0s autopkgtest [15:52:54]: starting date and time: 2026-02-05 15:52:54+0000 0s autopkgtest [15:52:54]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [15:52:54]: host juju-7f2275-prod-proposed-migration-environment-20; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.4dwhp2ih/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:python-certbot,src:sphinx-rtd-theme --apt-upgrade python-certbot-nginx --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=python-certbot/4.0.0-3 sphinx-rtd-theme/3.1.0+dfsg-1' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-arm64 --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-20@sto01-arm64-9.secgroup --name adt-resolute-arm64-python-certbot-nginx-20260205-155254-juju-7f2275-prod-proposed-migration-environment-20-f0f488b3-4ecf-446c-aae3-f9d6d49de3d7 --image adt/ubuntu-resolute-arm64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-20 --net-id=net_prod-autopkgtest-workers-arm64 -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 4s Creating nova instance adt-resolute-arm64-python-certbot-nginx-20260205-155254-juju-7f2275-prod-proposed-migration-environment-20-f0f488b3-4ecf-446c-aae3-f9d6d49de3d7 from image adt/ubuntu-resolute-arm64-server-20260205.img (UUID 88169191-3954-4b52-b471-25031b32a3a0)... 109s autopkgtest [15:54:43]: testbed dpkg architecture: arm64 111s autopkgtest [15:54:45]: testbed apt version: 3.1.14 119s autopkgtest [15:54:53]: @@@@@@@@@@@@@@@@@@@@ test bed setup 123s autopkgtest [15:54:57]: testbed release detected to be: None 124s autopkgtest [15:54:58]: updating testbed package index (apt update) 124s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 124s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 124s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 124s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 124s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [230 kB] 124s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1686 kB] 125s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 125s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [36.0 kB] 125s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 Packages [272 kB] 125s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 c-n-f Metadata [7520 B] 125s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 Packages [52.9 kB] 125s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 c-n-f Metadata [328 B] 125s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 Packages [1512 kB] 125s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 c-n-f Metadata [42.6 kB] 125s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 Packages [27.1 kB] 125s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 c-n-f Metadata [800 B] 128s Fetched 3997 kB in 1s (5942 kB/s) 129s Reading package lists... 133s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 133s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 133s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 133s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 134s Reading package lists... 134s Reading package lists... 134s Building dependency tree... 134s Reading state information... 134s Calculating upgrade... 135s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 135s autopkgtest [15:55:09]: upgrading testbed (apt dist-upgrade and autopurge) 135s Reading package lists... 135s Building dependency tree... 135s Reading state information... 135s Calculating upgrade... 136s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 136s Reading package lists... 136s Building dependency tree... 136s Reading state information... 136s Solving dependencies... 137s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 139s autopkgtest [15:55:13]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:41:39 UTC 2026 140s autopkgtest [15:55:14]: @@@@@@@@@@@@@@@@@@@@ apt-source python-certbot-nginx 146s Get:1 http://ftpmaster.internal/ubuntu resolute/universe python-certbot-nginx 4.0.0-2 (dsc) [2563 B] 146s Get:2 http://ftpmaster.internal/ubuntu resolute/universe python-certbot-nginx 4.0.0-2 (tar) [79.7 kB] 146s Get:3 http://ftpmaster.internal/ubuntu resolute/universe python-certbot-nginx 4.0.0-2 (diff) [18.4 kB] 146s gpgv: Signature made Sun May 25 15:33:15 2025 UTC 146s gpgv: using RSA key 909B8ECA4FEE6E81034527269B3F22544E9AF451 146s gpgv: issuer "hlieberman@debian.org" 146s gpgv: Can't check signature: No public key 146s dpkg-source: warning: cannot verify inline signature for ./python-certbot-nginx_4.0.0-2.dsc: no acceptable signature found 146s autopkgtest [15:55:20]: testing package python-certbot-nginx version 4.0.0-2 149s autopkgtest [15:55:23]: build not needed 149s autopkgtest [15:55:23]: test command1: preparing testbed 150s Reading package lists... 150s Building dependency tree... 150s Reading state information... 150s Solving dependencies... 151s The following NEW packages will be installed: 151s certbot nginx nginx-common python3-acme python3-certbot 151s python3-certbot-nginx python3-configargparse python3-josepy 151s python3-parsedatetime python3-pytz python3-rfc3339 151s 0 upgraded, 11 newly installed, 0 to remove and 0 not upgraded. 151s Need to get 1259 kB of archives. 151s After this operation, 4812 kB of additional disk space will be used. 151s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 nginx-common all 1.28.1-2ubuntu1 [44.8 kB] 151s Get:2 http://ftpmaster.internal/ubuntu resolute/main arm64 nginx arm64 1.28.1-2ubuntu1 [614 kB] 151s Get:3 http://ftpmaster.internal/ubuntu resolute/universe arm64 python3-josepy all 2.2.0-1 [22.3 kB] 151s Get:4 http://ftpmaster.internal/ubuntu resolute/universe arm64 python3-pytz all 2025.2-5 [32.4 kB] 151s Get:5 http://ftpmaster.internal/ubuntu resolute/universe arm64 python3-rfc3339 all 2.0.1-2 [6530 B] 151s Get:6 http://ftpmaster.internal/ubuntu resolute/universe arm64 python3-acme all 4.0.0-1 [49.0 kB] 151s Get:7 http://ftpmaster.internal/ubuntu resolute/universe arm64 python3-configargparse all 1.7-2 [31.7 kB] 151s Get:8 http://ftpmaster.internal/ubuntu resolute/universe arm64 python3-parsedatetime all 2.6-3build1 [32.1 kB] 151s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 python3-certbot all 4.0.0-3 [267 kB] 151s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 certbot all 4.0.0-3 [91.4 kB] 151s Get:11 http://ftpmaster.internal/ubuntu resolute/universe arm64 python3-certbot-nginx all 4.0.0-2 [67.4 kB] 151s Preconfiguring packages ... 151s Fetched 1259 kB in 0s (4204 kB/s) 151s Selecting previously unselected package nginx-common. 151s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 151s Preparing to unpack .../00-nginx-common_1.28.1-2ubuntu1_all.deb ... 151s Unpacking nginx-common (1.28.1-2ubuntu1) ... 151s Selecting previously unselected package nginx. 151s Preparing to unpack .../01-nginx_1.28.1-2ubuntu1_arm64.deb ... 151s Unpacking nginx (1.28.1-2ubuntu1) ... 151s Selecting previously unselected package python3-josepy. 151s Preparing to unpack .../02-python3-josepy_2.2.0-1_all.deb ... 151s Unpacking python3-josepy (2.2.0-1) ... 152s Selecting previously unselected package python3-pytz. 152s Preparing to unpack .../03-python3-pytz_2025.2-5_all.deb ... 152s Unpacking python3-pytz (2025.2-5) ... 152s Selecting previously unselected package python3-rfc3339. 152s Preparing to unpack .../04-python3-rfc3339_2.0.1-2_all.deb ... 