0s autopkgtest [09:59:05]: starting date and time: 2024-12-02 09:59:05+0000 0s autopkgtest [09:59:05]: git checkout: be626eda Fix armhf LXD image generation for plucky 0s autopkgtest [09:59:05]: host juju-7f2275-prod-proposed-migration-environment-20; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.kx6gkykq/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:postfix,src:mysql-8.4 --apt-upgrade gnupg2 --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=postfix/3.9.0-4 mysql-8.4/8.4.3-0ubuntu1' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-20@bos03-arm64-34.secgroup --name adt-plucky-arm64-gnupg2-20241202-095905-juju-7f2275-prod-proposed-migration-environment-20-23f42924-5fc9-4142-b9a7-f4762538b63e --image adt/ubuntu-plucky-arm64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-20 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 232s autopkgtest [10:02:57]: testbed dpkg architecture: arm64 232s autopkgtest [10:02:57]: testbed apt version: 2.9.14ubuntu1 232s autopkgtest [10:02:57]: @@@@@@@@@@@@@@@@@@@@ test bed setup 233s autopkgtest [10:02:58]: testbed release detected to be: None 233s autopkgtest [10:02:58]: updating testbed package index (apt update) 234s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 234s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 234s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 234s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 234s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [903 kB] 234s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 234s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [16.4 kB] 234s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [74.5 kB] 234s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 Packages [127 kB] 234s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted arm64 Packages [58.2 kB] 234s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe arm64 Packages [794 kB] 235s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse arm64 Packages [22.1 kB] 235s Fetched 2079 kB in 1s (2110 kB/s) 236s Reading package lists... 236s Reading package lists... 237s Building dependency tree... 237s Reading state information... 238s Calculating upgrade... 238s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 239s Reading package lists... 239s Building dependency tree... 239s Reading state information... 240s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 240s autopkgtest [10:03:05]: upgrading testbed (apt dist-upgrade and autopurge) 240s Reading package lists... 240s Building dependency tree... 240s Reading state information... 241s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 241s Starting 2 pkgProblemResolver with broken count: 0 241s Done 241s Entering ResolveByKeep 242s 242s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 242s Reading package lists... 243s Building dependency tree... 243s Reading state information... 