nova: fix ARCH having two lines of data 0s autopkgtest [02:15:54]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.w8pyxlng/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:openssl --apt-upgrade openfortivpn --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=openssl/3.0.13-0ubuntu2 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@bos01-ppc64el-1.secgroup --name adt-noble-ppc64el-openfortivpn-20240319-021554-juju-7f2275-prod-proposed-migration-environment-2 --image adt/ubuntu-noble-ppc64el-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://us.ports.ubuntu.com/ubuntu-ports/ 238s autopkgtest [02:19:52]: testbed dpkg architecture: ppc64el 238s autopkgtest [02:19:52]: testbed apt version: 2.7.12 238s autopkgtest [02:19:52]: @@@@@@@@@@@@@@@@@@@@ test bed setup 240s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 240s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [52.0 kB] 241s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [6540 B] 241s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [3753 kB] 242s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [486 kB] 243s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el Packages [646 kB] 243s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el c-n-f Metadata [3116 B] 243s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el Packages [1372 B] 243s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el c-n-f Metadata [116 B] 243s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el Packages [4025 kB] 244s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el c-n-f Metadata [8652 B] 244s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el Packages [47.3 kB] 244s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el c-n-f Metadata [116 B] 254s Fetched 9146 kB in 8s (1146 kB/s) 256s Reading package lists... 262s Reading package lists... 263s Building dependency tree... 263s Reading state information... 264s Calculating upgrade... 264s The following packages will be REMOVED: 264s libssl3 264s The following NEW packages will be installed: 264s libssl3t64 264s The following packages will be upgraded: 264s openssl 265s 1 upgraded, 1 newly installed, 1 to remove and 0 not upgraded. 265s Need to get 3151 kB of archives. 265s After this operation, 73.7 kB of additional disk space will be used. 265s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el openssl ppc64el 3.0.13-0ubuntu2 [1026 kB] 265s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libssl3t64 ppc64el 3.0.13-0ubuntu2 [2125 kB] 267s Fetched 3151 kB in 1s (2201 kB/s) 267s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70095 files and directories currently installed.) 267s Preparing to unpack .../openssl_3.0.13-0ubuntu2_ppc64el.deb ... 267s Unpacking openssl (3.0.13-0ubuntu2) over (3.0.10-1ubuntu4) ... 268s dpkg: libssl3:ppc64el: dependency problems, but removing anyway as you requested: 268s wget depends on libssl3 (>= 3.0.0). 268s tnftp depends on libssl3 (>= 3.0.0). 268s tcpdump depends on libssl3 (>= 3.0.0). 268s systemd-resolved depends on libssl3 (>= 3.0.0). 268s systemd depends on libssl3 (>= 3.0.0). 268s sudo depends on libssl3 (>= 3.0.0). 268s rsync depends on libssl3 (>= 3.0.0). 268s python3-cryptography depends on libssl3 (>= 3.0.0). 268s openssh-server depends on libssl3 (>= 3.0.10). 268s openssh-client depends on libssl3 (>= 3.0.10). 268s linux-headers-6.8.0-11-generic depends on libssl3 (>= 3.0.0). 268s libsystemd-shared:ppc64el depends on libssl3 (>= 3.0.0). 268s libssh-4:ppc64el depends on libssl3 (>= 3.0.0). 268s libsasl2-modules:ppc64el depends on libssl3 (>= 3.0.0). 268s libsasl2-2:ppc64el depends on libssl3 (>= 3.0.0). 268s libpython3.12-minimal:ppc64el depends on libssl3 (>= 3.0.0). 