0s autopkgtest [15:51:54]: starting date and time: 2026-02-05 15:51:54+0000 0s autopkgtest [15:51:54]: git checkout: 508d4a25 a-v-ssh wait_for_ssh: demote "ssh connection failed" to a debug message 0s autopkgtest [15:51:54]: host juju-7f2275-prod-proposed-migration-environment-9; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.htw71t0j/out --timeout-copy=6000 --setup-commands 'ln -s /dev/null /etc/systemd/system/bluetooth.service; printf "http_proxy=http://squid.internal:3128\nhttps_proxy=http://squid.internal:3128\nno_proxy=127.0.0.1,127.0.1.1,localhost,localdomain,internal,login.ubuntu.com,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com,radosgw.ps5.canonical.com\n" >> /etc/environment' --apt-pocket=proposed=src:python-acme,src:sphinx-rtd-theme --apt-upgrade python-certbot-nginx --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=python-acme/4.0.0-2 sphinx-rtd-theme/3.1.0+dfsg-1' -- lxd -r lxd-armhf-10.145.243.56 lxd-armhf-10.145.243.56:autopkgtest/ubuntu/resolute/armhf 23s autopkgtest [15:52:17]: testbed dpkg architecture: armhf 25s autopkgtest [15:52:19]: testbed apt version: 3.1.14 29s autopkgtest [15:52:23]: @@@@@@@@@@@@@@@@@@@@ test bed setup 31s autopkgtest [15:52:25]: testbed release detected to be: None 39s autopkgtest [15:52:33]: updating testbed package index (apt update) 41s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 41s Get:2 http://ftpmaster.internal/ubuntu resolute InRelease [124 kB] 41s Get:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease [124 kB] 42s Get:4 http://ftpmaster.internal/ubuntu resolute-security InRelease [124 kB] 42s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [36.0 kB] 42s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 42s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [230 kB] 42s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1686 kB] 42s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main armhf Packages [256 kB] 42s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe armhf Packages [1372 kB] 43s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse armhf Packages [10.3 kB] 43s Get:12 http://ftpmaster.internal/ubuntu resolute/universe Sources [21.3 MB] 45s Get:13 http://ftpmaster.internal/ubuntu resolute/main Sources [1399 kB] 45s Get:14 http://ftpmaster.internal/ubuntu resolute/main armhf Packages [1374 kB] 45s Get:15 http://ftpmaster.internal/ubuntu resolute/universe armhf Packages [15.3 MB] 49s Fetched 43.4 MB in 8s (5686 kB/s) 50s Reading package lists... 56s autopkgtest [15:52:50]: upgrading testbed (apt dist-upgrade and autopurge) 58s Reading package lists... 58s Building dependency tree... 58s Reading state information... 59s Calculating upgrade... 60s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 62s Reading package lists... 62s Building dependency tree... 62s Reading state information... 62s Solving dependencies... 63s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 65s autopkgtest [15:52:59]: rebooting testbed after setup commands that affected boot 109s autopkgtest [15:53:43]: testbed running kernel: Linux 6.8.0-87-generic #88~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Tue Oct 14 14:00:09 UTC 2 136s autopkgtest [15:54:10]: @@@@@@@@@@@@@@@@@@@@ apt-source python-certbot-nginx 148s Get:1 http://ftpmaster.internal/ubuntu resolute/universe python-certbot-nginx 4.0.0-2 (dsc) [2563 B] 148s Get:2 http://ftpmaster.internal/ubuntu resolute/universe python-certbot-nginx 4.0.0-2 (tar) [79.7 kB] 148s Get:3 http://ftpmaster.internal/ubuntu resolute/universe python-certbot-nginx 4.0.0-2 (diff) [18.4 kB] 148s gpgv: Signature made Sun May 25 15:33:15 2025 UTC 148s gpgv: using RSA key 909B8ECA4FEE6E81034527269B3F22544E9AF451 148s gpgv: issuer "hlieberman@debian.org" 148s gpgv: Can't check signature: No public key 148s dpkg-source: warning: cannot verify inline signature for ./python-certbot-nginx_4.0.0-2.dsc: no acceptable signature found 148s autopkgtest [15:54:22]: testing package python-certbot-nginx version 4.0.0-2 150s autopkgtest [15:54:24]: build not needed 153s autopkgtest [15:54:27]: test command1: preparing testbed 155s Reading package lists... 155s Building dependency tree... 155s Reading state information... 155s Solving dependencies... 156s The following NEW packages will be installed: 156s certbot nginx nginx-common python3-acme python3-certbot 156s python3-certbot-nginx python3-configargparse python3-josepy 156s python3-parsedatetime python3-pytz python3-rfc3339 157s 0 upgraded, 11 newly installed, 0 to remove and 0 not upgraded. 157s Need to get 1183 kB of archives. 