244s Starting pkgProblemResolver with broken count: 0 244s Starting 2 pkgProblemResolver with broken count: 0 244s Done 245s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 248s autopkgtest [10:03:13]: testbed running kernel: Linux 6.11.0-8-generic #8-Ubuntu SMP PREEMPT_DYNAMIC Mon Sep 16 14:19:41 UTC 2024 248s autopkgtest [10:03:13]: @@@@@@@@@@@@@@@@@@@@ apt-source gnupg2 260s Get:1 http://ftpmaster.internal/ubuntu plucky/main gnupg2 2.4.4-2ubuntu18 (dsc) [3631 B] 260s Get:2 http://ftpmaster.internal/ubuntu plucky/main gnupg2 2.4.4-2ubuntu18 (tar) [7886 kB] 260s Get:3 http://ftpmaster.internal/ubuntu plucky/main gnupg2 2.4.4-2ubuntu18 (asc) [386 B] 260s Get:4 http://ftpmaster.internal/ubuntu plucky/main gnupg2 2.4.4-2ubuntu18 (diff) [87.5 kB] 260s gpgv: Signature made Mon Sep 2 00:29:20 2024 UTC 260s gpgv: using RSA key 88E9530BCBDDC200517B5EB0F498D2D9DE7DAD9C 260s gpgv: issuer "alex.murray@canonical.com" 260s gpgv: Can't check signature: No public key 260s dpkg-source: warning: cannot verify inline signature for ./gnupg2_2.4.4-2ubuntu18.dsc: no acceptable signature found 266s autopkgtest [10:03:31]: testing package gnupg2 version 2.4.4-2ubuntu18 267s autopkgtest [10:03:32]: build not needed 270s autopkgtest [10:03:35]: test simple-tests: preparing testbed 270s Reading package lists... 271s Building dependency tree... 271s Reading state information... 271s Starting pkgProblemResolver with broken count: 0 271s Starting 2 pkgProblemResolver with broken count: 0 271s Done 272s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 273s autopkgtest [10:03:38]: test simple-tests: [----------------------- 273s + mktemp -d 273s + DIR=/tmp/tmp.auN7nmLu6O 273s + GPG_HOME=/tmp/tmp.auN7nmLu6O/gnupg 273s + gpg=gpg --homedir /tmp/tmp.auN7nmLu6O/gnupg 273s + mkdir /tmp/tmp.auN7nmLu6O/gnupg 273s + chmod 700 /tmp/tmp.auN7nmLu6O/gnupg 273s + cd /tmp/tmp.auN7nmLu6O 273s + cat 273s + gpg --homedir /tmp/tmp.auN7nmLu6O/gnupg --batch --generate-key key-batch 273s gpg: keybox '/tmp/tmp.auN7nmLu6O/gnupg/pubring.kbx' created 275s gpg: /tmp/tmp.auN7nmLu6O/gnupg/trustdb.gpg: trustdb created 275s gpg: directory '/tmp/tmp.auN7nmLu6O/gnupg/openpgp-revocs.d' created 275s gpg: revocation certificate stored as '/tmp/tmp.auN7nmLu6O/gnupg/openpgp-revocs.d/2A5564C11E9734B674DB97B7AFF973FE3A2084B7.rev' 275s + gpg --homedir /tmp/tmp.auN7nmLu6O/gnupg -abs 276s + gpg --homedir /tmp/tmp.auN7nmLu6O/gnupg --verify pubring.kbx.asc /tmp/tmp.auN7nmLu6O/gnupg/pubring.kbx 276s gpg: Signature made Mon Dec 2 10:03:40 2024 UTC 276s gpg: using RSA key F69826BB8552F5EF52D6CD04C5DDD0850F4D9DBE 276s gpg: checking the trustdb 276s gpg: marginals needed: 3 completes needed: 1 trust model: pgp 276s gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u 276s gpg: Good signature from "test case " [ultimate] 276s + gpgv --keyring /tmp/tmp.auN7nmLu6O/gnupg/pubring.kbx pubring.kbx.asc /tmp/tmp.auN7nmLu6O/gnupg/pubring.kbx 276s gpgv: Signature made Mon Dec 2 10:03:40 2024 UTC 276s gpgv: using RSA key F69826BB8552F5EF52D6CD04C5DDD0850F4D9DBE 276s gpgv: Good signature from "test case " 276s + gpg --homedir /tmp/tmp.auN7nmLu6O/gnupg -e -r example@example.com 276s + gpg --homedir /tmp/tmp.auN7nmLu6O/gnupg -d -r example@example.com 276s gpg: encrypted with rsa3072 key, ID C5DDD0850F4D9DBE, created 2024-12-02 276s "test case " 276s autopkgtest [10:03:41]: test simple-tests: -----------------------] 276s autopkgtest [10:03:41]: test simple-tests: - - - - - - - - - - results - - - - - - - - - - 276s simple-tests PASS 277s autopkgtest [10:03:42]: test migration: preparing testbed 413s autopkgtest [10:05:58]: testbed dpkg architecture: