0s autopkgtest [14:59:17]: starting date and time: 2025-03-15 14:59:17+0000
  0s autopkgtest [14:59:17]: git checkout: 325255d2 Merge branch 'pin-any-arch' into 'ubuntu/production'
  0s autopkgtest [14:59:17]: host juju-7f2275-prod-proposed-migration-environment-9; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.oo5jpfrw/out --timeout-copy=6000 --setup-commands 'ln -s /dev/null /etc/systemd/system/bluetooth.service; printf "http_proxy=http://squid.internal:3128\nhttps_proxy=http://squid.internal:3128\nno_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com,radosgw.ps5.canonical.com\n" >> /etc/environment' --apt-pocket=proposed=src:glibc --apt-upgrade openfortivpn --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=glibc/2.41-1ubuntu2 -- lxd -r lxd-armhf-10.145.243.149 lxd-armhf-10.145.243.149:autopkgtest/ubuntu/plucky/armhf
 21s autopkgtest [14:59:38]: testbed dpkg architecture: armhf
 22s autopkgtest [14:59:39]: testbed apt version: 2.9.33
 26s autopkgtest [14:59:43]: @@@@@@@@@@@@@@@@@@@@ test bed setup
 28s autopkgtest [14:59:45]: testbed release detected to be: None
 36s autopkgtest [14:59:53]: updating testbed package index (apt update)
 38s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [126 kB]
 38s Get:2 http://ftpmaster.internal/ubuntu plucky InRelease [257 kB]
 38s Get:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease [126 kB]
 39s Get:4 http://ftpmaster.internal/ubuntu plucky-security InRelease [126 kB]
 39s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [15.8 kB]
 39s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [101 kB]
 39s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [404 kB]
 40s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf Packages [81.0 kB]
 40s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf c-n-f Metadata [1944 B]
 40s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted armhf c-n-f Metadata [116 B]
 40s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe armhf Packages [326 kB]
 40s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/universe armhf c-n-f Metadata [12.1 kB]
 40s Get:13 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse armhf Packages [3472 B]
 40s Get:14 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse armhf c-n-f Metadata [332 B]
 40s Get:15 http://ftpmaster.internal/ubuntu plucky/multiverse Sources [299 kB]
 40s Get:16 http://ftpmaster.internal/ubuntu plucky/main Sources [1400 kB]
 42s Get:17 http://ftpmaster.internal/ubuntu plucky/universe Sources [21.0 MB]
 71s Get:18 http://ftpmaster.internal/ubuntu plucky/main armhf Packages [1378 kB]
 73s Get:19 http://ftpmaster.internal/ubuntu plucky/main armhf c-n-f Metadata [29.4 kB]
 73s Get:20 http://ftpmaster.internal/ubuntu plucky/restricted armhf c-n-f Metadata [108 B]
 73s Get:21 http://ftpmaster.internal/ubuntu plucky/universe armhf Packages [15.1 MB]
 93s Get:22 http://ftpmaster.internal/ubuntu plucky/multiverse armhf Packages [172 kB]
 94s Fetched 41.0 MB in 57s (723 kB/s)
 96s Reading package lists...
101s autopkgtest [15:00:58]: upgrading testbed (apt dist-upgrade and autopurge)
103s Reading package lists...
103s Building dependency tree...
103s Reading state information...
104s Calculating upgrade...Starting pkgProblemResolver with broken count: 0
104s Starting 2 pkgProblemResolver with broken count: 0
104s Done
104s Entering ResolveByKeep
105s 
105s Calculating upgrade...
108s The following packages will be upgraded:
108s   libc-bin libc6 locales python3-jinja2 sos strace
108s 6 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
108s Need to get 8642 kB of archives.
108s After this operation, 23.6 kB of additional disk space will be used.
108s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libc6 armhf 2.41-1ubuntu2 [2932 kB]
110s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libc-bin armhf 2.41-1ubuntu2 [545 kB]
114s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf locales all 2.41-1ubuntu2 [4246 kB]
117s Get:4 http://ftpmaster.internal/ubuntu plucky/main armhf strace armhf 6.13+ds-1ubuntu1 [445 kB]
117s Get:5 http://ftpmaster.internal/ubuntu plucky/main armhf python3-jinja2 all 3.1.5-2ubuntu1 [109 kB]
117s Get:6 http://ftpmaster.internal/ubuntu plucky/main armhf sos all 4.9.0-5 [365 kB]
117s Preconfiguring packages ...