157s After this operation, 4179 kB of additional disk space will be used. 157s Get:1 http://ftpmaster.internal/ubuntu resolute/main armhf nginx-common all 1.28.1-2ubuntu1 [44.8 kB] 157s Get:2 http://ftpmaster.internal/ubuntu resolute/main armhf nginx armhf 1.28.1-2ubuntu1 [538 kB] 157s Get:3 http://ftpmaster.internal/ubuntu resolute/universe armhf python3-josepy all 2.2.0-1 [22.3 kB] 157s Get:4 http://ftpmaster.internal/ubuntu resolute/universe armhf python3-pytz all 2025.2-5 [32.4 kB] 157s Get:5 http://ftpmaster.internal/ubuntu resolute/universe armhf python3-rfc3339 all 2.0.1-2 [6530 B] 157s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe armhf python3-acme all 4.0.0-2 [49.3 kB] 157s Get:7 http://ftpmaster.internal/ubuntu resolute/universe armhf python3-configargparse all 1.7-2 [31.7 kB] 158s Get:8 http://ftpmaster.internal/ubuntu resolute/universe armhf python3-parsedatetime all 2.6-3build1 [32.1 kB] 158s Get:9 http://ftpmaster.internal/ubuntu resolute/universe armhf python3-certbot all 4.0.0-2 [267 kB] 158s Get:10 http://ftpmaster.internal/ubuntu resolute/universe armhf certbot all 4.0.0-2 [91.6 kB] 158s Get:11 http://ftpmaster.internal/ubuntu resolute/universe armhf python3-certbot-nginx all 4.0.0-2 [67.4 kB] 158s Preconfiguring packages ... 159s Fetched 1183 kB in 2s (788 kB/s) 159s Selecting previously unselected package nginx-common. 159s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 68395 files and directories currently installed.) 159s Preparing to unpack .../00-nginx-common_1.28.1-2ubuntu1_all.deb ... 159s Unpacking nginx-common (1.28.1-2ubuntu1) ... 159s Selecting previously unselected package nginx. 159s Preparing to unpack .../01-nginx_1.28.1-2ubuntu1_armhf.deb ... 159s Unpacking nginx (1.28.1-2ubuntu1) ... 159s Selecting previously unselected package python3-josepy. 159s Preparing to unpack .../02-python3-josepy_2.2.0-1_all.deb ... 159s Unpacking python3-josepy (2.2.0-1) ... 159s Selecting previously unselected package python3-pytz. 159s Preparing to unpack .../03-python3-pytz_2025.2-5_all.deb ... 159s Unpacking python3-pytz (2025.2-5) ... 159s Selecting previously unselected package python3-rfc3339. 159s Preparing to unpack .../04-python3-rfc3339_2.0.1-2_all.deb ... 159s Unpacking python3-rfc3339 (2.0.1-2) ... 159s Selecting previously unselected package python3-acme. 159s Preparing to unpack .../05-python3-acme_4.0.0-2_all.deb ... 159s Unpacking python3-acme (4.0.0-2) ... 159s Selecting previously unselected package python3-configargparse. 159s Preparing to unpack .../06-python3-configargparse_1.7-2_all.deb ... 159s Unpacking python3-configargparse (1.7-2) ... 159s Selecting previously unselected package python3-parsedatetime. 159s Preparing to unpack .../07-python3-parsedatetime_2.6-3build1_all.deb ... 159s Unpacking python3-parsedatetime (2.6-3build1) ... 159s Selecting previously unselected package python3-certbot. 159s Preparing to unpack .../08-python3-certbot_4.0.0-2_all.deb ... 159s Unpacking python3-certbot (4.0.0-2) ... 159s Selecting previously unselected package certbot. 159s Preparing to unpack .../09-certbot_4.0.0-2_all.deb ... 159s Unpacking certbot (4.0.0-2) ... 159s Selecting previously unselected package python3-certbot-nginx. 160s Preparing to unpack .../10-python3-certbot-nginx_4.0.0-2_all.deb ... 160s Unpacking python3-certbot-nginx (4.0.0-2) ... 160s Setting up python3-configargparse (1.7-2) ... 160s Setting up python3-parsedatetime (2.6-3build1) ... 160s Setting up nginx-common (1.28.1-2ubuntu1) ... 161s Created symlink '/etc/systemd/system/multi-user.target.wants/nginx.service' → '/usr/lib/systemd/system/nginx.service'. 161s Setting up python3-pytz (2025.2-5) ... 161s Setting up python3-josepy (2.2.0-1) ... 162s Setting up python3-rfc3339 (2.0.1-2) ... 162s Setting up nginx (1.28.1-2ubuntu1) ... 162s * Upgrading binary nginx 163s ...done. 163s Setting up python3-acme (4.0.0-2) ... 163s Setting up python3-certbot (4.0.0-2) ... 164s Setting up certbot (4.0.0-2) ... 164s Created symlink '/etc/systemd/system/timers.target.wants/certbot.timer' → '/usr/lib/systemd/system/certbot.timer'. 164s Setting up python3-certbot-nginx (4.0.0-2) ... 165s Processing triggers for man-db (2.13.1-1) ... 166s Processing triggers for ufw (0.36.2-9build1) ... 175s autopkgtest [15:54:49]: test command1: certbot --help nginx | grep -q "sleep-seconds" 175s autopkgtest [15:54:49]: test command1: [----------------------- 178s autopkgtest [15:54:52]: test command1: -----------------------] 183s autopkgtest [15:54:57]: test command1: - - - - - - - - - - results - - - - - - - - - - 183s command1 PASS 187s autopkgtest [15:55:01]: test nginx: preparing testbed 189s Reading package lists... 190s Building dependency tree... 190s Reading state information... 190s Solving dependencies... 191s The following NEW packages will be installed: 191s pebble 191s 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. 191s Need to get 3265 kB of archives. 191s After this operation, 14.9 MB of additional disk space will be used. 191s Get:1 http://ftpmaster.internal/ubuntu resolute/universe armhf pebble armhf 2.6.0+ds1-1build1 [3265 kB] 194s Fetched 3265 kB in 2s (1433 kB/s) 194s Selecting previously unselected package pebble. 