152s Unpacking python3-rfc3339 (2.0.1-2) ... 152s Selecting previously unselected package python3-acme. 152s Preparing to unpack .../05-python3-acme_4.0.0-1_all.deb ... 152s Unpacking python3-acme (4.0.0-1) ... 152s Selecting previously unselected package python3-configargparse. 152s Preparing to unpack .../06-python3-configargparse_1.7-2_all.deb ... 152s Unpacking python3-configargparse (1.7-2) ... 152s Selecting previously unselected package python3-parsedatetime. 152s Preparing to unpack .../07-python3-parsedatetime_2.6-3build1_all.deb ... 152s Unpacking python3-parsedatetime (2.6-3build1) ... 152s Selecting previously unselected package python3-certbot. 152s Preparing to unpack .../08-python3-certbot_4.0.0-3_all.deb ... 152s Unpacking python3-certbot (4.0.0-3) ... 152s Selecting previously unselected package certbot. 152s Preparing to unpack .../09-certbot_4.0.0-3_all.deb ... 152s Unpacking certbot (4.0.0-3) ... 152s Selecting previously unselected package python3-certbot-nginx. 152s Preparing to unpack .../10-python3-certbot-nginx_4.0.0-2_all.deb ... 152s Unpacking python3-certbot-nginx (4.0.0-2) ... 152s Setting up python3-configargparse (1.7-2) ... 152s Setting up python3-parsedatetime (2.6-3build1) ... 152s Setting up nginx-common (1.28.1-2ubuntu1) ... 153s Created symlink '/etc/systemd/system/multi-user.target.wants/nginx.service' → '/usr/lib/systemd/system/nginx.service'. 153s Setting up python3-pytz (2025.2-5) ... 153s Setting up python3-josepy (2.2.0-1) ... 153s Setting up python3-rfc3339 (2.0.1-2) ... 153s Setting up nginx (1.28.1-2ubuntu1) ... 154s * Upgrading binary nginx  [ OK ] 154s Setting up python3-acme (4.0.0-1) ... 154s Setting up python3-certbot (4.0.0-3) ... 155s Setting up certbot (4.0.0-3) ... 155s Created symlink '/etc/systemd/system/timers.target.wants/certbot.timer' → '/usr/lib/systemd/system/certbot.timer'. 155s Setting up python3-certbot-nginx (4.0.0-2) ... 155s Processing triggers for man-db (2.13.1-1) ... 156s Processing triggers for ufw (0.36.2-9build1) ... 158s autopkgtest [15:55:32]: test command1: certbot --help nginx | grep -q "sleep-seconds" 158s autopkgtest [15:55:32]: test command1: [----------------------- 160s autopkgtest [15:55:34]: test command1: -----------------------] 161s autopkgtest [15:55:35]: test command1: - - - - - - - - - - results - - - - - - - - - - 161s command1 PASS 162s autopkgtest [15:55:36]: test nginx: preparing testbed 162s Reading package lists... 163s Building dependency tree... 163s Reading state information... 163s Solving dependencies... 163s The following NEW packages will be installed: 163s pebble 163s 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. 163s Need to get 3235 kB of archives. 163s After this operation, 14.3 MB of additional disk space will be used. 163s Get:1 http://ftpmaster.internal/ubuntu resolute/universe arm64 pebble arm64 2.6.0+ds1-1build1 [3235 kB] 164s Fetched 3235 kB in 1s (5086 kB/s) 164s Selecting previously unselected package pebble. 164s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89811 files and directories currently installed.) 164s Preparing to unpack .../pebble_2.6.0+ds1-1build1_arm64.deb ... 164s Unpacking pebble (2.6.0+ds1-1build1) ... 164s Setting up pebble (2.6.0+ds1-1build1) ... 164s Processing triggers for man-db (2.13.1-1) ... 166s autopkgtest [15:55:40]: test nginx: [----------------------- 166s Waiting for pebble to start .Pebble 2026/02/05 15:55:40 Starting Pebble ACME server 166s Pebble 2026/02/05 15:55:40 Generated new root issuer CN=Pebble Root CA 4b21ae with serial 2746599ac0d5c02f and SKI 4741e30f7395da0887986dbf2557e2f2e6a07567 166s Pebble 2026/02/05 15:55:40 Generated new intermediate issuer CN=Pebble Intermediate CA 736791 with serial 5fb8a2b17dc263ff and SKI 567a49098ab8f70fccb3f48e6f4622a9c917a747 166s Pebble 2026/02/05 15:55:40 Generated issuance chain: Pebble Root CA 4b21ae -> Pebble Intermediate CA 736791 166s Pebble 2026/02/05 15:55:40 Using certificate validity period of 157766400 seconds 166s Pebble 2026/02/05 15:55:40 Using system DNS resolver for ACME challenges 166s Pebble 2026/02/05 15:55:40 Disabling random VA sleeps 166s Pebble 2026/02/05 15:55:40 Configured to reject 0% of good nonces 166s Pebble 2026/02/05 15:55:40 Configured to attempt authz reuse for each identifier 50% of the time 166s Pebble 2026/02/05 15:55:40 Configured to show 3 orders per page 166s Pebble 2026/02/05 15:55:40 Management interface listening on: 0.0.0.0:15000 166s Pebble 2026/02/05 15:55:40 Root CA certificate available at: https://0.0.0.0:15000/roots/0 166s Pebble 2026/02/05 15:55:40 Listening on: 0.0.0.0:14000 166s Pebble 2026/02/05 15:55:40 ACME directory available at: https://0.0.0.0:14000/dir 167s .Pebble 2026/02/05 15:55:41 GET /dir -> calling handler() 167s 167s Pebble server started and is ready 167s Root logging level set at 10 167s Saving debug log to /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/logs/letsencrypt.log 167s Requested authenticator nginx and installer nginx 167s Single candidate plugin: * nginx 167s Description: Nginx Web Server plugin 167s Interfaces: Authenticator, Installer, Plugin 167s Entry point: EntryPoint(name='nginx', value='certbot_nginx._internal.configurator:NginxConfigurator', group='certbot.plugins') 167s Initialized: 167s Prep: True 167s Selected authenticator and installer 167s Plugins selected: Authenticator nginx, Installer nginx 167s Sending GET request to https://localhost:14000/dir. 167s Pebble 2026/02/05 15:55:41 GET /dir -> calling handler() 167s Pebble 2026/02/05 15:55:41 HEAD /nonce-plz -> calling handler() 167s Starting new HTTPS connection (1): localhost:14000 167s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 167s warnings.warn( 167s https://localhost:14000 "GET /dir HTTP/1.1" 200 486 167s Received response: 167s HTTP 200 167s Cache-Control: public, max-age=0, no-cache 167s Content-Type: application/json; charset=utf-8 167s Date: Thu, 05 Feb 2026 15:55:41 GMT 167s Content-Length: 486 167s 167s { 167s "keyChange": "https://localhost:14000/rollover-account-key", 167s "meta": { 167s "externalAccountRequired": false, 167s "termsOfService": "data:text/plain,Do%20what%20thou%20wilt" 167s }, 167s "newAccount": "https://localhost:14000/sign-me-up", 167s "newNonce": "https://localhost:14000/nonce-plz", 167s "newOrder": "https://localhost:14000/order-plz", 167s "renewalInfo": "https://localhost:14000/draft-ietf-acme-ari-03/renewalInfo", 167s "revokeCert": "https://localhost:14000/revoke-cert" 167s } 167s Requesting fresh nonce 167s Sending HEAD request to https://localhost:14000/nonce-plz. 167s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 167s warnings.warn( 167s https://localhost:14000 "HEAD /nonce-plz HTTP/1.1" 200 0 167s Received response: 167s HTTP 200 167s Cache-Control: public, max-age=0, no-cache 167s Link: ;rel="index" 167s Replay-Nonce: dcNWseCmmkGnwTXIlNAY6A 167s Date: Thu, 05 Feb 2026 15:55:41 GMT 167s 167s 167s Storing nonce: dcNWseCmmkGnwTXIlNAY6A 167s JWS payload: 167s b'{\n "termsOfServiceAgreed": true\n}' 167s Sending POST request to https://localhost:14000/sign-me-up: 167s { 167s "protected": "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", 167s "signature": "Racx7tRbBRlMvzLZahoNSob1g0QHU_AosQ_CxqlxhaskCO4DeEz3FvIqp1hD8yLoMveKB6hp7pc8yFjuz6V3duAZJT0kqQ7UHxhujDlK90mSSYauSCnIpFpd_kd9lqWXVbW7mnvpT41VvJBvqp00Al4CMP1QSgDpZI3Jn8hEEeUBShC0E2Zsym9Iq8ugAK5u7hab5IflodQix-IdIjrqzVMBptGz9SH48CNAiletf5k2f9iAwaIkr8yOaQdjWSshyqtQH0vL5rO9h0nUfyy649b2SRlpGVUbbj259x8fo056LJjOx1_CKEC_YkSRRRCl-iguWJhR86LYRjT5J0jGYg", 167s "payload": "ewogICJ0ZXJtc09mU2VydmljZUFncmVlZCI6IHRydWUKfQ" 167s } 167s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 167s warnings.warn( 167s Pebble 2026/02/05 15:55:41 POST /sign-me-up -> calling handler() 167s Pebble 2026/02/05 15:55:41 There are now 1 accounts in memory 167s Account registered. 