118s Fetched 8642 kB in 12s (744 kB/s)
118s (Reading database ... 
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 64655 files and directories currently installed.)
118s Preparing to unpack .../libc6_2.41-1ubuntu2_armhf.deb ...
118s Unpacking libc6:armhf (2.41-1ubuntu2) over (2.41-1ubuntu1) ...
118s Setting up libc6:armhf (2.41-1ubuntu2) ...
118s (Reading database ... 
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 64655 files and directories currently installed.)
118s Preparing to unpack .../libc-bin_2.41-1ubuntu2_armhf.deb ...
118s Unpacking libc-bin (2.41-1ubuntu2) over (2.41-1ubuntu1) ...
118s Setting up libc-bin (2.41-1ubuntu2) ...
119s (Reading database ... 
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 64655 files and directories currently installed.)
119s Preparing to unpack .../locales_2.41-1ubuntu2_all.deb ...
119s Unpacking locales (2.41-1ubuntu2) over (2.41-1ubuntu1) ...
119s Preparing to unpack .../strace_6.13+ds-1ubuntu1_armhf.deb ...
119s Unpacking strace (6.13+ds-1ubuntu1) over (6.11-0ubuntu1) ...
119s Preparing to unpack .../python3-jinja2_3.1.5-2ubuntu1_all.deb ...
119s Unpacking python3-jinja2 (3.1.5-2ubuntu1) over (3.1.5-2) ...
119s Preparing to unpack .../archives/sos_4.9.0-5_all.deb ...
119s Unpacking sos (4.9.0-5) over (4.9.0-4) ...
120s Setting up sos (4.9.0-5) ...
120s Setting up locales (2.41-1ubuntu2) ...
121s Generating locales (this might take a while)...
123s   en_US.UTF-8... done
123s Generation complete.
123s Setting up python3-jinja2 (3.1.5-2ubuntu1) ...
123s Setting up strace (6.13+ds-1ubuntu1) ...
123s Processing triggers for man-db (2.13.0-1) ...
124s Processing triggers for systemd (257.3-1ubuntu3) ...
127s Reading package lists...
127s Building dependency tree...
127s Reading state information...
127s Starting pkgProblemResolver with broken count: 0
127s Starting 2 pkgProblemResolver with broken count: 0
127s Done
128s Solving dependencies...
128s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
130s autopkgtest [15:01:27]: rebooting testbed after setup commands that affected boot
178s autopkgtest [15:02:15]: testbed running kernel: Linux 6.8.0-52-generic #53~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Wed Jan 15 18:10:51 UTC 2
202s autopkgtest [15:02:39]: @@@@@@@@@@@@@@@@@@@@ apt-source openfortivpn
212s Get:1 http://ftpmaster.internal/ubuntu plucky/universe openfortivpn 1.23.1-1 (dsc) [2090 B]
212s Get:2 http://ftpmaster.internal/ubuntu plucky/universe openfortivpn 1.23.1-1 (tar) [174 kB]
212s Get:3 http://ftpmaster.internal/ubuntu plucky/universe openfortivpn 1.23.1-1 (diff) [6052 B]
213s gpgv: Signature made Sun Feb 16 01:51:05 2025 UTC
213s gpgv:                using RSA key D0D085B169C3BFD9404858FA21FC29504B5230DB
213s gpgv:                issuer "epsilon@debian.org"
213s gpgv: Can't check signature: No public key
213s dpkg-source: warning: cannot verify inline signature for ./openfortivpn_1.23.1-1.dsc: no acceptable signature found
213s autopkgtest [15:02:50]: testing package openfortivpn version 1.23.1-1
215s autopkgtest [15:02:52]: build not needed
217s autopkgtest [15:02:54]: test command1: preparing testbed
219s Reading package lists...
219s Building dependency tree...
219s Reading state information...
219s Starting pkgProblemResolver with broken count: 0
220s Starting 2 pkgProblemResolver with broken count: 0
220s Done
220s The following NEW packages will be installed:
220s   openfortivpn ppp
221s 0 upgraded, 2 newly installed, 0 to remove and 0 not upgraded.
221s Need to get 380 kB of archives.
221s After this operation, 1749 kB of additional disk space will be used.