194s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 68846 files and directories currently installed.) 194s Preparing to unpack .../pebble_2.6.0+ds1-1build1_armhf.deb ... 194s Unpacking pebble (2.6.0+ds1-1build1) ... 194s Setting up pebble (2.6.0+ds1-1build1) ... 194s Processing triggers for man-db (2.13.1-1) ... 204s autopkgtest [15:55:18]: test nginx: [----------------------- 206s Waiting for pebble to start .Pebble 2026/02/05 15:55:20 Starting Pebble ACME server 206s Pebble 2026/02/05 15:55:20 Generated new root issuer CN=Pebble Root CA 765cd3 with serial 1de7e96c781f78d0 and SKI 81b299ea4e4fda1b74427d86d9741a7a58dbf1c7 206s Pebble 2026/02/05 15:55:20 Generated new intermediate issuer CN=Pebble Intermediate CA 542d84 with serial 5a1a189862dd851c and SKI ae9ea6adc656f4e657685722eae5db00c4075f2c 206s Pebble 2026/02/05 15:55:20 Generated issuance chain: Pebble Root CA 765cd3 -> Pebble Intermediate CA 542d84 206s Pebble 2026/02/05 15:55:20 Using certificate validity period of 157766400 seconds 206s Pebble 2026/02/05 15:55:20 Using system DNS resolver for ACME challenges 206s Pebble 2026/02/05 15:55:20 Disabling random VA sleeps 206s Pebble 2026/02/05 15:55:20 Configured to reject 0% of good nonces 206s Pebble 2026/02/05 15:55:20 Configured to attempt authz reuse for each identifier 50% of the time 206s Pebble 2026/02/05 15:55:20 Configured to show 3 orders per page 206s Pebble 2026/02/05 15:55:20 Management interface listening on: 0.0.0.0:15000 206s Pebble 2026/02/05 15:55:20 Root CA certificate available at: https://0.0.0.0:15000/roots/0 206s Pebble 2026/02/05 15:55:20 Listening on: 0.0.0.0:14000 206s Pebble 2026/02/05 15:55:20 ACME directory available at: https://0.0.0.0:14000/dir 207s .Pebble 2026/02/05 15:55:21 GET /dir -> calling handler() 207s 207s Pebble server started and is ready 207s Root logging level set at 10 207s Saving debug log to /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/logs/letsencrypt.log 207s Requested authenticator nginx and installer nginx 207s Single candidate plugin: * nginx 207s Description: Nginx Web Server plugin 207s Interfaces: Authenticator, Installer, Plugin 207s Entry point: EntryPoint(name='nginx', value='certbot_nginx._internal.configurator:NginxConfigurator', group='certbot.plugins') 207s Initialized: 207s Prep: True 207s Selected authenticator and installer 207s Plugins selected: Authenticator nginx, Installer nginx 208s Sending GET request to https://localhost:14000/dir. 208s Starting new HTTPS connection (1): localhost:14000 208s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 208s warnings.warn( 208s https://localhost:14000 "GET /dir HTTP/1.1" 200 486 208s Received response: 208s HTTP 200 208s Cache-Control: public, max-age=0, no-cache 208s Content-Type: application/json; charset=utf-8 208s Date: Thu, 05 Feb 2026 15:55:22 GMT 208s Content-Length: 486 208s 208s { 208s "keyChange": "https://localhost:14000/rollover-account-key", 208s "meta": { 208s "externalAccountRequired": false, 208s "termsOfService": "data:text/plain,Do%20what%20thou%20wilt" 208s }, 208s "newAccount": "https://localhost:14000/sign-me-up", 208s "newNonce": "https://localhost:14000/nonce-plz", 208s "newOrder": "https://localhost:14000/order-plz", 208s "renewalInfo": "https://localhost:14000/draft-ietf-acme-ari-03/renewalInfo", 208s "revokeCert": "https://localhost:14000/revoke-cert" 208s } 208s Requesting fresh nonce 208s Sending HEAD request to https://localhost:14000/nonce-plz. 208s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 208s warnings.warn( 208s https://localhost:14000 "HEAD /nonce-plz HTTP/1.1" 200 0 208s Pebble 2026/02/05 15:55:22 GET /dir -> calling handler() 208s Pebble 2026/02/05 15:55:22 HEAD /nonce-plz -> calling handler() 208s Received response: 208s HTTP 200 208s Cache-Control: public, max-age=0, no-cache 208s Link: ;rel="index" 208s Replay-Nonce: 3WM_T2R8nGJWkJpQerd07w 208s Date: Thu, 05 Feb 2026 15:55:22 GMT 208s 208s 208s Pebble 2026/02/05 15:55:22 POST /sign-me-up -> calling handler() 208s Pebble 2026/02/05 15:55:22 There are now 1 accounts in memory 208s Account registered. 208s Storing nonce: 3WM_T2R8nGJWkJpQerd07w 208s JWS payload: 208s b'{\n "termsOfServiceAgreed": true\n}' 208s Sending POST request to https://localhost:14000/sign-me-up: 208s { 208s "protected": "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", 208s "signature": "ZthYlVVh-msZGiAgFvPyBrEEvzZLguQSmdLBKlNLELmB3nK7l8ibn-oUOJFzIN8SsYuNqsr6mtLNhx83RHjkczPXio8ZGqJlKQAfTphjRjURd53uQEP9jewf4h1hdQqvIxQaGNSt78G7A8UAXETSFz-Sf-FUCH_HYbP9XyY7WiNAeGc4A-DKIGEpBVLVZgoEbGCebROeAS_dsWt5-tOiFbYndELlJD5KFhOrmEcxWveCT0duOKrpA4m6-MLfPwIqh5CxaaZtoHeQ49rHFFshN8odD70uG5UPaM1agCb6f7MXrSPIjnH0FoDwnqKM3AzJA0bfRtJyF0ib7qKZXZjntw", 208s "payload": "ewogICJ0ZXJtc09mU2VydmljZUFncmVlZCI6IHRydWUKfQ" 208s } 208s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 208s