arm64 413s autopkgtest [10:05:58]: testbed apt version: 2.9.14ubuntu1 413s autopkgtest [10:05:58]: @@@@@@@@@@@@@@@@@@@@ test bed setup 413s autopkgtest [10:05:58]: testbed release detected to be: plucky 414s autopkgtest [10:05:59]: updating testbed package index (apt update) 415s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 415s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 415s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 415s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 415s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [16.4 kB] 415s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [903 kB] 415s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 415s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [74.5 kB] 415s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 Packages [127 kB] 415s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted arm64 Packages [58.2 kB] 415s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe arm64 Packages [794 kB] 415s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse arm64 Packages [22.1 kB] 416s Fetched 2079 kB in 1s (2177 kB/s) 417s Reading package lists... 417s Reading package lists... 418s Building dependency tree... 418s Reading state information... 419s Calculating upgrade... 420s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 421s Reading package lists... 421s Building dependency tree... 421s Reading state information... 423s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 423s autopkgtest [10:06:08]: upgrading testbed (apt dist-upgrade and autopurge) 423s Reading package lists... 423s Building dependency tree... 423s Reading state information... 424s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 424s Starting 2 pkgProblemResolver with broken count: 0 424s Done 425s Entering ResolveByKeep 425s 426s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 426s Reading package lists... 427s Building dependency tree... 427s Reading state information... 428s Starting pkgProblemResolver with broken count: 0 428s Starting 2 pkgProblemResolver with broken count: 0 428s Done 430s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 433s Reading package lists... 434s Building dependency tree... 434s Reading state information... 434s Starting pkgProblemResolver with broken count: 0 434s Starting 2 pkgProblemResolver with broken count: 0 434s Done 436s The following NEW packages will be installed: 436s debian-archive-keyring gnupg1 436s 0 upgraded, 2 newly installed, 0 to remove and 0 not upgraded. 436s Need to get 758 kB of archives. 436s After this operation, 1743 kB of additional disk space will be used. 436s Get:1 http://ftpmaster.internal/ubuntu plucky/universe arm64 debian-archive-keyring all 2023.4ubuntu1 [168 kB] 436s Get:2 http://ftpmaster.internal/ubuntu plucky/universe arm64 gnupg1 arm64 1.4.23-2 [589 kB] 437s Fetched 758 kB in 1s (1280 kB/s) 437s Selecting previously unselected package debian-archive-keyring. 438s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 80333 files and directories currently installed.) 438s Preparing to unpack .../debian-archive-keyring_2023.4ubuntu1_all.deb ... 438s Unpacking debian-archive-keyring (2023.4ubuntu1) ... 438s Selecting previously unselected package gnupg1. 