268s libpython3.11-minimal:ppc64el depends on libssl3 (>= 3.0.0). 268s libnvme1 depends on libssl3 (>= 3.0.0). 268s libkrb5-3:ppc64el depends on libssl3 (>= 3.0.0). 268s libkmod2:ppc64el depends on libssl3 (>= 3.0.0). 268s libfido2-1:ppc64el depends on libssl3 (>= 3.0.0). 268s libcurl4:ppc64el depends on libssl3 (>= 3.0.0). 268s libcryptsetup12:ppc64el depends on libssl3 (>= 3.0.0). 268s kmod depends on libssl3 (>= 3.0.0). 268s dhcpcd-base depends on libssl3 (>= 3.0.0). 268s bind9-libs:ppc64el depends on libssl3 (>= 3.0.0). 268s 268s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70095 files and directories currently installed.) 268s Removing libssl3:ppc64el (3.0.10-1ubuntu4) ... 268s Selecting previously unselected package libssl3t64:ppc64el. 268s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70084 files and directories currently installed.) 268s Preparing to unpack .../libssl3t64_3.0.13-0ubuntu2_ppc64el.deb ... 268s Unpacking libssl3t64:ppc64el (3.0.13-0ubuntu2) ... 268s Setting up libssl3t64:ppc64el (3.0.13-0ubuntu2) ... 268s Setting up openssl (3.0.13-0ubuntu2) ... 269s Processing triggers for man-db (2.12.0-3) ... 271s Processing triggers for libc-bin (2.39-0ubuntu2) ... 272s Reading package lists... 272s Building dependency tree... 272s Reading state information... 273s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 274s Hit:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease 274s Hit:2 http://ftpmaster.internal/ubuntu noble InRelease 274s Hit:3 http://ftpmaster.internal/ubuntu noble-updates InRelease 274s Hit:4 http://ftpmaster.internal/ubuntu noble-security InRelease 279s Reading package lists... 279s Reading package lists... 279s Building dependency tree... 279s Reading state information... 280s Calculating upgrade... 281s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 281s Reading package lists... 282s Building dependency tree... 282s Reading state information... 283s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 287s autopkgtest [02:20:41]: testbed running kernel: Linux 6.8.0-11-generic #11-Ubuntu SMP Wed Feb 14 00:33:03 UTC 2024 287s autopkgtest [02:20:41]: @@@@@@@@@@@@@@@@@@@@ apt-source openfortivpn 290s Get:1 http://ftpmaster.internal/ubuntu noble/universe openfortivpn 1.21.0-2 (dsc) [2093 B] 290s Get:2 http://ftpmaster.internal/ubuntu noble/universe openfortivpn 1.21.0-2 (tar) [169 kB] 290s Get:3 http://ftpmaster.internal/ubuntu noble/universe openfortivpn 1.21.0-2 (diff) [5908 B] 291s gpgv: Signature made Wed Nov 22 02:14:51 2023 UTC 291s gpgv: using RSA key D0D085B169C3BFD9404858FA21FC29504B5230DB 291s gpgv: issuer "epsilon@debian.org" 291s gpgv: Can't check signature: No public key 291s dpkg-source: warning: cannot verify inline signature for ./openfortivpn_1.21.0-2.dsc: no acceptable signature found 291s autopkgtest [02:20:45]: testing package openfortivpn version 1.21.0-2 291s autopkgtest [02:20:45]: build not needed 292s autopkgtest [02:20:46]: test command1: preparing testbed 295s Reading package lists... 296s Building dependency tree... 296s Reading state information... 296s Starting pkgProblemResolver with broken count: 0 296s Starting 2 pkgProblemResolver with broken count: 0 296s Done 298s The following additional packages will be installed: 298s openfortivpn ppp 298s The following NEW packages will be installed: 298s autopkgtest-satdep openfortivpn ppp 298s 0 upgraded, 3 newly installed, 0 to remove and 0 not upgraded. 298s Need to get 467 kB/468 kB of archives. 