warnings.warn( 208s https://localhost:14000 "POST /sign-me-up HTTP/1.1" 201 506 208s Received response: 208s HTTP 201 208s Cache-Control: public, max-age=0, no-cache 208s Content-Type: application/json; charset=utf-8 208s Link: ;rel="index" 208s Location: https://localhost:14000/my-account/1073310a37f28d52 208s Replay-Nonce: 1ddwWAg6g_rZMfIlyv3jog 208s Date: Thu, 05 Feb 2026 15:55:22 GMT 208s Content-Length: 506 208s 208s { 208s "status": "valid", 208s "orders": "https://localhost:14000/list-orderz/1073310a37f28d52", 208s "key": { 208s "kty": "RSA", 208s "n": "1Y97ZMWZTLWvIkl7uMhxAvLg0y5bdaoxgzKqrQX69g4ZWTWX5CwiNJFVOKQ_wH1lBC_4Wy0e6hHFyqcpQeSVJJ1Q_rMJYQrNg_d5HMCEwT_ngGf_jxHxPWMtVgIiYXNjZcEQfOCB3IATgBmMSktHZl6SnMD1ysGjVKVghaC6Z0h3wmP7xI488kD8meBsg41hKQA-jQnXh8KsC2T6Z0juHXlUSPrWdhqe0xaR8D1CWvD5x5SV4y2vIdk5-D_ctS6HgIErxobwgfjohFd_rQVlM0gKWIqPeOa-otwPWpgUPW0JSQa1ULt3pvCRCfBHsEf-s95mPVuSK0oq4sU8caP2uw", 208s "e": "AQAB" 208s } 208s } 208s Storing nonce: 1ddwWAg6g_rZMfIlyv3jog 208s Notifying user: Account registered. 208s Picked account: )>), contact=(), agreement=None, status='valid', terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://localhost:14000/my-account/1073310a37f28d52', new_authzr_uri=None, terms_of_service=None), eef64035e7df281ca4dd7a579dad5c7e, Meta(creation_dt=datetime.datetime(2026, 2, 5, 15, 55, 22, tzinfo=), creation_host='autopkgtest-lxd-mjppig.lxd', register_to_eff=None))> 208s Notifying user: Requesting a certificate for localhost 208s JWS payload: 208s b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "localhost"\n }\n ]\n}' 208s Sending POST request to https://localhost:14000/order-plz: 208s { 208s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvMTA3MzMxMGEzN2YyOGQ1MiIsICJub25jZSI6ICIxZGR3V0FnNmdfclpNZklseXYzam9nIiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9vcmRlci1wbHoifQ", 208s "signature": "J1ERhcob_UY2nkawtFqomjtbwWVzZYNUDvu9JXdiA53DMwEta_aE_FKMuyhiOdYn3UHG0DOs3INnZwelggmNHoyerMFsGzL1EJryBPNWDw2HSDd5o4c-qn5VRvAuDvJKAG4pmralgk-_eFaRgVHWirLBNNWCx00yo9_YqDegRPx42EngR1e0nP5d0IRk2ObcJ3pG0a1l7nqUm_xWhdPuGzfeePvj5HSSUCtMGT2RvDz2RwaDaOagM16-Md1fNATD_VtTRlwzLPQy8MF0sRufHGhypfQMEMywGBw2brz9jIvqXBDzmt69NTapmLRDp08K2AoNUlxuUGjgqJehboncjg", 208s "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImxvY2FsaG9zdCIKICAgIH0KICBdCn0" 208s } 208s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 208s warnings.warn( 208s https://localhost:14000 "POST /order-plz HTTP/1.1" 201 372 208s Received response: 208s HTTP 201 208s Cache-Control: public, max-age=0, no-cache 208s Content-Type: application/json; charset=utf-8 208s Link: ;rel="index" 208s Location: https://localhost:14000/my-order/jf4x_JLTcx8iRisQ18qst3FmOTGiSC8RcYWj9EyYMQI 208s Replay-Nonce: Q-qxuGpsYN_PEhx62YE7pA 208s Date: Thu, 05 Feb 2026 15:55:22 GMT 208s Content-Length: 372 208s 208s { 208s "status": "pending", 208s "expires": "2026-02-06T15:55:22Z", 208s "identifiers": [ 208s { 208s "type": "dns", 208s "value": "localhost" 208s } 208s ], 208s "finalize": "https://localhost:14000/finalize-order/jf4x_JLTcx8iRisQ18qst3FmOTGiSC8RcYWj9EyYMQI", 208s "authorizations": [ 208s "https://localhost:14000/authZ/byIdXGtkxqBNg2vq0gQlv_vF0a7TkOEkZ_6pswGqvFU" 208s ] 208s } 208s Requesting a certificate for localhost 208s Pebble 2026/02/05 15:55:22 POST /order-plz -> calling handler() 208s Pebble 2026/02/05 15:55:22 There are now 1 authorizations in the db 208s Pebble 2026/02/05 15:55:22 Added order "jf4x_JLTcx8iRisQ18qst3FmOTGiSC8RcYWj9EyYMQI" to the db 208s Pebble 2026/02/05 15:55:22 There are now 1 orders in the db 208s Pebble 2026/02/05 15:55:22 POST /authZ/ -> calling handler() 208s Storing nonce: Q-qxuGpsYN_PEhx62YE7pA 208s JWS payload: 208s b'' 208s Sending POST request to https://localhost:14000/authZ/byIdXGtkxqBNg2vq0gQlv_vF0a7TkOEkZ_6pswGqvFU: 208s { 208s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvMTA3MzMxMGEzN2YyOGQ1MiIsICJub25jZSI6ICJRLXF4dUdwc1lOX1BFaHg2MllFN3BBIiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9hdXRoWi9ieUlkWEd0a3hxQk5nMnZxMGdRbHZfdkYwYTdUa09Fa1pfNnBzd0dxdkZVIn0", 208s "signature": "T44_paVyhhTT2SNBrlOMhJQCm0xb85MWfN4vq10XD6BXvUy4dPMdL0SYJS1RDuBYRMUBawHNPmtrOkoQT8Cg6jJQoVcrkLEkIlevSxgSU99mAPxiXAHcIgJRRCgDQLMAmZBywO9xY9Y6c4oUBbA8tZF8BStgW2w5RcP1hftzIMb52UqiUA-SShiBrAj7dhbIy4Lsjnf_FHtlE04z9qg0oT8LA4wdcRl_6SAO-_NKUxu8uSB-u0uYrYdt_ykIHG3XJIZ1gQJ-9HH23C1qrfZTVTqFY2h4clJMOUT5yUksaDg6ymCzhwjM8F_-0786LDvjTnoO2HWXrwVzmnOdeEEGJg", 208s "payload": "" 208s } 208s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 208s warnings.warn( 208s https://localhost:14000 "POST /authZ/byIdXGtkxqBNg2vq0gQlv_vF0a7TkOEkZ_6pswGqvFU HTTP/1.1" 200 1099 208s Received response: 208s HTTP 200 208s Cache-Control: public, max-age=0, no-cache 208s Content-Type: application/json; charset=utf-8 208s Link: ;rel="index" 208s Replay-Nonce: bHJzURv9V1LWfnYoCHIFvg 208s Date: Thu, 05 Feb 2026 15:55:22 GMT 208s