438s Preparing to unpack .../gnupg1_1.4.23-2_arm64.deb ... 438s Unpacking gnupg1 (1.4.23-2) ... 438s Setting up gnupg1 (1.4.23-2) ... 438s Setting up debian-archive-keyring (2023.4ubuntu1) ... 438s Processing triggers for install-info (7.1.1-1) ... 438s Processing triggers for man-db (2.13.0-1) ... 444s autopkgtest [10:06:29]: test migration: [----------------------- 444s ++ mktemp -d 444s + DIR=/tmp/tmp.Eoc6EZrnlm 444s + GPG_HOME=/tmp/tmp.Eoc6EZrnlm/gnupg 444s + gpg=(gpg --homedir "$GPG_HOME" --batch --quiet --with-colons) 444s + gpg1=(gpg1 --homedir "$GPG_HOME" --batch --quiet --with-colons) 444s + mkdir /tmp/tmp.Eoc6EZrnlm/gnupg 444s + chmod 700 /tmp/tmp.Eoc6EZrnlm/gnupg 444s + gpg1 --homedir /tmp/tmp.Eoc6EZrnlm/gnupg --batch --quiet --with-colons --import 444s ++ ls /usr/share/keyrings/debian-archive-bookworm-automatic.gpg /usr/share/keyrings/debian-archive-bookworm-security-automatic.gpg /usr/share/keyrings/debian-archive-bookworm-stable.gpg /usr/share/keyrings/debian-archive-bullseye-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-security-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-stable.gpg /usr/share/keyrings/debian-archive-buster-automatic.gpg /usr/share/keyrings/debian-archive-buster-security-automatic.gpg /usr/share/keyrings/debian-archive-buster-stable.gpg /usr/share/keyrings/debian-archive-keyring.gpg /usr/share/keyrings/debian-archive-removed-keys.gpg 444s ++ grep -vE 'debian-archive-bookworm-stable.gpg|debian-archive-keyring.gpg' 444s + cat /usr/share/keyrings/debian-archive-bookworm-automatic.gpg /usr/share/keyrings/debian-archive-bookworm-security-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-security-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-stable.gpg /usr/share/keyrings/debian-archive-buster-automatic.gpg /usr/share/keyrings/debian-archive-buster-security-automatic.gpg /usr/share/keyrings/debian-archive-buster-stable.gpg /usr/share/keyrings/debian-archive-removed-keys.gpg 444s gpg: Note: signatures using the MD5 algorithm are rejected 444s + gpg1 --homedir /tmp/tmp.Eoc6EZrnlm/gnupg --batch --quiet --with-colons --list-keys 444s tru::1:1733133989:0:3:1:5 444s pub:-:4096:1:B7C5D7D6350947F8:2023-01-21:2031-01-19::-:Debian Archive Automatic Signing Key (12/bookworm) ::scSC: 444s sub:-:4096:1:6ED0E7B82643E131:2023-01-21:2031-01-19:::::s: 444s pub:-:4096:1:254CF3B5AEC0A8F0:2023-01-21:2031-01-19::-:Debian Security Archive Automatic Signing Key (12/bookworm) ::scSC: 444s sub:-:4096:1:BDE6D2B9216EC7A8:2023-01-21:2031-01-19:::::s: 444s pub:-:4096:1:73A4F27B8DD47936:2021-01-17:2029-01-15::-:Debian Archive Automatic Signing Key (11/bullseye) ::scSC: 444s sub:-:4096:1:0E98404D386FA1D9:2021-01-17:2029-01-15:::::s: 444s pub:-:4096:1:A48449044AAD5C5D:2021-01-17:2029-01-15::-:Debian Security Archive Automatic Signing Key (11/bullseye) ::scSC: 444s sub:-:4096:1:54404762BBB6E853:2021-01-17:2029-01-15:::::s: 444s pub:-:4096:1:605C66F00D6C9793:2021-02-13:2029-02-11::-:Debian Stable Release Key (11/bullseye) ::scSC: 444s pub:-:4096:1:DC30D7C23CBBABEE:2019-04-14:2027-04-12::-:Debian Archive Automatic Signing Key (10/buster) ::scSC: 444s sub:-:4096:1:648ACFD622F3D138:2019-04-14:2027-04-12:::::s: 444s pub:-:4096:1:4DFAB270CAA96DFA:2019-04-14:2027-04-12::-:Debian Security Archive