167s Requesting a certificate for localhost 167s Pebble 2026/02/05 15:55:41 POST /order-plz -> calling handler() 167s Pebble 2026/02/05 15:55:41 There are now 1 authorizations in the db 167s Pebble 2026/02/05 15:55:41 Added order "Dcy12raDBwDM5W2c0qSjMfdYajp84cE0_mWr0p3L3bo" to the db 167s Pebble 2026/02/05 15:55:41 There are now 1 orders in the db 167s https://localhost:14000 "POST /sign-me-up HTTP/1.1" 201 506 167s Received response: 167s HTTP 201 167s Cache-Control: public, max-age=0, no-cache 167s Content-Type: application/json; charset=utf-8 167s Link: ;rel="index" 167s Location: https://localhost:14000/my-account/3eed41f9bed35b56 167s Replay-Nonce: QQ6ikjUUAltIIB8E81GWUA 167s Date: Thu, 05 Feb 2026 15:55:41 GMT 167s Content-Length: 506 167s 167s { 167s "status": "valid", 167s "orders": "https://localhost:14000/list-orderz/3eed41f9bed35b56", 167s "key": { 167s "kty": "RSA", 167s "n": "sRnxMYxkVoAuhECYhxVItm40r461lhubi_TDCgh1UPQGrhkMj5c-kw2MRpi4ACUl30HF8ulSBSnj8dtN9iLRTcc8QaXv1MtowjlMFF8esA8DDpasg_MASGzri_VcLEfGlVQsv945Scgj9OS87H2ZKqIhjpUm_uKJYMAjdT0aEUq6d1URxgfrTuXid1N9ECYJit95afDkxsVsDLb9L3ACov0OoAP-W6Faf_5vutNsg_s4Asox26SdsyMqGGpipelp4rlC9XRxKvgS8F5UFFXdHlzy7upz4P7K63oaDAzIzWLKL4HKbRGwIVO3JKtyNOxsRa8Osl8kkJvafXdDho3swQ", 167s "e": "AQAB" 167s } 167s } 167s Storing nonce: QQ6ikjUUAltIIB8E81GWUA 167s Notifying user: Account registered. 167s Picked account: )>), contact=(), agreement=None, status='valid', terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://localhost:14000/my-account/3eed41f9bed35b56', new_authzr_uri=None, terms_of_service=None), 205067543ea1184ff35231522fa16958, Meta(creation_dt=datetime.datetime(2026, 2, 5, 15, 55, 41, tzinfo=), creation_host='autopkgtest.local', register_to_eff=None))> 167s Notifying user: Requesting a certificate for localhost 167s JWS payload: 167s b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "localhost"\n }\n ]\n}' 167s Sending POST request to https://localhost:14000/order-plz: 167s { 167s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvM2VlZDQxZjliZWQzNWI1NiIsICJub25jZSI6ICJRUTZpa2pVVUFsdElJQjhFODFHV1VBIiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9vcmRlci1wbHoifQ", 167s "signature": "kUEoR2AHdMdE9QqVZjroysGe8m3mva393AKuzivCRFjH8WZmM3QCREQWDMjPyBj7sHl5srDDzJf4GP4V0jQhTIBmOub4dkcVlBsEcnya7ohV8atPat3qu1zqOqaHv758SngxA6vjI6cixKIZt8ZR90vxOhcklWqFcHnvjUcgJldk7FdVd-krY5itTD8MywRFnEr4u5kIZF0lTTkn23krjk1xw3UaTwKRz9rL2IWkze37YHWmhzewHeqqtkPHY2TUXwq4HSYbETJ865R_LGPR2QcRVl0_J-bWeU56VN9ASIn9y9Mcx34PxzpVNo8o23y_0LtSztxjnF2ER_UmuCUykw", 167s "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImxvY2FsaG9zdCIKICAgIH0KICBdCn0" 167s } 167s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 167s warnings.warn( 167s https://localhost:14000 "POST /order-plz HTTP/1.1" 201 372 167s Received response: 167s HTTP 201 167s Cache-Control: public, max-age=0, no-cache 167s Content-Type: application/json; charset=utf-8 167s Link: ;rel="index" 167s Location: https://localhost:14000/my-order/Dcy12raDBwDM5W2c0qSjMfdYajp84cE0_mWr0p3L3bo 167s Replay-Nonce: A1-w6R6Imel2vkgWmF6O6A 167s Date: Thu, 05 Feb 2026 15:55:41 GMT 167s Content-Length: 372 167s 167s { 167s "status": "pending", 167s "expires": "2026-02-06T15:55:41Z", 167s "identifiers": [ 167s { 167s "type": "dns", 167s "value": "localhost" 167s } 167s ], 167s "finalize": "https://localhost:14000/finalize-order/Dcy12raDBwDM5W2c0qSjMfdYajp84cE0_mWr0p3L3bo", 167s "authorizations": [ 167s "https://localhost:14000/authZ/lHcVm1ksOIvtSKalIMSW9vcnf9E0Vb4zUD-ngjrD_Eg" 167s ] 167s } 167s Storing nonce: A1-w6R6Imel2vkgWmF6O6A 167s JWS payload: 167s b'' 167s Sending POST request to https://localhost:14000/authZ/lHcVm1ksOIvtSKalIMSW9vcnf9E0Vb4zUD-ngjrD_Eg: 167s { 167s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvM2VlZDQxZjliZWQzNWI1NiIsICJub25jZSI6ICJBMS13NlI2SW1lbDJ2a2dXbUY2TzZBIiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9hdXRoWi9sSGNWbTFrc09JdnRTS2FsSU1TVzl2Y25mOUUwVmI0elVELW5nanJEX0VnIn0", 167s "signature": "HMkVAcVi0PegrooF3EO_DwvXNNMLUBV7Nvc1rleb7CJfjVFpKf1i9Oni3At4w4-vDHNOeMAa3j0_PmT0kMi6i5vyrjvdeOu_lgWwOXmfPdaZpiPWwtb5no4iGioOmu3gXLgWBvi1PGIR0tsxNPnLgKvMQKhDRjv0vZk8kJMBhQVnHHf8ko6aFsENcBlhnP6Pmm882b2iWIz7ATu-fX6i4TIC5dByke1wQ3wyEiD1k6AjAtIqvPU_PI8oX2zXv4-wUUNNoA72DOqP-3L_2nIZ-8b5bMxQ2Pu3IQzzT4S7E7vxiyAjCmPzS-bLbVid_C3p3IMilzpyYd_SPmsYNmbtig", 167s "payload": "" 167s } 167s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 167s warnings.warn( 167s https://localhost:14000 "POST /authZ/lHcVm1ksOIvtSKalIMSW9vcnf9E0Vb4zUD-ngjrD_Eg HTTP/1.1" 200 1099 167s Received response: 167s HTTP 200 167s Cache-Control: public, max-age=0, no-cache 167s Content-Type: application/json; charset=utf-8 167s Link: ;rel="index" 167s Replay-Nonce: PqWPECCdMtB06HaXQV6Pig 167s Date: Thu, 05 Feb 2026 15:55:41 GMT 167s Content-Length: 1099 167s 167s { 167s "status": "pending", 167s "identifier": { 167s "type": "dns", 167s "value": "localhost" 167s }, 167s "challenges": [ 167s { 167s "type": "tls-alpn-01", 167s "url": "https://localhost:14000/chalZ/LEf6yCnCiCr-wY-CRxNgMJIg6qBHjjRi2BasqICrorY", 167s "token": "6eE1lfJzim7lUWlmyfbOOwZV51k4cGXch-EuKBZ3nYE", 167s "status": "pending" 167s }, 167s { 167s "type": "dns-account-01", 167s "url": "https://localhost:14000/chalZ/kPoDlvbDa6JkYr0l4LiEBlK8LUmEO_rX_DhVBIygVoY", 167s "token": "rOEsE_ebfqR4F2TzpRs6MEvbmiNkDajc-SpXO8dgPd4", 167s "status": "pending" 167s }, 167s { 167s "type": "http-01", 167s "url": "https://localhost:14000/chalZ/CD-vgUp8aOApUv6MPZtAClVs43R8tNHyci9dMnpAVBg", 167s "token": "9deZPbnY2kqPiQZ_RSn_2z_xP0LD6Ccilgqrkbexi2U", 167s "status": "pending" 167s }, 167s { 167s "type": "dns-01", 167s "url": "https://localhost:14000/chalZ/Roy6iaElFFhwDwDWxOIkBIkTT3SbMc894e01ayrmMSI", 167s "token": "6zqVPqMnaSE9VkdmW4p97AkUH3ll2PtJIxV4O0xSp7A", 167s "status": "pending" 167s } 167s ], 167s "expires": "2026-02-05T16:55:41Z" 167s } 167s Storing nonce: PqWPECCdMtB06HaXQV6Pig 167s dns-account-01 was not recognized, full message: {'type': 'dns-account-01', 'url': 'https://localhost:14000/chalZ/kPoDlvbDa6JkYr0l4LiEBlK8LUmEO_rX_DhVBIygVoY', 'token': 'rOEsE_ebfqR4F2TzpRs6MEvbmiNkDajc-SpXO8dgPd4', 'status': 'pending'} 167s Performing the following challenges: 167s http-01 challenge for localhost 167s Generated server block: 167s [] 167s Creating backup of /etc/nginx/mime.types 167s Creating backup of /etc/nginx/sites-enabled/default 167s Creating backup of /etc/nginx/nginx.conf 167s Pebble 2026/02/05 15:55:41 POST /authZ/ -> calling handler() 167s Writing nginx conf tree to /etc/nginx/nginx.conf: 167s user www-data; 167s worker_processes auto; 167s worker_cpu_affinity auto; 167s pid /run/nginx.pid; 167s error_log /var/log/nginx/error.log; 167s include /etc/nginx/modules-enabled/*.conf; 167s 167s events { 167s worker_connections 768; 167s # multi_accept on; 167s } 167s 167s http { 167s server_names_hash_bucket_size 128; 167s include /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/le_http_01_cert_challenge.conf; 167s 167s ## 167s # Basic Settings 167s ## 167s 167s sendfile on; 167s tcp_nopush on; 167s types_hash_max_size 2048; 167s server_tokens build; # Recommended practice is to turn this off 167s 167s # server_names_hash_bucket_size 64; 167s # server_name_in_redirect off; 167s 167s include /etc/nginx/mime.types; 167s default_type application/octet-stream; 167s 167s ## 167s # SSL Settings 167s ## 167s 167s ssl_protocols TLSv1.2 TLSv1.3; # Dropping SSLv3 (POODLE), TLS 1.0, 1.1 167s ssl_prefer_server_ciphers off; # Don't force server cipher order. 