Content-Length: 1099 208s 208s { 208s "status": "pending", 208s "identifier": { 208s "type": "dns", 208s "value": "localhost" 208s }, 208s "challenges": [ 208s { 208s "type": "dns-01", 208s "url": "https://localhost:14000/chalZ/9C948Gh8Zsa4QkdCbufMRMmFDOgo9vFkvBK7iGuehc0", 208s "token": "nZdyMoOfuPthoK4brRD1WgOmnMRh04U04-Au4WMSvjs", 208s "status": "pending" 208s }, 208s { 208s "type": "dns-account-01", 208s "url": "https://localhost:14000/chalZ/Eexh-yFn7Ig2VIwtsE2RUzmn87lKcHQQ-66rVfVteC4", 208s "token": "XJsXr0QGBBztnOtgYon69pMUCMe0gMOkt81OPLpYzoU", 208s "status": "pending" 208s }, 208s { 208s "type": "tls-alpn-01", 208s "url": "https://localhost:14000/chalZ/DgZrcmOf3G9W7Zk2cO8BS6Vs1ga8vcik2K1bMrwDhME", 208s "token": "Kr3nT2lVsk6wKQrGIhwbUQPbaEu_VSLgUXBBlJw4j40", 208s "status": "pending" 208s }, 208s { 208s "type": "http-01", 208s "url": "https://localhost:14000/chalZ/1VsMtRgnwW4mrixGMmaArNiyrRh92Mkto7n46EQJA0A", 208s "token": "A1jgiyFYDOFpeULJ6XMTzchOClRsdmzm69ZoGLHwdGI", 208s "status": "pending" 208s } 208s ], 208s "expires": "2026-02-05T16:55:22Z" 208s } 208s Storing nonce: bHJzURv9V1LWfnYoCHIFvg 208s dns-account-01 was not recognized, full message: {'type': 'dns-account-01', 'url': 'https://localhost:14000/chalZ/Eexh-yFn7Ig2VIwtsE2RUzmn87lKcHQQ-66rVfVteC4', 'token': 'XJsXr0QGBBztnOtgYon69pMUCMe0gMOkt81OPLpYzoU', 'status': 'pending'} 208s Performing the following challenges: 208s http-01 challenge for localhost 208s Generated server block: 208s [] 208s Creating backup of /etc/nginx/mime.types 208s Creating backup of /etc/nginx/nginx.conf 208s Creating backup of /etc/nginx/sites-enabled/default 208s Writing nginx conf tree to /etc/nginx/nginx.conf: 208s user www-data; 208s worker_processes auto; 208s worker_cpu_affinity auto; 208s pid /run/nginx.pid; 208s error_log /var/log/nginx/error.log; 208s include /etc/nginx/modules-enabled/*.conf; 208s 208s events { 208s worker_connections 768; 208s # multi_accept on; 208s } 208s 208s http { 208s server_names_hash_bucket_size 128; 208s include /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/le_http_01_cert_challenge.conf; 208s 208s ## 208s # Basic Settings 208s ## 208s 208s sendfile on; 208s tcp_nopush on; 208s types_hash_max_size 2048; 208s server_tokens build; # Recommended practice is to turn this off 208s 208s # server_names_hash_bucket_size 64; 208s # server_name_in_redirect off; 208s 208s include /etc/nginx/mime.types; 208s default_type application/octet-stream; 208s 208s ## 208s # SSL Settings 208s ## 208s 208s ssl_protocols TLSv1.2 TLSv1.3; # Dropping SSLv3 (POODLE), TLS 1.0, 1.1 208s ssl_prefer_server_ciphers off; # Don't force server cipher order. 208s 208s ## 208s # Logging Settings 208s ## 208s 208s access_log /var/log/nginx/access.log; 208s 208s ## 208s # Gzip Settings 208s ## 208s 208s gzip on; 208s 208s # gzip_vary on; 208s # gzip_proxied any; 208s # gzip_comp_level 6; 208s # gzip_buffers 16 8k; 208s # gzip_http_version 1.1; 208s # gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript; 208s 208s ## 208s # Virtual Host Configs 208s ## 208s 208s include /etc/nginx/conf.d/*.conf; 208s include /etc/nginx/sites-enabled/*; 208s } 208s 208s 208s #mail { 208s # # See sample authentication script at: 208s # # http://wiki.nginx.org/ImapAuthenticateWithApachePhpScript 208s # 208s # # auth_http localhost/auth.php; 208s # # pop3_capabilities "TOP" "USER"; 208s # # imap_capabilities "IMAP4rev1" "UIDPLUS"; 208s # 208s # server { 208s # listen localhost:110; 208s # protocol pop3; 208s # proxy on; 208s # } 208s # 208s # server { 208s # listen localhost:143; 208s # protocol imap; 208s # proxy on; 208s # } 208s #} 208s 208s Writing nginx conf tree to /etc/nginx/sites-enabled/default: 208s ## 208s # You should look at the following URL's in order to grasp a solid understanding 208s # of Nginx configuration files in order to fully unleash the power of Nginx. 208s # https://www.nginx.com/resources/wiki/start/ 208s # https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/ 208s # https://wiki.debian.org/Nginx/DirectoryStructure 208s # 208s # In most cases, administrators will remove this file from sites-enabled/ and 208s # leave it as reference inside of sites-available where it will continue to be 208s # updated by the nginx packaging team. 208s # 208s # This file will automatically load configuration files provided by other 208s # applications, such as Drupal or Wordpress. These applications will be made 208s # available underneath a path with that package name, such as /drupal8. 208s # 208s # Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples. 208s ## 208s 208s # Default server configuration 208s # 208s server { 208s listen 80 default_server; 208s listen [::]:80 default_server; 208s 208s # SSL configuration 208s # 208s # listen 443 ssl default_server; 208s # listen [::]:443 ssl default_server; 208s # 208s # Note: You should disable gzip for SSL traffic. 