221s Get:1 http://ftpmaster.internal/ubuntu plucky/main armhf ppp armhf 2.5.2-1+1 [324 kB]
222s Get:2 http://ftpmaster.internal/ubuntu plucky/universe armhf openfortivpn armhf 1.23.1-1 [56.7 kB]
222s Fetched 380 kB in 1s (470 kB/s)
222s Selecting previously unselected package ppp.
222s (Reading database ... 
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 64655 files and directories currently installed.)
222s Preparing to unpack .../ppp_2.5.2-1+1_armhf.deb ...
222s Unpacking ppp (2.5.2-1+1) ...
222s Selecting previously unselected package openfortivpn.
222s Preparing to unpack .../openfortivpn_1.23.1-1_armhf.deb ...
222s Unpacking openfortivpn (1.23.1-1) ...
222s Setting up ppp (2.5.2-1+1) ...
222s Setting up openfortivpn (1.23.1-1) ...
222s Processing triggers for man-db (2.13.0-1) ...
230s autopkgtest [15:03:07]: test command1: openfortivpn -h
230s autopkgtest [15:03:07]: test command1: [-----------------------
232s Usage: openfortivpn [<host>[:<port>]] [-u <user>] [-p <pass>]
232s                     [--cookie=<cookie>] [--cookie-on-stdin] [--saml-login]
232s                     [--otp=<otp>] [--otp-delay=<delay>] [--otp-prompt=<prompt>]
232s                     [--pinentry=<program>] [--realm=<realm>]
232s                     [--ifname=<ifname>] [--set-routes=<0|1>]
232s                     [--half-internet-routes=<0|1>] [--set-dns=<0|1>]
232s                     [--pppd-use-peerdns=<0|1>] [--pppd-log=<file>]
232s                     [--pppd-ifname=<string>] [--pppd-ipparam=<string>]
232s                     [--pppd-call=<name>] [--pppd-plugin=<file>]
232s                     [--pppd-accept-remote=<0|1>]
232s                     [--use-resolvconf=<0|1>] [--ca-file=<file>]
232s                     [--user-cert=<file>] [--user-key=<file>]
232s                     [--use-syslog] [--trusted-cert=<digest>]
232s                     [--persistent=<interval>] [-c <file>] [-v|-q]
232s        openfortivpn --help
232s        openfortivpn --version
232s 
232s Client for PPP+TLS VPN tunnel services.
232s openfortivpn connects to a VPN by setting up a tunnel to the gateway at
232s <host>:<port>. It spawns a pppd process and operates the communication between
232s the gateway and this process.
232s 
232s Options:
232s   -h --help                     Show this help message and exit.
232s   --version                     Show version and exit.
232s   -c <file>, --config=<file>    Specify a custom configuration file (default:
232s                                 /etc/openfortivpn/config).
232s   -u <user>, --username=<user>  VPN account username.
232s   -p <pass>, --password=<pass>  VPN account password.
232s   --cookie=<cookie>             A valid session cookie (SVPNCOOKIE).
232s   --cookie-on-stdin             Read the cookie (SVPNCOOKIE) from standard input.
232s   --saml-login[=port]           Run a http server to handle SAML login requests
232s   -o <otp>, --otp=<otp>         One-Time-Password.
232s   --otp-prompt=<prompt>         Search for the OTP prompt starting with this string.
232s   --otp-delay=<delay>           Wait <delay> seconds before sending the OTP.
232s   --no-ftm-push                 Do not use FTM push if the server provides the option.
232s   --pinentry=<program>          Use the program to supply a secret instead of asking for it.
232s   --realm=<realm>               Use specified authentication realm.
232s   --ifname=<interface>          Bind to interface.
232s   --set-routes=[01]             Set if openfortivpn should configure routes
232s                                 when tunnel is up.
232s   --sni=<sni>                   Specify a different server name (SNI) than the host argument
232s                                 during TLS handshake.
232s   --no-routes                   Do not configure routes, same as --set-routes=0.
232s   --half-internet-routes=[01]   Add two 0.0.0.0/1 and 128.0.0.0/1 routes with higher
232s                                 priority instead of replacing the default route.
232s   --set-dns=[01]                Set if openfortivpn should add DNS name servers
232s                                 and domain search list in /etc/resolv.conf.
232s                                 If installed resolvconf is used for the update.
232s   --no-dns                      Do not reconfigure DNS, same as --set-dns=0.