167s 167s ## 167s # Logging Settings 167s ## 167s 167s access_log /var/log/nginx/access.log; 167s 167s ## 167s # Gzip Settings 167s ## 167s 167s gzip on; 167s 167s # gzip_vary on; 167s # gzip_proxied any; 167s # gzip_comp_level 6; 167s # gzip_buffers 16 8k; 167s # gzip_http_version 1.1; 167s # gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript; 167s 167s ## 167s # Virtual Host Configs 167s ## 167s 167s include /etc/nginx/conf.d/*.conf; 167s include /etc/nginx/sites-enabled/*; 167s } 167s 167s 167s #mail { 167s # # See sample authentication script at: 167s # # http://wiki.nginx.org/ImapAuthenticateWithApachePhpScript 167s # 167s # # auth_http localhost/auth.php; 167s # # pop3_capabilities "TOP" "USER"; 167s # # imap_capabilities "IMAP4rev1" "UIDPLUS"; 167s # 167s # server { 167s # listen localhost:110; 167s # protocol pop3; 167s # proxy on; 167s # } 167s # 167s # server { 167s # listen localhost:143; 167s # protocol imap; 167s # proxy on; 167s # } 167s #} 167s 167s Writing nginx conf tree to /etc/nginx/sites-enabled/default: 167s ## 167s # You should look at the following URL's in order to grasp a solid understanding 167s # of Nginx configuration files in order to fully unleash the power of Nginx. 167s # https://www.nginx.com/resources/wiki/start/ 167s # https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/ 167s # https://wiki.debian.org/Nginx/DirectoryStructure 167s # 167s # In most cases, administrators will remove this file from sites-enabled/ and 167s # leave it as reference inside of sites-available where it will continue to be 167s # updated by the nginx packaging team. 167s # 167s # This file will automatically load configuration files provided by other 167s # applications, such as Drupal or Wordpress. These applications will be made 167s # available underneath a path with that package name, such as /drupal8. 167s # 167s # Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples. 167s ## 167s 167s # Default server configuration 167s # 167s server { 167s listen 80 default_server; 167s listen [::]:80 default_server; 167s 167s # SSL configuration 167s # 167s # listen 443 ssl default_server; 167s # listen [::]:443 ssl default_server; 167s # 167s # Note: You should disable gzip for SSL traffic. 167s # See: https://bugs.debian.org/773332 167s # 167s # Read up on ssl_ciphers to ensure a secure configuration. 167s # See: https://bugs.debian.org/765782 167s # 167s # Self signed certs generated by the ssl-cert package 167s # Don't use them in a production server! 167s # 167s # include snippets/snakeoil.conf; 167s 167s root /var/www/html; 167s 167s # Add index.php to the list if you are using PHP 167s index index.html index.htm index.nginx-debian.html; 167s 167s server_name _; 167s 167s location / { 167s # First attempt to serve request as file, then 167s # as directory, then fall back to displaying a 404. 167s try_files $uri $uri/ =404; 167s } 167s 167s # pass PHP scripts to FastCGI server 167s # 167s #location ~ \.php$ { 167s # include snippets/fastcgi-php.conf; 167s # 167s # # With php-fpm (or other unix sockets): 167s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 167s # # With php-cgi (or other tcp sockets): 167s # fastcgi_pass 127.0.0.1:9000; 167s #} 167s 167s # deny access to .htaccess files, if Apache's document root 167s # concurs with nginx's one 167s # 167s #location ~ /\.ht { 167s # deny all; 167s #} 167s } 167s 167s 167s # Virtual Host configuration for example.com 167s # 167s # You can move that to a different file under sites-available/ and symlink that 167s # to sites-enabled/ to enable it. 167s # 167s #server { 167s # listen 80; 167s # listen [::]:80; 167s # 167s # server_name example.com; 167s # 167s # root /var/www/example.com; 167s # index index.html; 167s # 167s # location / { 167s # try_files $uri $uri/ =404; 167s # } 167s #} 167s 167s server {rewrite ^(/.well-known/acme-challenge/.*) $1 break; # managed by Certbot 167s 167s 167s listen 80 ; 167s listen [::]:80 ; 167s 167s # SSL configuration 167s # 167s # listen 443 ssl default_server; 167s # listen [::]:443 ssl default_server; 167s # 167s # Note: You should disable gzip for SSL traffic. 167s # See: https://bugs.debian.org/773332 167s # 167s # Read up on ssl_ciphers to ensure a secure configuration. 167s # See: https://bugs.debian.org/765782 167s # 167s # Self signed certs generated by the ssl-cert package 167s # Don't use them in a production server! 167s # 167s # include snippets/snakeoil.conf; 167s 167s root /var/www/html; 167s 167s # Add index.php to the list if you are using PHP 167s index index.html index.htm index.nginx-debian.html; 167s server_name localhost; # managed by Certbot 167s 167s 167s location / { 167s # First attempt to serve request as file, then 167s # as directory, then fall back to displaying a 404. 167s try_files $uri $uri/ =404; 167s } 167s 167s # pass PHP scripts to FastCGI server 167s # 167s #location ~ \.php$ { 167s # include snippets/fastcgi-php.conf; 167s # 167s # # With php-fpm (or other unix sockets): 167s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 167s # # With php-cgi (or other tcp sockets): 167s # fastcgi_pass 127.0.0.1:9000; 167s #} 167s 167s # deny access to .htaccess files, if Apache's document root 167s # concurs with nginx's one 167s # 167s #location ~ /\.ht { 167s # deny all; 167s #} 167s 167s location = /.well-known/acme-challenge/9deZPbnY2kqPiQZ_RSn_2z_xP0LD6Ccilgqrkbexi2U{default_type text/plain;return 200 9deZPbnY2kqPiQZ_RSn_2z_xP0LD6Ccilgqrkbexi2U.o0qVbBXg3LJNvwIT1n-WhqkdEA9ppPt2QBDjLdZeb5o;} # managed by Certbot 167s 167s } 168s JWS payload: 168s b'{}' 168s Sending POST request to https://localhost:14000/chalZ/CD-vgUp8aOApUv6MPZtAClVs43R8tNHyci9dMnpAVBg: 168s { 168s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvM2VlZDQxZjliZWQzNWI1NiIsICJub25jZSI6ICJQcVdQRUNDZE10QjA2SGFYUVY2UGlnIiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9jaGFsWi9DRC12Z1VwOGFPQXBVdjZNUFp0QUNsVnM0M1I4dE5IeWNpOWRNbnBBVkJnIn0", 168s "signature": "YKqRRym1YjRngmuD5qe_twnaXCuIbcG0IQtm4tr6CMGLc_pVtc-7pLPmLsl3hXsfhxVFzs9gSlFjEVUOGvFYBVmjyop3FJW-5O-4pMZwPU23oMGHiTSEDNUjT082EakxTXV5s5ASv5trCyUUyyKM8cbk8zNpjx7L0YcNgknd0ojQLK-a3cCzm0IFlhftTcIgJB8cmj-Y8LdPhttJy1eEDMftR3O0y8vacQxJvBOB4z6uKkSHWILvz0dhDuJDyY1V8lFPXhLOKRmLfieZlCyF8VZHFEytpkQFhHvAZcj9qqO211xwNO-PpGGnnSDZqGm-_Lx8VaNSPRcNe3OM4No5mg", 168s "payload": "e30" 168s } 168s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 168s warnings.warn( 168s Pebble 2026/02/05 15:55:42 POST /chalZ/ -> calling handler() 168s Pebble 2026/02/05 15:55:42 Pulled a task from the Tasks queue: &va.vaTask{Identifier:acme.Identifier{Type:"dns", Value:"localhost"}, Challenge:(*core.Challenge)(0x400008d2c0), Account:(*core.Account)(0x400007fd40), AccountURL:"https://localhost:14000/my-account/3eed41f9bed35b56", Wildcard:false} 168s Pebble 2026/02/05 15:55:42 Starting 3 validations. 