208s # See: https://bugs.debian.org/773332 208s # 208s # Read up on ssl_ciphers to ensure a secure configuration. 208s # See: https://bugs.debian.org/765782 208s # 208s # Self signed certs generated by the ssl-cert package 208s # Don't use them in a production server! 208s # 208s # include snippets/snakeoil.conf; 208s 208s root /var/www/html; 208s 208s # Add index.php to the list if you are using PHP 208s index index.html index.htm index.nginx-debian.html; 208s 208s server_name _; 208s 208s location / { 208s # First attempt to serve request as file, then 208s # as directory, then fall back to displaying a 404. 208s try_files $uri $uri/ =404; 208s } 208s 208s # pass PHP scripts to FastCGI server 208s # 208s #location ~ \.php$ { 208s # include snippets/fastcgi-php.conf; 208s # 208s # # With php-fpm (or other unix sockets): 208s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 208s # # With php-cgi (or other tcp sockets): 208s # fastcgi_pass 127.0.0.1:9000; 208s #} 208s 208s # deny access to .htaccess files, if Apache's document root 208s # concurs with nginx's one 208s # 208s #location ~ /\.ht { 208s # deny all; 208s #} 208s } 208s 208s 208s # Virtual Host configuration for example.com 208s # 208s # You can move that to a different file under sites-available/ and symlink that 208s # to sites-enabled/ to enable it. 208s # 208s #server { 208s # listen 80; 208s # listen [::]:80; 208s # 208s # server_name example.com; 208s # 208s # root /var/www/example.com; 208s # index index.html; 208s # 208s # location / { 208s # try_files $uri $uri/ =404; 208s # } 208s #} 208s 208s server {rewrite ^(/.well-known/acme-challenge/.*) $1 break; # managed by Certbot 208s 208s 208s listen 80 ; 208s listen [::]:80 ; 208s 208s # SSL configuration 208s # 208s # listen 443 ssl default_server; 208s # listen [::]:443 ssl default_server; 208s # 208s # Note: You should disable gzip for SSL traffic. 208s # See: https://bugs.debian.org/773332 208s # 208s # Read up on ssl_ciphers to ensure a secure configuration. 208s # See: https://bugs.debian.org/765782 208s # 208s # Self signed certs generated by the ssl-cert package 208s # Don't use them in a production server! 208s # 208s # include snippets/snakeoil.conf; 208s 208s root /var/www/html; 208s 208s # Add index.php to the list if you are using PHP 208s index index.html index.htm index.nginx-debian.html; 208s server_name localhost; # managed by Certbot 208s 208s 208s location / { 208s # First attempt to serve request as file, then 208s # as directory, then fall back to displaying a 404. 208s try_files $uri $uri/ =404; 208s } 208s 208s # pass PHP scripts to FastCGI server 208s # 208s #location ~ \.php$ { 208s # include snippets/fastcgi-php.conf; 208s # 208s # # With php-fpm (or other unix sockets): 208s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 208s # # With php-cgi (or other tcp sockets): 208s # fastcgi_pass 127.0.0.1:9000; 208s #} 208s 208s # deny access to .htaccess files, if Apache's document root 208s # concurs with nginx's one 208s # 208s #location ~ /\.ht { 208s # deny all; 208s #} 208s 208s location = /.well-known/acme-challenge/A1jgiyFYDOFpeULJ6XMTzchOClRsdmzm69ZoGLHwdGI{default_type text/plain;return 200 A1jgiyFYDOFpeULJ6XMTzchOClRsdmzm69ZoGLHwdGI.j9laVHnohaMaFMuSL3XGUtJUHsonYQJo1azzZ1gGl0U;} # managed by Certbot 208s 208s } 209s JWS payload: 209s b'{}' 209s Pebble 2026/02/05 15:55:23 POST /chalZ/ -> calling handler() 209s Pebble 2026/02/05 15:55:23 Pulled a task from the Tasks queue: &va.vaTask{Identifier:acme.Identifier{Type:"dns", Value:"localhost"}, Challenge:(*core.Challenge)(0x11ce380), Account:(*core.Account)(0x132ed20), AccountURL:"https://localhost:14000/my-account/1073310a37f28d52", Wildcard:false} 209s Pebble 2026/02/05 15:55:23 Starting 3 validations. 209s Pebble 2026/02/05 15:55:23 Attempting to validate w/ HTTP: http://localhost:80/.well-known/acme-challenge/A1jgiyFYDOFpeULJ6XMTzchOClRsdmzm69ZoGLHwdGI 209s Pebble 2026/02/05 15:55:23 Attempting to validate w/ HTTP: http://localhost:80/.well-known/acme-challenge/A1jgiyFYDOFpeULJ6XMTzchOClRsdmzm69ZoGLHwdGI 209s Pebble 2026/02/05 15:55:23 Attempting to validate w/ HTTP: http://localhost:80/.well-known/acme-challenge/A1jgiyFYDOFpeULJ6XMTzchOClRsdmzm69ZoGLHwdGI 209s Sending POST request to https://localhost:14000/chalZ/1VsMtRgnwW4mrixGMmaArNiyrRh92Mkto7n46EQJA0A: 209s { 209s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvMTA3MzMxMGEzN2YyOGQ1MiIsICJub25jZSI6ICJiSEp6VVJ2OVYxTFdmbllvQ0hJRnZnIiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9jaGFsWi8xVnNNdFJnbndXNG1yaXhHTW1hQXJOaXlyUmg5Mk1rdG83bjQ2RVFKQTBBIn0", 209s "signature": "C_J82bshwTd2rtet0pKPB9fLSBjDFcheogmbaDZE5T6wns1rzW3Uz00iF-Gt4l4T1FBpRp2b07_TNaZWTdKnLPY7eTAX5GA-U3OvK6sY1vYRdFtEdMNS5hg1httXXOn4qBcKzBhvkBH9PiIczx2_hg4qFvw2wI255j16B6oiyWul5gamqtFTSqOeApMBo0zRD7NLExX19gYPiCo3pzV9gcXsb64ZVvdcXEBV6FlQJXQUvmkEcq-mJFdgQUISStu6djkN63OqA7DPrZh_NTNuToOTLh9oKOuWFrJy4NY8lPeRevSKRYMES_EH9qKWaEkrVfVmLEPJQbuh03PmlaCNqQ", 