Automatic Signing Key (10/buster) ::scSC: 444s sub:-:4096:1:112695A0E562B32A:2019-04-14:2027-04-12:::::s: 444s pub:-:4096:1:DCC9EFBF77E11517:2019-02-05:2027-02-03::-:Debian Stable Release Key (10/buster) ::scSC: 444s pub:e:1024:1:6FFA8EF91DB114E0:2004-01-15:2005-01-27::-:Debian Archive Automatic Signing Key (2004) ::sc: 444s pub:e:1024:17:F1D53D8C4F368D5D:2005-01-31:2006-01-31::-:Debian Archive Automatic Signing Key (2005) ::sca: 444s pub:-:1024:17:E415B2B4B5F5BBED:2005-04-24:::-:Debian AMD64 Archive Key ::scESC: 444s sub:-:2048:16:B7A50B4134FC6FE5:2005-04-24::::::e: 444s pub:e:1024:17:010908312D230C5F:2006-01-03:2007-02-07::-:Debian Archive Automatic Signing Key (2006) ::sc: 444s pub:e:1024:17:A70DAF536070D3A1:2006-11-20:2009-07-01::-:Debian Archive Automatic Signing Key (4.0/etch) ::sc: 444s pub:-:1024:17:B5D0C804ADB11277:2006-09-17:::-:Etch Stable Release Key ::scSC: 444s pub:e:1024:17:EC61E0B0BBE55AB3:2007-03-31:2010-03-30::-:Debian-Volatile Archive Automatic Signing Key (4.0/etch)::sc: 444s sub:e:2048:16:0A3B614236CA98F3:2007-03-31:2010-03-30:::::e: 444s pub:e:4096:1:9AA38DCD55BE302B:2009-01-27:2012-12-31::-:Debian Archive Automatic Signing Key (5.0/lenny) ::sc: 444s pub:e:1024:17:4D270D06F42584E6:2008-04-06:2012-05-15::-:Lenny Stable Release Key ::sc: 444s pub:e:2048:1:DFD993306D849617:2009-01-24:2013-01-23::-:Debian-Volatile Archive Automatic Signing Key (5.0/lenny)::sc: 444s pub:e:4096:1:64481591B98321F9:2010-08-07:2017-08-05::-:Squeeze Stable Release Key ::sc: 444s pub:e:4096:1:AED4B06F473041FA:2010-08-27:2018-03-05::-:Debian Archive Automatic Signing Key (6.0/squeeze) ::sc: 444s pub:e:4096:1:8B48AD6246925553:2012-04-27:2020-04-25::-:Debian Archive Automatic Signing Key (7.0/wheezy) ::sc: 444s pub:e:4096:1:6FB2A1C265FFB764:2012-05-08:2019-05-07::-:Wheezy Stable Release Key ::sc: 444s pub:e:4096:1:CBF8D6FD518E17E1:2013-08-17:2021-08-15::-:Jessie Stable Release Key ::sc: 444s pub:e:4096:1:7638D0442B90D010:2014-11-21:2022-11-19::-:Debian Archive Automatic Signing Key (8/jessie) ::sc: 444s pub:e:4096:1:9D6D8F6BC857C906:2014-11-21:2022-11-19::-:Debian Security Archive Automatic Signing Key (8/jessie) ::sc: 444s pub:-:4096:1:EF0F382A1A7B6500:2017-05-20:2025-05-18::-:Debian Stable Release Key (9/stretch) ::scSC: 444s pub:-:4096:1:E0B11894F66AEC98:2017-05-22:2025-05-20::-:Debian Archive Automatic Signing Key (9/stretch) ::scSC: 444s sub:-:4096:1:04EE7237B7D453EC:2017-05-22:2025-05-20:::::s: 444s pub:-:4096:1:EDA0D2388AE22BA9:2017-05-22:2025-05-20::-:Debian Security Archive Automatic Signing Key (9/stretch) ::scSC: 444s sub:-:4096:1:AA8E81B4331F7F50:2017-05-22:2025-05-20:::::s: 444s + gpg --homedir /tmp/tmp.Eoc6EZrnlm/gnupg --batch --quiet --with-colons --list-keys 444s + migrate-pubring-from-classic-gpg /tmp/tmp.Eoc6EZrnlm/gnupg 444s Migrating from: 444s -rw------- 1 ubuntu ubuntu 110540 Dec 2 10:06 /tmp/tmp.Eoc6EZrnlm/gnupg/pubring.gpg 444s [Backing up to /tmp/tmp.Eoc6EZrnlm/gnupg/migrate-from-classic-backup.2024-12-02.fA1m20] 444s gpg: keybox '/tmp/tmp.Eoc6EZrnlm/gnupg/pubring.kbx' created 444s gpg: starting migration from earlier GnuPG versions 444s gpg: porting secret keys from '/tmp/tmp.Eoc6EZrnlm/gnupg/secring.gpg' to gpg-agent 444s gpg: migration succeeded 444s gpg: key B7C5D7D6350947F8: 5 signatures not