168s Pebble 2026/02/05 15:55:42 Attempting to validate w/ HTTP: http://localhost:80/.well-known/acme-challenge/9deZPbnY2kqPiQZ_RSn_2z_xP0LD6Ccilgqrkbexi2U 168s Pebble 2026/02/05 15:55:42 Attempting to validate w/ HTTP: http://localhost:80/.well-known/acme-challenge/9deZPbnY2kqPiQZ_RSn_2z_xP0LD6Ccilgqrkbexi2U 168s Pebble 2026/02/05 15:55:42 Attempting to validate w/ HTTP: http://localhost:80/.well-known/acme-challenge/9deZPbnY2kqPiQZ_RSn_2z_xP0LD6Ccilgqrkbexi2U 168s https://localhost:14000 "POST /chalZ/CD-vgUp8aOApUv6MPZtAClVs43R8tNHyci9dMnpAVBg HTTP/1.1" 200 197 168s Received response: 168s HTTP 200 168s Cache-Control: public, max-age=0, no-cache 168s Content-Type: application/json; charset=utf-8 168s Link: ;rel="index", ;rel="up" 168s Replay-Nonce: Md1_sJb5mBkLcsJbUMd8UA 168s Date: Thu, 05 Feb 2026 15:55:42 GMT 168s Content-Length: 197 168s 168s { 168s "type": "http-01", 168s "url": "https://localhost:14000/chalZ/CD-vgUp8aOApUv6MPZtAClVs43R8tNHyci9dMnpAVBg", 168s "token": "9deZPbnY2kqPiQZ_RSn_2z_xP0LD6Ccilgqrkbexi2U", 168s "status": "processing" 168s } 168s Storing nonce: Md1_sJb5mBkLcsJbUMd8UA 168s Waiting for verification... 168s Pebble 2026/02/05 15:55:42 authz lHcVm1ksOIvtSKalIMSW9vcnf9E0Vb4zUD-ngjrD_Eg set VALID by completed challenge CD-vgUp8aOApUv6MPZtAClVs43R8tNHyci9dMnpAVBg 169s Pebble 2026/02/05 15:55:43 POST /authZ/ -> calling handler() 169s JWS payload: 169s b'' 169s Sending POST request to https://localhost:14000/authZ/lHcVm1ksOIvtSKalIMSW9vcnf9E0Vb4zUD-ngjrD_Eg: 169s { 169s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvM2VlZDQxZjliZWQzNWI1NiIsICJub25jZSI6ICJNZDFfc0piNW1Ca0xjc0piVU1kOFVBIiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9hdXRoWi9sSGNWbTFrc09JdnRTS2FsSU1TVzl2Y25mOUUwVmI0elVELW5nanJEX0VnIn0", 169s "signature": "J02zRHlqgEtvtknDsSo20YdEevia_xzcOvxgw3hHmuCtiHuFeT4siDn9sLGWaZVfj8cS-wanMciPMkwaPCRzOdOscEeOW0uoG2_daOWqPuv2X6enbdxlsdqhcGMElMndpUHuyf49Is8dvIa78DUAGcHApf3gbk1LPTHcWlGwYoKSu-RL_lOrKxI2zD3nEdSNyBIq9scOmWsbvsawFMBA8DmZ-68rA9sQhd4ynZJJtcQBiqN8KuMkQ1i62dCQrnvfxBJG4xCgzIn4j29Ifm2bsu6nLRXICKVHU35YUGjlJdh4wPYPzxMO8GE11giuZG_jSUWFh1F2r69s5DzWAJHckg", 169s "payload": "" 169s } 169s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 169s warnings.warn( 169s https://localhost:14000 "POST /authZ/lHcVm1ksOIvtSKalIMSW9vcnf9E0Vb4zUD-ngjrD_Eg HTTP/1.1" 200 435 169s Received response: 169s HTTP 200 169s Cache-Control: public, max-age=0, no-cache 169s Content-Type: application/json; charset=utf-8 169s Link: ;rel="index" 169s Replay-Nonce: Gb_QxjGTuHR7D5-my1peNw 169s Date: Thu, 05 Feb 2026 15:55:43 GMT 169s Content-Length: 435 169s 169s { 169s "status": "valid", 169s "identifier": { 169s "type": "dns", 169s "value": "localhost" 169s }, 169s "challenges": [ 169s { 169s "type": "http-01", 169s "url": "https://localhost:14000/chalZ/CD-vgUp8aOApUv6MPZtAClVs43R8tNHyci9dMnpAVBg", 169s "token": "9deZPbnY2kqPiQZ_RSn_2z_xP0LD6Ccilgqrkbexi2U", 169s "status": "valid", 169s "validated": "2026-02-05T15:55:42Z" 169s } 169s ], 169s "expires": "2026-02-05T16:55:42Z" 169s } 169s Storing nonce: Gb_QxjGTuHR7D5-my1peNw 169s Calling registered functions 169s Cleaning up challenges 171s CSR: CSR(file=None, data=b'-----BEGIN CERTIFICATE REQUEST-----\nMIHjMIGJAgEAMAAwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQ/PgZ0Lc7bykau\nNgUwQVG0zX2zD/+nI3cWUC0/gkollzZpDrrqsqm8GFOdLx9KIwE4BiyNwHy6TFvb\nYmMbZiVBoCcwJQYJKoZIhvcNAQkOMRgwFjAUBgNVHREEDTALgglsb2NhbGhvc3Qw\nCgYIKoZIzj0EAwIDSQAwRgIhAMwh+gtqyk88yW++wSYHqu5AU7/YUDD90JWxBBSp\nXpmUAiEAuNE1cl2lBRWlqx3/zFf/VP6zKiyCp/QQ4c001z5r9k4=\n-----END CERTIFICATE REQUEST-----\n', form='pem') 171s Will poll for certificate issuance until 2026-02-05 15:57:14.752722 171s JWS payload: 171s b'{\n "csr": "MIHjMIGJAgEAMAAwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQ_PgZ0Lc7bykauNgUwQVG0zX2zD_-nI3cWUC0_gkollzZpDrrqsqm8GFOdLx9KIwE4BiyNwHy6TFvbYmMbZiVBoCcwJQYJKoZIhvcNAQkOMRgwFjAUBgNVHREEDTALgglsb2NhbGhvc3QwCgYIKoZIzj0EAwIDSQAwRgIhAMwh-gtqyk88yW--wSYHqu5AU7_YUDD90JWxBBSpXpmUAiEAuNE1cl2lBRWlqx3_zFf_VP6zKiyCp_QQ4c001z5r9k4"\n}' 171s Sending POST request to https://localhost:14000/finalize-order/Dcy12raDBwDM5W2c0qSjMfdYajp84cE0_mWr0p3L3bo: 171s { 171s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvM2VlZDQxZjliZWQzNWI1NiIsICJub25jZSI6ICJHYl9ReGpHVHVIUjdENS1teTFwZU53IiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9maW5hbGl6ZS1vcmRlci9EY3kxMnJhREJ3RE01VzJjMHFTak1mZFlhanA4NGNFMF9tV3IwcDNMM2JvIn0", 171s "signature": "Wdwx6qf3AXEsFxY0w7jnWF50eCL__OXGzv4NXosOi2XvCH4LpcW_A_2YWmqOXcd6XF34zlyVG32jJI7c3dyXEg6UVg5DSPDud8o5hg6EC2KO5sXAoCoy0ut1Tird-H8OyL-kaxDqhWCfmsQWETExZ6ffJDvQ9Kch9qtMqD2dZ4d2jJUBQ1CGTg_t10NYtlsyuhUztzL31zqShrHntdOX2-fVs20vfSEZnLtNj8_JbgzcsCBfm-y3vsqpoPFG_XKcjz9oBveMLzSq6ozzN0xm34dLvx4r-OqAsFrR8Ka1BUGBcFxXi8umulW4Uu9nyie_oj4lkazZqgRO9GOurajnag", 171s "payload": "ewogICJjc3IiOiAiTUlIak1JR0pBZ0VBTUFBd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFRX1BnWjBMYzdieWthdU5nVXdRVkcwelgyekRfLW5JM2NXVUMwX2drb2xselpwRHJycXNxbThHRk9kTHg5S0l3RTRCaXlOd0h5NlRGdmJZbU1iWmlWQm9DY3dKUVlKS29aSWh2Y05BUWtPTVJnd0ZqQVVCZ05WSFJFRURUQUxnZ2xzYjJOaGJHaHZjM1F3Q2dZSUtvWkl6ajBFQXdJRFNRQXdSZ0loQU13aC1ndHF5azg4eVctLXdTWUhxdTVBVTdfWVVERDkwSld4QkJTcFhwbVVBaUVBdU5FMWNsMmxCUldscXgzX3pGZl9WUDZ6S2l5Q3BfUVE0YzAwMXo1cjlrNCIKfQ" 171s } 171s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 171s warnings.warn( 171s Pebble 2026/02/05 15:55:44 POST /finalize-order/ -> calling handler() 171s Pebble 2026/02/05 15:55:44 Order Dcy12raDBwDM5W2c0qSjMfdYajp84cE0_mWr0p3L3bo is fully authorized. Processing finalization 171s https://localhost:14000 "POST /finalize-order/Dcy12raDBwDM5W2c0qSjMfdYajp84cE0_mWr0p3L3bo HTTP/1.1" 200 375 171s Received response: 171s HTTP 200 171s Cache-Control: public, max-age=0, no-cache 171s Content-Type: application/json; charset=utf-8 171s Link: ;rel="index" 171s Location: https://localhost:14000/my-order/Dcy12raDBwDM5W2c0qSjMfdYajp84cE0_mWr0p3L3bo 171s Replay-Nonce: yAU2JZ4wdPfsRTgfB_T9bA 171s Date: Thu, 05 Feb 2026 15:55:44 GMT 171s Content-Length: 375 171s 171s { 171s "status": "processing", 171s "expires": "2026-02-06T15:55:41Z", 171s "identifiers": [ 171s { 171s "type": "dns", 171s "value": "localhost" 171s } 171s ], 171s "finalize": "https://localhost:14000/finalize-order/Dcy12raDBwDM5W2c0qSjMfdYajp84cE0_mWr0p3L3bo", 171s "authorizations": [ 171s "https://localhost:14000/authZ/lHcVm1ksOIvtSKalIMSW9vcnf9E0Vb4zUD-ngjrD_Eg" 171s ] 171s } 171s Storing nonce: yAU2JZ4wdPfsRTgfB_T9bA 171s Pebble 2026/02/05 15:55:44 Issued certificate serial 7812577b1755fbdc for order Dcy12raDBwDM5W2c0qSjMfdYajp84cE0_mWr0p3L3bo 172s JWS payload: 172s b'' 172s Sending POST request to https://localhost:14000/my-order/Dcy12raDBwDM5W2c0qSjMfdYajp84cE0_mWr0p3L3bo: 172s { 172s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvM2VlZDQxZjliZWQzNWI1NiIsICJub25jZSI6ICJ5QVUySlo0d2RQZnNSVGdmQl9UOWJBIiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9teS1vcmRlci9EY3kxMnJhREJ3RE01VzJjMHFTak1mZFlhanA4NGNFMF9tV3IwcDNMM2JvIn0", 172s "signature": "JaUYOcZ3nLbx6bhcCc_YI8lXzNlZAnj_j5ZN5eemQpw6dr-0Qn-CROtu3qWKl0lkKO29e-OKnXnIMYjE3zRFjnUe-IQkRUoJ99MoYayAuiXib2doTzRhjr0yRLm74FKn3CsbOyBooVwhr9HobrJPgXfsAogsGPvZQ5TS7iOWpZvGHKQxYvNk_ysNpxuN6ESqG1YrEMKgoo83bwcpVPlhMcDGI61k_vzi_k15WDlfepr_tXOoe6PHq2PN-7vx6T1gug9NsA0Ekl03B-LL_3JKfZRW10U4gBHwmTURm_kiKOVuxa7G5Z4HVZXRi3Vccs4lN8RjSIFe93fAdMCWERI4xg", 172s "payload": "" 172s } 172s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 172s warnings.warn( 172s Pebble 2026/02/05 15:55:45 POST /my-order/ -> calling handler() 172s https://localhost:14000 "POST /my-order/Dcy12raDBwDM5W2c0qSjMfdYajp84cE0_mWr0p3L3bo HTTP/1.1" 200 438 172s Received response: 172s HTTP 200 172s Cache-Control: public, max-age=0, no-cache 172s Content-Type: application/json; charset=utf-8 172s Link: ;rel="index" 172s Replay-Nonce: fkn5Hr9wpO449Qo4FMsppQ 172s Date: Thu, 05 Feb 2026 15:55:45 GMT 172s Content-Length: 438 172s 172s { 172s "status": "valid", 172s "expires": "2026-02-06T15:55:41Z", 172s "identifiers": [ 172s { 172s "type": "dns", 172s "value": "localhost" 172s } 172s ], 172s "finalize": "https://localhost:14000/finalize-order/Dcy12raDBwDM5W2c0qSjMfdYajp84cE0_mWr0p3L3bo", 172s "authorizations": [ 172s "https://localhost:14000/authZ/lHcVm1ksOIvtSKalIMSW9vcnf9E0Vb4zUD-ngjrD_Eg" 172s ], 172s "certificate": "https://localhost:14000/certZ/7812577b1755fbdc" 172s } 172s Storing nonce: fkn5Hr9wpO449Qo4FMsppQ 172s JWS payload: 172s b'' 172s Pebble 2026/02/05 15:55:45 POST /certZ/ -> calling handler() 172s Sending POST request to https://localhost:14000/certZ/7812577b1755fbdc: 172s { 172s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvM2VlZDQxZjliZWQzNWI1NiIsICJub25jZSI6ICJma241SHI5d3BPNDQ5UW80Rk1zcHBRIiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9jZXJ0Wi83ODEyNTc3YjE3NTVmYmRjIn0", 172s "signature": "nin4AXTttalZArG84xjuTjSw628ugt4bBh6pmI2mOYRO0ao69OEuQKQs6IP2jHIldnz3e5Xx5gYDA7uUbwC28qBE_K9uBHMire3Ccr9r0HVKSKOyIjuQ_9kRNGJIQwyd2qcM21oNwBcS55p8UyrweH0ThPOTYuJPdBEYFexLabdQdm2s3V10ujnoh2v3gY4baL74MmvXP7KJ8hYdpxsnrPoJmQlp-rvvB3K8eadodS3pHd8L32rHZnIw2sUMVYfKuG-cfAJL9teal9eT1pW9KohM5xdFJ5EE2Omkx3yvtRSkTIzcekQyNO8NSvIGyWDijSxtn9UisJaTvtRnEssnFA", 172s "payload": "" 172s } 172s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 172s warnings.warn( 172s https://localhost:14000 "POST /certZ/7812577b1755fbdc HTTP/1.1" 200 None 172s Received response: 172s HTTP 200 172s Cache-Control: public, max-age=0, no-cache 172s Content-Type: application/pem-certificate-chain; charset=utf-8 172s Link: ;rel="index" 172s Replay-Nonce: -zXMKfnoHPduOXBSS2Indw 172s Date: Thu, 05 Feb 2026 15:55:45 GMT 172s Transfer-Encoding: chunked 172s 172s -----BEGIN CERTIFICATE----- 172s MIICeTCCAWGgAwIBAgIIeBJXexdV+9wwDQYJKoZIhvcNAQELBQAwKDEmMCQGA1UE 172s AxMdUGViYmxlIEludGVybWVkaWF0ZSBDQSA3MzY3OTEwHhcNMjYwMjA1MTU1NTQ0 172s WhcNMzEwMjA1MTU1NTQzWjAAMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEPz4G 172s dC3O28pGrjYFMEFRtM19sw//pyN3FlAtP4JKJZc2aQ666rKpvBhTnS8fSiMBOAYs 172s jcB8ukxb22JjG2YlQaOBmTCBljAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYI 172s KwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFJyggh5P 172s /YPXhOZWIPEqbgpR0xXuMB8GA1UdIwQYMBaAFFZ6SQmKuPcPzLP0jm9GIqnJF6dH 172s MBcGA1UdEQEB/wQNMAuCCWxvY2FsaG9zdDANBgkqhkiG9w0BAQsFAAOCAQEAn1CI 172s ZGVlN7TaKzfVlQ7/Uqn/8qyJPxqSM7xR0WeiuS23sf/quqEkEpsGsQCreQFXihcP 172s 8B3ryikm/j9VZih0Tfw6W1UtUXYtnho6r8CJgYbFuzO2QLk7FZNSjO03Q0gkQLwr 172s SCx5g8/REBNP7na8aoRuwOxKYwFqNvMTQIj+0o0tzV2+db2HScThdpfSLIbQS/Ae 172s kMVmbspYjUPsg6l+bx/8xgKDIxygxc5IDk+WOMKsMP7rb65e7jOBNXQcQjJV3FEE 172s h9yURXDx0NDW0z0XwxaL+ZzQfl/RXzOilEOi0w9A6/5QUI9LeMv9byX+uaok+Hx8 172s Bomo9hmR8MHywbrW7Q== 172s -----END CERTIFICATE----- 172s -----BEGIN CERTIFICATE----- 172s MIIDUDCCAjigAwIBAgIIX7iisX3CY/8wDQYJKoZIhvcNAQELBQAwIDEeMBwGA1UE 172s AxMVUGViYmxlIFJvb3QgQ0EgNGIyMWFlMCAXDTI2MDIwNTE1NTU0MFoYDzIwNTYw 172s MjA1MTU1NTQwWjAoMSYwJAYDVQQDEx1QZWJibGUgSW50ZXJtZWRpYXRlIENBIDcz 172s Njc5MTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOR7n+qI/wBqX9/m 172s MQ1bcmDNd8YxeV45jIpp/dAF2668dUz87r2ftFYyjkiaTlBJC0hROg+gXS4qRcQe 172s h44zXMiyaqPecyz/hZVJ7hmC+TkrCzoiL4nv64n+R2v6/yrmGxE7lFNwuoNajIoQ 172s sRdiJnpgetgVYrgCnKcyhxq73fTDBSbRLDy0vPgJbRpbZpvri+KyVH8q5eoa5B6V 172s YaaQIyZXe4hb7jc27L00CGfX9npK4fO691uxTnkBJScne780N23Y8hYjX4LXgyxf 172s 1BL/wSLxtWIOfKyhp7HFM5dUVi9dsNAkAdInJ57hlrNHlB6G5PWmLPAh78lP+xzw 172s HXlAUcECAwEAAaOBgzCBgDAOBgNVHQ8BAf8EBAMCAoQwHQYDVR0lBBYwFAYIKwYB 172s BQUHAwEGCCsGAQUFBwMCMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFFZ6SQmK 172s uPcPzLP0jm9GIqnJF6dHMB8GA1UdIwQYMBaAFEdB4w9zldoIh5htvyVX4vLmoHVn 172s MA0GCSqGSIb3DQEBCwUAA4IBAQBYpHVhDkxI8BONNbMr41cs5hS1FmY3yICj/PTV 172s 0y9oRk2SaKp0wGYloBJQmdv9rbUvO/ur6IBCdJjglMOXSUpUjLnYGWcsRXD7tqz+ 172s naxW1eSGbNYu01EE+1xC7gVM6yFF+T4Evp7Qj3STtqFV3vKq0xxQ+bGYF1xsnqJU 172s AoXg1ZA2e0MCnTa1fR0QoPx47XB0gU9cLKyilOGh/jjj/IPtVzONWctLL+wFiMpG 172s kACsFKFFGG6ZoeANUr+B++hqaB6SztOum3FDHuYy5HmOtA2q6lDKGfwFBUu8/TND 172s Vp4cUbO50jNOGMuYic9yoeFjjZC3lcUtgs8QPSBBybK+673J 172s -----END CERTIFICATE----- 172s 172s Storing nonce: -zXMKfnoHPduOXBSS2Indw 172s Non-standard path(s), might not work with crontab installed by your operating system package manager 172s Creating directory /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/archive. 172s Creating directory /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/live. 172s Writing README to /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/live/README. 172s Creating directory /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/archive/localhost. 172s Creating directory /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/live/localhost. 172s Writing certificate to /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/live/localhost/cert.pem. 172s Writing private key to /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/live/localhost/privkey.pem. 172s Writing chain to /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/live/localhost/chain.pem. 172s 172s Successfully received certificate. 172s Certificate is saved at: /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/live/localhost/fullchain.pem 172s Key is saved at: /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/live/localhost/privkey.pem 172s This certificate expires on 2031-02-05. 172s These files will be updated when the certificate renews. 172s Certbot has set up a scheduled task to automatically renew this certificate in the background. 172s 172s Deploying certificate 172s Writing full chain to /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/live/localhost/fullchain.pem. 172s Writing README to /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/live/localhost/README. 172s Var account=205067543ea1184ff35231522fa16958 (set by user). 172s Var config_dir=/tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf (set by user). 172s Var work_dir=/tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/work (set by user). 172s Var logs_dir=/tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/logs (set by user). 172s Var server=https://localhost:14000/dir (set by user). 172s Requested authenticator nginx and installer nginx 172s Requested authenticator nginx and installer nginx 172s Writing new config /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/renewal/localhost.conf. 172s Notifying user: 172s Successfully received certificate. 172s Certificate is saved at: /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/live/localhost/fullchain.pem 172s Key is saved at: /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/live/localhost/privkey.pem 172s This certificate expires on 2031-02-05. 