298s After this operation, 2164 kB of additional disk space will be used. 298s Get:1 /tmp/autopkgtest.R2j7ae/1-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [712 B] 298s Get:2 http://ftpmaster.internal/ubuntu noble/main ppc64el ppp ppc64el 2.4.9-1+1.1ubuntu1 [405 kB] 299s Get:3 http://ftpmaster.internal/ubuntu noble/universe ppc64el openfortivpn ppc64el 1.21.0-2 [62.3 kB] 300s Fetched 467 kB in 1s (403 kB/s) 300s Selecting previously unselected package ppp. 300s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 70097 files and directories currently installed.) 300s Preparing to unpack .../ppp_2.4.9-1+1.1ubuntu1_ppc64el.deb ... 302s Unpacking ppp (2.4.9-1+1.1ubuntu1) ... 302s Selecting previously unselected package openfortivpn. 302s Preparing to unpack .../openfortivpn_1.21.0-2_ppc64el.deb ... 302s Unpacking openfortivpn (1.21.0-2) ... 302s Selecting previously unselected package autopkgtest-satdep. 302s Preparing to unpack .../1-autopkgtest-satdep.deb ... 302s Unpacking autopkgtest-satdep (0) ... 302s Setting up ppp (2.4.9-1+1.1ubuntu1) ... 302s Setting up openfortivpn (1.21.0-2) ... 302s Setting up autopkgtest-satdep (0) ... 302s Processing triggers for man-db (2.12.0-3) ... 313s (Reading database ... 70225 files and directories currently installed.) 313s Removing autopkgtest-satdep (0) ... 314s autopkgtest [02:21:08]: test command1: openfortivpn -h 314s autopkgtest [02:21:08]: test command1: [----------------------- 314s Usage: openfortivpn [[:]] [-u ] [-p ] 314s [--cookie=] [--cookie-on-stdin] 314s [--otp=] [--otp-delay=] [--otp-prompt=] 314s [--pinentry=] [--realm=] 314s [--ifname=] [--set-routes=<0|1>] 314s [--half-internet-routes=<0|1>] [--set-dns=<0|1>] 314s [--pppd-use-peerdns=<0|1>] [--pppd-log=] 314s [--pppd-ifname=] [--pppd-ipparam=] 314s [--pppd-call=] [--pppd-plugin=] 314s [--pppd-accept-remote=<0|1>] 314s [--use-resolvconf=<0|1>] [--ca-file=] 314s [--user-cert=] [--user-key=] 314s [--use-syslog] [--trusted-cert=] 314s [--persistent=] [-c ] [-v|-q] 314s openfortivpn --help 314s openfortivpn --version 314s 314s Client for PPP+SSL VPN tunnel services. 314s openfortivpn connects to a VPN by setting up a tunnel to the gateway at 314s :. It spawns a pppd process and operates the communication between 314s the gateway and this process. 314s 314s Options: 314s -h --help Show this help message and exit. 314s --version Show version and exit. 314s -c , --config= Specify a custom configuration file (default: 314s /etc/openfortivpn/config). 314s -u , --username= VPN account username. 314s -p , --password= VPN account password. 314s --cookie= A valid session cookie (SVPNCOOKIE). 314s --cookie-on-stdin Read the cookie (SVPNCOOKIE) from standard input. 314s -o , --otp= One-Time-Password. 314s --otp-prompt= Search for the OTP prompt starting with this string. 314s --otp-delay= Wait seconds before sending the OTP. 314s --no-ftm-push Do not use FTM push if the server provides the option. 314s --pinentry= Use the program to supply a secret instead of asking for it. 314s --realm= Use specified authentication realm. 314s --ifname= Bind to interface. 314s --set-routes=[01] Set if openfortivpn should configure routes 314s when tunnel is up. 314s --no-routes Do not configure routes, same as --set-routes=0. 314s --half-internet-routes=[01] Add two 0.0.0.0/1 and 128.0.0.0/1 routes with higher 314s priority instead of replacing the default route. 314s --set-dns=[01] Set if openfortivpn should add DNS name servers 314s and domain search list in /etc/resolv.conf. 314s If installed resolvconf is used for the update. 314s --no-dns Do not reconfigure DNS, same as --set-dns=0. 314s --ca-file= Use specified PEM-encoded certificate bundle 314s instead of system-wide store to verify the gateway 314s certificate. 314s --user-cert= Use specified PEM-encoded certificate if the server 314s requires authentication with a certificate. 