209s "payload": "e30" 209s } 209s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 209s warnings.warn( 209s Pebble 2026/02/05 15:55:23 authz byIdXGtkxqBNg2vq0gQlv_vF0a7TkOEkZ_6pswGqvFU set VALID by completed challenge 1VsMtRgnwW4mrixGMmaArNiyrRh92Mkto7n46EQJA0A 209s https://localhost:14000 "POST /chalZ/1VsMtRgnwW4mrixGMmaArNiyrRh92Mkto7n46EQJA0A HTTP/1.1" 200 197 209s Received response: 209s HTTP 200 209s Cache-Control: public, max-age=0, no-cache 209s Content-Type: application/json; charset=utf-8 209s Link: ;rel="index", ;rel="up" 209s Replay-Nonce: rMDQOEC0nxIFhfQFPsZEvg 209s Date: Thu, 05 Feb 2026 15:55:23 GMT 209s Content-Length: 197 209s 209s { 209s "type": "http-01", 209s "url": "https://localhost:14000/chalZ/1VsMtRgnwW4mrixGMmaArNiyrRh92Mkto7n46EQJA0A", 209s "token": "A1jgiyFYDOFpeULJ6XMTzchOClRsdmzm69ZoGLHwdGI", 209s "status": "processing" 209s } 209s Storing nonce: rMDQOEC0nxIFhfQFPsZEvg 209s Waiting for verification... 210s JWS payload: 210s b'' 210s Pebble 2026/02/05 15:55:24 POST /authZ/ -> calling handler() 210s Sending POST request to https://localhost:14000/authZ/byIdXGtkxqBNg2vq0gQlv_vF0a7TkOEkZ_6pswGqvFU: 210s { 210s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvMTA3MzMxMGEzN2YyOGQ1MiIsICJub25jZSI6ICJyTURRT0VDMG54SUZoZlFGUHNaRXZnIiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9hdXRoWi9ieUlkWEd0a3hxQk5nMnZxMGdRbHZfdkYwYTdUa09Fa1pfNnBzd0dxdkZVIn0", 210s "signature": "uwsMcZUwoYWkZ3q36aqbdRLk6zf2IupQnnCxrt8xTY8aj7dOjNPDs71rIaxWDQ9j66IKm495gbKG94DpVxbmaTfTV6KISJ5YuitjeX2E0ZPabYkzzJihbxjsT2XWmnfUr45jVwLk1JZ-oygHQZjjd5w_up9Sfz5xsE21wfuy80_bGeuYbSmO3cRzl6HvhnMP8-0uqy8bryCf4AVc_9gMOS1UU_znVdfAt9yRWAn2FoGECPqKAPNHuo5j4AeTCO0miUey8HFP24WZxktsLdZ-y8HjCptX466C794wiQWGZKKKClryaJOrpvdCd2afJDhrFm6YK0apQq3RvWtW_VuCUA", 210s "payload": "" 210s } 210s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 210s warnings.warn( 210s https://localhost:14000 "POST /authZ/byIdXGtkxqBNg2vq0gQlv_vF0a7TkOEkZ_6pswGqvFU HTTP/1.1" 200 435 210s Received response: 210s HTTP 200 210s Cache-Control: public, max-age=0, no-cache 210s Content-Type: application/json; charset=utf-8 210s Link: ;rel="index" 210s Replay-Nonce: IIn9PGeyx6BYK9eP1lZAIA 210s Date: Thu, 05 Feb 2026 15:55:24 GMT 210s Content-Length: 435 210s 210s { 210s "status": "valid", 210s "identifier": { 210s "type": "dns", 210s "value": "localhost" 210s }, 210s "challenges": [ 210s { 210s "type": "http-01", 210s "url": "https://localhost:14000/chalZ/1VsMtRgnwW4mrixGMmaArNiyrRh92Mkto7n46EQJA0A", 210s "token": "A1jgiyFYDOFpeULJ6XMTzchOClRsdmzm69ZoGLHwdGI", 210s "status": "valid", 210s "validated": "2026-02-05T15:55:23Z" 210s } 210s ], 210s "expires": "2026-02-05T16:55:23Z" 210s } 210s Storing nonce: IIn9PGeyx6BYK9eP1lZAIA 210s Calling registered functions 210s Cleaning up challenges 211s CSR: CSR(file=None, data=b'-----BEGIN CERTIFICATE REQUEST-----\nMIHiMIGJAgEAMAAwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATjuaNEAKKOfgGD\n87GXdeS9GvO4SggW41QXGYp/+X38JidZXtefpkkxsbQ6mPc4AmFLKMMmz2bYnWon\nC0eHxvmpoCcwJQYJKoZIhvcNAQkOMRgwFjAUBgNVHREEDTALgglsb2NhbGhvc3Qw\nCgYIKoZIzj0EAwIDSAAwRQIhANtF8Cmbnt5PAHY++zzCnzZ4+DcUnsLkEGGKlvR3\nd5ylAiA6XFG1v1w54N6DU+76KGqj9ETXDHlH1E5RFoBqneIX/Q==\n-----END CERTIFICATE REQUEST-----\n', form='pem') 211s Will poll for certificate issuance until 2026-02-05 15:56:55.402560 211s JWS payload: 211s b'{\n "csr": "MIHiMIGJAgEAMAAwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATjuaNEAKKOfgGD87GXdeS9GvO4SggW41QXGYp_-X38JidZXtefpkkxsbQ6mPc4AmFLKMMmz2bYnWonC0eHxvmpoCcwJQYJKoZIhvcNAQkOMRgwFjAUBgNVHREEDTALgglsb2NhbGhvc3QwCgYIKoZIzj0EAwIDSAAwRQIhANtF8Cmbnt5PAHY--zzCnzZ4-DcUnsLkEGGKlvR3d5ylAiA6XFG1v1w54N6DU-76KGqj9ETXDHlH1E5RFoBqneIX_Q"\n}' 211s Sending POST request to https://localhost:14000/finalize-order/jf4x_JLTcx8iRisQ18qst3FmOTGiSC8RcYWj9EyYMQI: 211s { 211s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvMTA3MzMxMGEzN2YyOGQ1MiIsICJub25jZSI6ICJJSW45UEdleXg2QllLOWVQMWxaQUlBIiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9maW5hbGl6ZS1vcmRlci9qZjR4X0pMVGN4OGlSaXNRMThxc3QzRm1PVEdpU0M4UmNZV2o5RXlZTVFJIn0", 211s "signature": "Q_F4AwPYduS8DcbBRHNfSvudiGD3Rbno7HBl5Lar65n-KJK5ItkWSUFANUUJDH_5p29uIkDsc1V-Obe7TBH1RLrMlUv5ooIMd6eBhCPraSRWZt4bYbVAQy2j5edvqVfM-6nl_9hUVoiLklgzGk-8tbXI_Oe-gBKTHzsl6f5ODy_FyK8ReaH5VmUx7oKXmfay2dgntz_7wbm6W2d1-rohHsfm8uz16BOUVeOj0AeR8nxSIDfxtgzjxJe9wfMRaLxRaUZfj-nRvChrq0B6jSwozXjAfodSHpxlMB1FPjASEZROV9CDfIevbCKhi0dYORDUB-GFUCtkaMDy26aLkFFafw", 211s "payload": "ewogICJjc3IiOiAiTUlIaU1JR0pBZ0VBTUFBd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFUanVhTkVBS0tPZmdHRDg3R1hkZVM5R3ZPNFNnZ1c0MVFYR1lwXy1YMzhKaWRaWHRlZnBra3hzYlE2bVBjNEFtRkxLTU1tejJiWW5Xb25DMGVIeHZtcG9DY3dKUVlKS29aSWh2Y05BUWtPTVJnd0ZqQVVCZ05WSFJFRURUQUxnZ2xzYjJOaGJHaHZjM1F3Q2dZSUtvWkl6ajBFQXdJRFNBQXdSUUloQU50RjhDbWJudDVQQUhZLS16ekNuelo0LURjVW5zTGtFR0dLbHZSM2Q1eWxBaUE2WEZHMXYxdzU0TjZEVS03NktHcWo5RVRYREhsSDFFNVJGb0JxbmVJWF9RIgp9" 