172s These files will be updated when the certificate renews. 172s Certbot has set up a scheduled task to automatically renew this certificate in the background. 172s 172s Notifying user: Deploying certificate 172s Generating RSA key (2048 bits): /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/work/snakeoil/0000_key.pem 172s Successfully deployed certificate for localhost to /etc/nginx/sites-enabled/default 172s Deploying Certificate to VirtualHost /etc/nginx/sites-enabled/default 172s Notifying user: Successfully deployed certificate for localhost to /etc/nginx/sites-enabled/default 172s Creating backup of /etc/nginx/mime.types 172s Creating backup of /etc/nginx/sites-enabled/default 172s Creating backup of /etc/nginx/nginx.conf 172s Writing nginx conf tree to /etc/nginx/sites-enabled/default: 172s ## 172s # You should look at the following URL's in order to grasp a solid understanding 172s # of Nginx configuration files in order to fully unleash the power of Nginx. 172s # https://www.nginx.com/resources/wiki/start/ 172s # https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/ 172s # https://wiki.debian.org/Nginx/DirectoryStructure 172s # 172s # In most cases, administrators will remove this file from sites-enabled/ and 172s # leave it as reference inside of sites-available where it will continue to be 172s # updated by the nginx packaging team. 172s # 172s # This file will automatically load configuration files provided by other 172s # applications, such as Drupal or Wordpress. These applications will be made 172s # available underneath a path with that package name, such as /drupal8. 172s # 172s # Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples. 172s ## 172s 172s # Default server configuration 172s # 172s server { 172s listen 80 default_server; 172s listen [::]:80 default_server; 172s 172s # SSL configuration 172s # 172s # listen 443 ssl default_server; 172s # listen [::]:443 ssl default_server; 172s # 172s # Note: You should disable gzip for SSL traffic. 172s # See: https://bugs.debian.org/773332 172s # 172s # Read up on ssl_ciphers to ensure a secure configuration. 172s # See: https://bugs.debian.org/765782 172s # 172s # Self signed certs generated by the ssl-cert package 172s # Don't use them in a production server! 172s # 172s # include snippets/snakeoil.conf; 172s 172s root /var/www/html; 172s 172s # Add index.php to the list if you are using PHP 172s index index.html index.htm index.nginx-debian.html; 172s 172s server_name _; 172s 172s location / { 172s # First attempt to serve request as file, then 172s # as directory, then fall back to displaying a 404. 172s try_files $uri $uri/ =404; 172s } 172s 172s # pass PHP scripts to FastCGI server 172s # 172s #location ~ \.php$ { 172s # include snippets/fastcgi-php.conf; 172s # 172s # # With php-fpm (or other unix sockets): 172s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 172s # # With php-cgi (or other tcp sockets): 172s # fastcgi_pass 127.0.0.1:9000; 172s #} 172s 172s # deny access to .htaccess files, if Apache's document root 172s # concurs with nginx's one 172s # 172s #location ~ /\.ht { 172s # deny all; 172s #} 172s } 172s 172s 172s # Virtual Host configuration for example.com 172s # 172s # You can move that to a different file under sites-available/ and symlink that 172s # to sites-enabled/ to enable it. 172s # 172s #server { 172s # listen 80; 172s # listen [::]:80; 172s # 172s # server_name example.com; 172s # 172s # root /var/www/example.com; 172s # index index.html; 172s # 172s # location / { 172s # try_files $uri $uri/ =404; 172s # } 172s #} 172s 172s server { 172s listen 80 ; 172s listen [::]:80 ; 172s 172s # SSL configuration 172s # 172s # listen 443 ssl default_server; 172s # listen [::]:443 ssl default_server; 172s # 172s # Note: You should disable gzip for SSL traffic. 172s # See: https://bugs.debian.org/773332 172s # 172s # Read up on ssl_ciphers to ensure a secure configuration. 172s # See: https://bugs.debian.org/765782 172s # 172s # Self signed certs generated by the ssl-cert package 172s # Don't use them in a production server! 172s # 172s # include snippets/snakeoil.conf; 172s 172s root /var/www/html; 172s 172s # Add index.php to the list if you are using PHP 172s index index.html index.htm index.nginx-debian.html; 172s server_name localhost; # managed by Certbot 172s 172s 172s location / { 172s # First attempt to serve request as file, then 172s # as directory, then fall back to displaying a 404. 172s try_files $uri $uri/ =404; 172s } 172s 172s # pass PHP scripts to FastCGI server 172s # 172s #location ~ \.php$ { 172s # include snippets/fastcgi-php.conf; 172s # 172s # # With php-fpm (or other unix sockets): 172s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 172s # # With php-cgi (or other tcp sockets): 172s # fastcgi_pass 127.0.0.1:9000; 172s #} 172s 172s # deny access to .htaccess files, if Apache's document root 172s # concurs with nginx's one 172s # 172s #location ~ /\.ht { 172s # deny all; 172s #} 172s 172s 172s listen 443 ssl; # managed by Certbot 172s listen [::]:443 ssl ipv6only=on; # managed by Certbot 172s ssl_certificate /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/live/localhost/fullchain.pem; # managed by Certbot 172s ssl_certificate_key /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/live/localhost/privkey.pem; # managed by Certbot 172s include /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/options-ssl-nginx.conf; # managed by Certbot 172s ssl_dhparam /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/ssl-dhparams.pem; # managed by Certbot 172s 172s } 172s Writing nginx conf tree to /etc/nginx/sites-enabled/default: 172s ## 172s # You should look at the following URL's in order to grasp a solid understanding 172s # of Nginx configuration files in order to fully unleash the power of Nginx. 172s # https://www.nginx.com/resources/wiki/start/ 172s # https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/ 172s # https://wiki.debian.org/Nginx/DirectoryStructure 172s # 172s # In most cases, administrators will remove this file from sites-enabled/ and 172s # leave it as reference inside of sites-available where it will continue to be 172s # updated by the nginx packaging team. 172s # 172s # This file will automatically load configuration files provided by other 172s # applications, such as Drupal or Wordpress. These applications will be made 172s # available underneath a path with that package name, such as /drupal8. 172s # 172s # Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples. 172s ## 172s 172s # Default server configuration 172s # 172s server { 172s listen 80 default_server; 172s listen [::]:80 default_server; 172s 172s # SSL configuration 172s # 172s # listen 443 ssl default_server; 172s # listen [::]:443 ssl default_server; 172s # 172s # Note: You should disable gzip for SSL traffic. 172s # See: https://bugs.debian.org/773332 172s # 172s # Read up on ssl_ciphers to ensure a secure configuration. 172s # See: https://bugs.debian.org/765782 172s # 172s # Self signed certs generated by the ssl-cert package 172s # Don't use them in a production server! 