232s   --ca-file=<file>              Use specified PEM-encoded certificate bundle
232s                                 instead of system-wide store to verify the gateway
232s                                 certificate.
232s   --user-cert=<file>            Use specified PEM-encoded certificate if the server
232s                                 requires authentication with a certificate.
232s   --user-cert=pkcs11:           Use smartcard. Takes also partial or full PKCS11-URI.
232s   --user-key=<file>             Use specified PEM-encoded key if the server requires
232s                                 authentication with a certificate.
232s   --pem-passphrase=<pass>       Pass phrase for the PEM-encoded key.
232s   --use-syslog                  Log to syslog instead of terminal.
232s   --trusted-cert=<digest>       Trust a given gateway. If classical TLS
232s                                 certificate validation fails, the gateway
232s                                 certificate will be matched against this value.
232s                                 <digest> is the X509 certificate's sha256 sum.
232s                                 This option can be used multiple times to trust
232s                                 several certificates.
232s   --insecure-ssl                Do not disable insecure TLS protocols/ciphers.
232s                                 Also enable TLS v1.0 if applicable.
232s                                 If your server requires a specific cipher or protocol,
232s                                 consider using --cipher-list and/or --min-tls instead.
232s   --cipher-list=<ciphers>       OpenSSL ciphers to use. If default does not work
232s                                 you can try with the cipher suggested in the output
232s                                 of 'openssl s_client -connect <host:port>'
232s                                 (e.g. AES256-GCM-SHA384). Applies to TLS v1.2 or
232s                                 lower only, not to be used with TLS v1.3 ciphers.
232s   --min-tls                     Use minimum TLS version instead of system default.
232s                                 Valid values are 1.0, 1.1, 1.2, 1.3.
232s   --seclevel-1                  If --cipher-list is not specified, add @SECLEVEL=1 to
232s                                 (compiled in) list of ciphers. This lowers limits on
232s                                 dh key. Applies to TLS v1.2 or lower only.
232s   --persistent=<interval>       Run the vpn persistently in a loop and try to re-
232s                                 connect every <interval> seconds when dropping out.
232s   -v                            Increase verbosity. Can be used multiple times
232s                                 to be even more verbose.
232s   -q                            Decrease verbosity. Can be used multiple times
232s                                 to be even less verbose.
232s   --pppd-use-peerdns=[01]       Whether to ask peer ppp server for DNS server
232s                                 addresses and make pppd rewrite /etc/resolv.conf.
232s   --pppd-no-peerdns             Same as --pppd-use-peerdns=0. pppd will not
232s                                 modify DNS resolution then.
232s   --pppd-log=<file>             Set pppd in debug mode and save its logs into
232s                                 <file>.
232s   --pppd-plugin=<file>          Use specified pppd plugin instead of configuring
232s                                 resolver and routes directly.
232s   --pppd-ifname=<string>        Set the pppd interface name, if supported by pppd.
232s   --pppd-ipparam=<string>       Provides an extra parameter to the ip-up, ip-pre-up
232s                                 and ip-down scripts. See man (8) pppd.
232s   --pppd-call=<name>            Move most pppd options from pppd cmdline to
232s                                 /etc/ppp/peers/<name> and invoke pppd with
232s                                 'call <name>'.
232s   --pppd-accept-remote=[01]     Whether to invoke pppd with 'ipcp-accept-remote'.
232s                                 Disable for pppd < 2.5.0.
232s   --use-resolvconf=[01]         If possible use resolvconf to update /etc/resolv.conf.
232s 
232s Configuration file:
232s   Options can be taken from a configuration file. Options passed in the
232s   command line will override those from the configuration file, though. The
232s   default configuration file is /etc/openfortivpn/config,
232s   but this can be set using the -c option.
232s   A simple configuration file example looks like:
232s       # this is a comment
232s       host = vpn-gateway
232s       port = 8443
232s       username = foo
232s       password = bar
232s       trusted-cert = certificatedigest4daa8c5fe6c...
232s       trusted-cert = othercertificatedigest6631bf...
232s   For a full-featured configuration see man openfortivpn(1).
232s autopkgtest [15:03:09]: test command1: -----------------------]
236s autopkgtest [15:03:13]: test command1:  - - - - - - - - - - results - - - - - - - - - -
236s command1             PASS (superficial)
240s autopkgtest [15:03:17]: @@@@@@@@@@@@@@@@@@@@ summary
240s command1             PASS (superficial)