checked due to missing keys 444s gpg: key B7C5D7D6350947F8: public key "Debian Archive Automatic Signing Key (12/bookworm) " imported 444s gpg: key 254CF3B5AEC0A8F0: 4 signatures not checked due to missing keys 444s gpg: key 254CF3B5AEC0A8F0: public key "Debian Security Archive Automatic Signing Key (12/bookworm) " imported 444s gpg: key 73A4F27B8DD47936: 5 signatures not checked due to missing keys 444s gpg: key 73A4F27B8DD47936: public key "Debian Archive Automatic Signing Key (11/bullseye) " imported 444s gpg: key A48449044AAD5C5D: 4 signatures not checked due to missing keys 444s gpg: key A48449044AAD5C5D: public key "Debian Security Archive Automatic Signing Key (11/bullseye) " imported 444s gpg: key 605C66F00D6C9793: 2 signatures not checked due to missing keys 444s gpg: key 605C66F00D6C9793: public key "Debian Stable Release Key (11/bullseye) " imported 444s gpg: key DC30D7C23CBBABEE: 4 signatures not checked due to missing keys 444s gpg: key DC30D7C23CBBABEE: public key "Debian Archive Automatic Signing Key (10/buster) " imported 444s gpg: key 4DFAB270CAA96DFA: 4 signatures not checked due to missing keys 444s gpg: key 4DFAB270CAA96DFA: public key "Debian Security Archive Automatic Signing Key (10/buster) " imported 444s gpg: key DCC9EFBF77E11517: 2 signatures not checked due to missing keys 444s gpg: key DCC9EFBF77E11517: public key "Debian Stable Release Key (10/buster) " imported 444s gpg: key 6FFA8EF91DB114E0: 1 signature not checked due to a missing key 444s gpg: key 6FFA8EF91DB114E0: public key "Debian Archive Automatic Signing Key (2004) " imported 444s gpg: Note: signatures using the MD5 algorithm are rejected 444s gpg: key F1D53D8C4F368D5D: 1 signature not checked due to a missing key 444s gpg: key F1D53D8C4F368D5D: 1 bad signature 444s gpg: key F1D53D8C4F368D5D: public key "Debian Archive Automatic Signing Key (2005) " imported 444s gpg: key E415B2B4B5F5BBED: 3 signatures not checked due to missing keys 444s gpg: key E415B2B4B5F5BBED: public key "Debian AMD64 Archive Key " imported 444s gpg: Note: third-party key signatures using the SHA1 algorithm are rejected 444s gpg: (use option "--allow-weak-key-signatures" to override) 444s gpg: key 010908312D230C5F: 12 signatures not checked due to missing keys 444s gpg: key 010908312D230C5F: 1 bad signature 444s gpg: key 010908312D230C5F: public key "Debian Archive Automatic Signing Key (2006) " imported 444s gpg: key A70DAF536070D3A1: 1 signature not checked due to a missing key 444s gpg: key A70DAF536070D3A1: public key "Debian Archive Automatic Signing Key (4.0/etch) " imported 444s gpg: key B5D0C804ADB11277: 2 signatures not checked due to missing keys 444s gpg: key B5D0C804ADB11277: public key "Etch Stable Release Key " imported 444s gpg: key EC61E0B0BBE55AB3: 1 signature not checked due to a missing key 444s gpg: key EC61E0B0BBE55AB3: public key "Debian-Volatile Archive Automatic Signing Key (4.0/etch)" imported 444s gpg: key 9AA38DCD55BE302B: 3 signatures not checked due to missing keys 444s gpg: key 9AA38DCD55BE302B: public key "Debian Archive Automatic Signing Key (5.0/lenny) " imported 444s gpg: key 4D270D06F42584E6: 5 signatures not checked due to missing keys 444s gpg: key 4D270D06F42584E6: public key "Lenny Stable Release Key " imported 444s