172s # 172s # include snippets/snakeoil.conf; 172s 172s root /var/www/html; 172s 172s # Add index.php to the list if you are using PHP 172s index index.html index.htm index.nginx-debian.html; 172s 172s server_name _; 172s 172s location / { 172s # First attempt to serve request as file, then 172s # as directory, then fall back to displaying a 404. 172s try_files $uri $uri/ =404; 172s } 172s 172s # pass PHP scripts to FastCGI server 172s # 172s #location ~ \.php$ { 172s # include snippets/fastcgi-php.conf; 172s # 172s # # With php-fpm (or other unix sockets): 172s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 172s # # With php-cgi (or other tcp sockets): 172s # fastcgi_pass 127.0.0.1:9000; 172s #} 172s 172s # deny access to .htaccess files, if Apache's document root 172s # concurs with nginx's one 172s # 172s #location ~ /\.ht { 172s # deny all; 172s #} 172s } 172s 172s 172s # Virtual Host configuration for example.com 172s # 172s # You can move that to a different file under sites-available/ and symlink that 172s # to sites-enabled/ to enable it. 172s # 172s #server { 172s # listen 80; 172s # listen [::]:80; 172s # 172s # server_name example.com; 172s # 172s # root /var/www/example.com; 172s # index index.html; 172s # 172s # location / { 172s # try_files $uri $uri/ =404; 172s # } 172s #} 172s 172s server { 172s listen 80 ; 172s listen [::]:80 ; 172s 172s # SSL configuration 172s # 172s # listen 443 ssl default_server; 172s # listen [::]:443 ssl default_server; 172s # 172s # Note: You should disable gzip for SSL traffic. 172s # See: https://bugs.debian.org/773332 172s # 172s # Read up on ssl_ciphers to ensure a secure configuration. 172s # See: https://bugs.debian.org/765782 172s # 172s # Self signed certs generated by the ssl-cert package 172s # Don't use them in a production server! 172s # 172s # include snippets/snakeoil.conf; 172s 172s root /var/www/html; 172s 172s # Add index.php to the list if you are using PHP 172s index index.html index.htm index.nginx-debian.html; 172s server_name localhost; # managed by Certbot 172s 172s 172s location / { 172s # First attempt to serve request as file, then 172s # as directory, then fall back to displaying a 404. 172s try_files $uri $uri/ =404; 172s } 172s 172s # pass PHP scripts to FastCGI server 172s # 172s #location ~ \.php$ { 172s # include snippets/fastcgi-php.conf; 172s # 172s # # With php-fpm (or other unix sockets): 172s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 172s # # With php-cgi (or other tcp sockets): 172s # fastcgi_pass 127.0.0.1:9000; 172s #} 172s 172s # deny access to .htaccess files, if Apache's document root 172s # concurs with nginx's one 172s # 172s #location ~ /\.ht { 172s # deny all; 172s #} 172s 172s 172s listen 443 ssl; # managed by Certbot 172s listen [::]:443 ssl ipv6only=on; # managed by Certbot 172s ssl_certificate /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/live/localhost/fullchain.pem; # managed by Certbot 172s ssl_certificate_key /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/live/localhost/privkey.pem; # managed by Certbot 172s include /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/options-ssl-nginx.conf; # managed by Certbot 172s ssl_dhparam /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/ssl-dhparams.pem; # managed by Certbot 172s 172s } 173s Notifying user: Congratulations! You have successfully enabled HTTPS on https://localhost 173s Congratulations! You have successfully enabled HTTPS on https://localhost 173s 173s - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 173s If you like Certbot, please consider supporting our work by: 173s * Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate 173s * Donating to EFF: https://eff.org/donate-le 173s - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 173s Notifying user: If you like Certbot, please consider supporting our work by: 173s * Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate 173s * Donating to EFF: https://eff.org/donate-le 173s * Uses proxy env variable no_proxy == '127.0.0.1,127.0.1.1,localhost,localdomain' 173s * Host localhost:443 was resolved. 173s * IPv6: ::1 173s * IPv4: 127.0.0.1 173s % Total % Received % Xferd Average Speed Time Time Time Current 173s Dload Upload Total Spent Left Speed 173s 0 0 0 0 0 0 0 0 0* Trying [::1]:443... 173s * ALPN: curl offers h2,http/1.1 173s } [5 bytes data] 173s * TLSv1.3 (OUT), TLS handshake, Client hello (1): 173s } [1564 bytes data] 173s * SSL Trust Anchors: 173s * CAfile: /tmp/autopkgtest.2MQAh6/autopkgtest_tmp/certbot/nginx/conf/live/localhost/chain.pem 173s * CApath: /etc/ssl/certs 173s { [5 bytes data] 173s * TLSv1.3 (IN), TLS handshake, Server hello (2): 173s { [1210 bytes data] 173s * TLSv1.3 (IN), TLS change cipher, Change cipher spec (1): 173s { [1 bytes data] 173s * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): 173s { [25 bytes data] 173s * TLSv1.3 (IN), TLS handshake, Certificate (11): 173s { [1507 bytes data] 173s * TLSv1.3 (IN), TLS handshake, CERT verify (15): 173s { [80 bytes data] 173s * TLSv1.3 (IN), TLS handshake, Finished (20): 173s { [52 bytes data] 173s * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): 173s } [1 bytes data] 173s * TLSv1.3 (OUT), TLS handshake, Finished (20): 173s } [52 bytes data] 173s * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519MLKEM768 / id-ecPublicKey 173s * ALPN: server accepted http/1.1 173s * Server certificate: 173s * subject: 173s * start date: Feb 5 15:55:44 2026 GMT 173s * expire date: Feb 5 15:55:43 2031 GMT 173s * issuer: CN=Pebble Intermediate CA 736791 173s * Certificate level 0: Public key type EC/prime256v1 (256/128 Bits/secBits), signed using sha256WithRSAEncryption 173s * Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption 173s * subjectAltName: "localhost" matches cert's "localhost" 173s * SSL certificate verified via OpenSSL. 173s * Established connection to localhost (::1 port 443) from ::1 port 48480 173s * using HTTP/1.x 173s } [5 bytes data] 173s > GET / HTTP/1.1 173s > Host: localhost 173s > User-Agent: curl/8.18.0 173s > Accept: */* 173s > 173s * Request completely sent off 173s { [5 bytes data] 173s * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): 173s { [57 bytes data] 173s * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): 173s { [57 173s 173s 173s Welcome to nginx! 173s 173s 173s 173s

Welcome to nginx!

173s

If you see this page, the nginx web server is successfully installed and 173s working. Further configuration is required.

173s 173s

For online documentation and support please refer to 173s nginx.org.
173s Commercial support is available at 173s nginx.com.

173s 173s

Thank you for using nginx.

173s 173s 173s bytes data] 173s < HTTP/1.1 200 OK 173s < Server: nginx/1.28.1 (Ubuntu) 173s < Date: Thu, 05 Feb 2026 15:55:47 GMT 173s < Content-Type: text/html 173s < Content-Length: 615 173s < Last-Modified: Thu, 05 Feb 2026 15:55:26 GMT 173s < Connection: keep-alive 173s < ETag: "6984bd6e-267" 173s < Accept-Ranges: bytes 173s < 173s { [615 bytes data] 173s 100 615 100 615 0 0 65565 0 0 100 615 100 615 0 0 65349 0 0 100 615 100 615 0 0 65141 0 0 173s * Connection #0 to host localhost:443 left intact 173s autopkgtest [15:55:47]: test nginx: -----------------------] 174s autopkgtest [15:55:48]: test nginx: - - - - - - - - - - results - - - - - - - - - - 174s nginx PASS 179s autopkgtest [15:55:53]: @@@@@@@@@@@@@@@@@@@@ summary 179s command1 PASS 179s nginx PASS