314s --user-cert=pkcs11: Use smartcard. Takes also partial or full PKCS11-URI. 314s --user-key= Use specified PEM-encoded key if the server requires 314s authentication with a certificate. 314s --pem-passphrase= Pass phrase for the PEM-encoded key. 314s --use-syslog Log to syslog instead of terminal. 314s --trusted-cert= Trust a given gateway. If classical SSL 314s certificate validation fails, the gateway 314s certificate will be matched against this value. 314s is the X509 certificate's sha256 sum. 314s This option can be used multiple times to trust 314s several certificates. 314s --insecure-ssl Do not disable insecure SSL protocols/ciphers. 314s Also enable TLS v1.0 if applicable. 314s If your server requires a specific cipher or protocol, 314s consider using --cipher-list and/or --min-tls instead. 314s --cipher-list= OpenSSL ciphers to use. If default does not work 314s you can try with the cipher suggested in the output 314s of 'openssl s_client -connect ' 314s (e.g. AES256-GCM-SHA384). Applies to TLS v1.2 or 314s lower only, not to be used with TLS v1.3 ciphers. 314s --min-tls Use minimum TLS version instead of system default. 314s Valid values are 1.0, 1.1, 1.2, 1.3. 314s --seclevel-1 If --cipher-list is not specified, add @SECLEVEL=1 to 314s (compiled in) list of ciphers. This lowers limits on 314s dh key. Applies to TLS v1.2 or lower only. 314s --persistent= Run the vpn persistently in a loop and try to re- 314s connect every seconds when dropping out. 314s -v Increase verbosity. Can be used multiple times 314s to be even more verbose. 314s -q Decrease verbosity. Can be used multiple times 314s to be even less verbose. 314s --pppd-use-peerdns=[01] Whether to ask peer ppp server for DNS server 314s addresses and make pppd rewrite /etc/resolv.conf. 314s --pppd-no-peerdns Same as --pppd-use-peerdns=0. pppd will not 314s modify DNS resolution then. 314s --pppd-log= Set pppd in debug mode and save its logs into 314s . 314s --pppd-plugin= Use specified pppd plugin instead of configuring 314s resolver and routes directly. 314s --pppd-ifname= Set the pppd interface name, if supported by pppd. 314s --pppd-ipparam= Provides an extra parameter to the ip-up, ip-pre-up 314s and ip-down scripts. See man (8) pppd. 314s --pppd-call= Move most pppd options from pppd cmdline to 314s /etc/ppp/peers/ and invoke pppd with 314s 'call '. 314s --pppd-accept-remote=[01] Whether to invoke pppd with 'ipcp-accept-remote'. 314s Disable for pppd < 2.5.0. 314s --use-resolvconf=[01] If possible use resolvconf to update /etc/resolv.conf. 314s 314s Configuration file: 314s Options can be taken from a configuration file. Options passed in the 314s command line will override those from the configuration file, though. The 314s default configuration file is /etc/openfortivpn/config, 314s but this can be set using the -c option. 314s A simple configuration file example looks like: 314s # this is a comment 314s host = vpn-gateway 314s port = 8443 314s username = foo 314s password = bar 314s trusted-cert = certificatedigest4daa8c5fe6c... 314s trusted-cert = othercertificatedigest6631bf... 314s For a full-featured configuration see man openfortivpn(1). 315s autopkgtest [02:21:09]: test command1: -----------------------] 315s command1 PASS (superficial) 315s autopkgtest [02:21:09]: test command1: - - - - - - - - - - results - - - - - - - - - - 316s autopkgtest [02:21:10]: @@@@@@@@@@@@@@@@@@@@ summary 316s command1 PASS (superficial) 345s Creating nova instance adt-noble-ppc64el-openfortivpn-20240319-021554-juju-7f2275-prod-proposed-migration-environment-2 from image adt/ubuntu-noble-ppc64el-server-20240319.img (UUID 9d87beed-6c32-481f-958d-7469e26317f3)...