gpg: key DFD993306D849617: 1 signature not checked due to a missing key 444s gpg: key DFD993306D849617: public key "Debian-Volatile Archive Automatic Signing Key (5.0/lenny)" imported 444s gpg: key 64481591B98321F9: 3 signatures not checked due to missing keys 444s gpg: key 64481591B98321F9: public key "Squeeze Stable Release Key " imported 444s gpg: key AED4B06F473041FA: 10 signatures not checked due to missing keys 444s gpg: key AED4B06F473041FA: public key "Debian Archive Automatic Signing Key (6.0/squeeze) " imported 444s gpg: key 8B48AD6246925553: 6 signatures not checked due to missing keys 444s gpg: key 8B48AD6246925553: public key "Debian Archive Automatic Signing Key (7.0/wheezy) " imported 444s gpg: key 6FB2A1C265FFB764: 3 signatures not checked due to missing keys 444s gpg: key 6FB2A1C265FFB764: public key "Wheezy Stable Release Key " imported 444s gpg: key CBF8D6FD518E17E1: 2 signatures not checked due to missing keys 444s gpg: key CBF8D6FD518E17E1: public key "Jessie Stable Release Key " imported 444s gpg: key 7638D0442B90D010: 3 signatures not checked due to missing keys 444s gpg: key 7638D0442B90D010: public key "Debian Archive Automatic Signing Key (8/jessie) " imported 444s gpg: key 9D6D8F6BC857C906: 3 signatures not checked due to missing keys 444s gpg: key 9D6D8F6BC857C906: public key "Debian Security Archive Automatic Signing Key (8/jessie) " imported 444s gpg: key EF0F382A1A7B6500: 2 signatures not checked due to missing keys 444s gpg: key EF0F382A1A7B6500: public key "Debian Stable Release Key (9/stretch) " imported 444s gpg: key E0B11894F66AEC98: 3 signatures not checked due to missing keys 444s gpg: key E0B11894F66AEC98: public key "Debian Archive Automatic Signing Key (9/stretch) " imported 444s gpg: key EDA0D2388AE22BA9: 3 signatures not checked due to missing keys 444s gpg: key EDA0D2388AE22BA9: public key "Debian Security Archive Automatic Signing Key (9/stretch) " imported 444s gpg: Total number processed: 28 444s gpg: imported: 28 444s gpg: no need for a trustdb check 444s Migration completed successfully: 444s -rw-rw-r-- 1 ubuntu ubuntu 116220 Dec 2 10:06 /tmp/tmp.Eoc6EZrnlm/gnupg/pubring.kbx 444s + gpg --homedir /tmp/tmp.Eoc6EZrnlm/gnupg --batch --quiet --with-colons --list-keys 444s + diff -u /tmp/tmp.Eoc6EZrnlm/key.list.before /tmp/tmp.Eoc6EZrnlm/key.list.after 445s autopkgtest [10:06:30]: test migration: -----------------------] 445s autopkgtest [10:06:30]: test migration: - - - - - - - - - - results - - - - - - - - - - 445s migration PASS 446s autopkgtest [10:06:31]: @@@@@@@@@@@@@@@@@@@@ summary 446s simple-tests PASS 446s migration PASS 473s nova [W] Using flock in prodstack6-arm64 473s Creating nova instance adt-plucky-arm64-gnupg2-20241202-095905-juju-7f2275-prod-proposed-migration-environment-20-23f42924-5fc9-4142-b9a7-f4762538b63e from image adt/ubuntu-plucky-arm64-server-20241201.img (UUID bad80835-056f-4c2a-b1f6-b9558998c7af)... 473s nova [W] Using flock in prodstack6-arm64 473s flock: timeout while waiting to get lock 473s Creating nova instance adt-plucky-arm64-gnupg2-20241202-095905-juju-7f2275-prod-proposed-migration-environment-20-23f42924-5fc9-4142-b9a7-f4762538b63e from image adt/ubuntu-plucky-arm64-server-20241201.img (UUID bad80835-056f-4c2a-b1f6-b9558998c7af)...