211s } 211s Pebble 2026/02/05 15:55:25 POST /finalize-order/ -> calling handler() 211s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 211s warnings.warn( 211s Pebble 2026/02/05 15:55:25 Order jf4x_JLTcx8iRisQ18qst3FmOTGiSC8RcYWj9EyYMQI is fully authorized. Processing finalization 211s https://localhost:14000 "POST /finalize-order/jf4x_JLTcx8iRisQ18qst3FmOTGiSC8RcYWj9EyYMQI HTTP/1.1" 200 375 211s Received response: 211s HTTP 200 211s Cache-Control: public, max-age=0, no-cache 211s Content-Type: application/json; charset=utf-8 211s Link: ;rel="index" 211s Location: https://localhost:14000/my-order/jf4x_JLTcx8iRisQ18qst3FmOTGiSC8RcYWj9EyYMQI 211s Replay-Nonce: kUiPuAkzRYi9PTw7wZDCYA 211s Date: Thu, 05 Feb 2026 15:55:25 GMT 211s Content-Length: 375 211s 211s { 211s "status": "processing", 211s "expires": "2026-02-06T15:55:22Z", 211s "identifiers": [ 211s { 211s "type": "dns", 211s "value": "localhost" 211s } 211s ], 211s "finalize": "https://localhost:14000/finalize-order/jf4x_JLTcx8iRisQ18qst3FmOTGiSC8RcYWj9EyYMQI", 211s "authorizations": [ 211s "https://localhost:14000/authZ/byIdXGtkxqBNg2vq0gQlv_vF0a7TkOEkZ_6pswGqvFU" 211s ] 211s } 211s Storing nonce: kUiPuAkzRYi9PTw7wZDCYA 211s Pebble 2026/02/05 15:55:25 Issued certificate serial 56d2909e2eceaeff for order jf4x_JLTcx8iRisQ18qst3FmOTGiSC8RcYWj9EyYMQI 212s JWS payload: 212s b'' 212s Sending POST request to https://localhost:14000/my-order/jf4x_JLTcx8iRisQ18qst3FmOTGiSC8RcYWj9EyYMQI: 212s { 212s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvMTA3MzMxMGEzN2YyOGQ1MiIsICJub25jZSI6ICJrVWlQdUFrelJZaTlQVHc3d1pEQ1lBIiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9teS1vcmRlci9qZjR4X0pMVGN4OGlSaXNRMThxc3QzRm1PVEdpU0M4UmNZV2o5RXlZTVFJIn0", 212s "signature": "oBQ1SryA7-seoFsERAY50_jbU9-zm55cu899FFWDh_DT3ct8KJi8tmQ-RiaGOqWBdKtPG06F-K-XUSvYNYqNhVmWRekOCuGenDH3C1wz5YceUNDi6c_-Gn4FA4lioGxSFk6b-pcBqX3polDxKC4FQdSfbddGwWeb3-XOvdy6qtChP0e9AxDnkzd2WsP73tONAK1BLyYUdRBpbnVHZzY_l1JmbSaFpLoLKoZvBSTenU6Q1TLCRdGB5GQnyVpH25pvR3ar2s4fYaNhepD407xaQRcGXr5sDevjxh1nfCcLs3bvPwU5JYIqUy2eWBYM-uR3XEQC4ZbCckf2Zaw1ZusAcg", 212s "payload": "" 212s } 212s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 212s warnings.warn( 212s Pebble 2026/02/05 15:55:26 POST /my-order/ -> calling handler() 212s https://localhost:14000 "POST /my-order/jf4x_JLTcx8iRisQ18qst3FmOTGiSC8RcYWj9EyYMQI HTTP/1.1" 200 438 212s Received response: 212s HTTP 200 212s Cache-Control: public, max-age=0, no-cache 212s Content-Type: application/json; charset=utf-8 212s Link: ;rel="index" 212s Replay-Nonce: I_h1xEI6DJushob2S7vqbw 212s Date: Thu, 05 Feb 2026 15:55:26 GMT 212s Content-Length: 438 212s 212s { 212s "status": "valid", 212s "expires": "2026-02-06T15:55:22Z", 212s "identifiers": [ 212s { 212s "type": "dns", 212s "value": "localhost" 212s } 212s ], 212s "finalize": "https://localhost:14000/finalize-order/jf4x_JLTcx8iRisQ18qst3FmOTGiSC8RcYWj9EyYMQI", 212s "authorizations": [ 212s "https://localhost:14000/authZ/byIdXGtkxqBNg2vq0gQlv_vF0a7TkOEkZ_6pswGqvFU" 212s ], 212s "certificate": "https://localhost:14000/certZ/56d2909e2eceaeff" 212s } 212s Storing nonce: I_h1xEI6DJushob2S7vqbw 212s JWS payload: 212s b'' 212s Sending POST request to https://localhost:14000/certZ/56d2909e2eceaeff: 212s { 212s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvMTA3MzMxMGEzN2YyOGQ1MiIsICJub25jZSI6ICJJX2gxeEVJNkRKdXNob2IyUzd2cWJ3IiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9jZXJ0Wi81NmQyOTA5ZTJlY2VhZWZmIn0", 212s "signature": "vEGpwSeaOtLLfXbhdH6lx_ml66cshpY-pY_JEfWN1tmx1q6CONnjWKKUNKyV-U___sssekKhyEP5to38BqkNA3y159U1UsOFY2raLvm5JW5irTaw-eQSPIvZaClNTuVK2VrPa34fYfBSLs4u5Qq6h4XMf0R2-_BM-TqC88tgjEp0Fwrlalpj01BTkL9cN14aKW3_6viv1jvzaYD6acHySyaRENhKJ6iZTd8s0yykRYvLcbvdQjQCpAAO8kyglOjXoIXozd3R68e1EDE2iLFzzwniqPx6Tr6VYjNvM78oxJGvyj5zRuaAhpvoLAHzI5AYbIuAPi8i23ZqwWk6gXsXzw", 212s "payload": "" 212s } 212s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 212s warnings.warn( 212s Pebble 2026/02/05 15:55:26 POST /certZ/ -> calling handler() 212s https://localhost:14000 "POST /certZ/56d2909e2eceaeff HTTP/1.1" 200 None 212s 212s Successfully received certificate. 212s Certificate is saved at: /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/live/localhost/fullchain.pem 212s Key is saved at: /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/live/localhost/privkey.pem 212s This certificate expires on 2031-02-05. 212s These files will be updated when the certificate renews. 212s Certbot has set up a scheduled task to automatically renew this certificate in the background. 212s 212s Deploying certificate 212s Received response: 212s HTTP 200 212s Cache-Control: public, max-age=0, no-cache 212s Content-Type: application/pem-certificate-chain; charset=utf-8 212s Link: ;rel="index" 212s Replay-Nonce: z0n-Dqld7mDozD3WNmAeoQ 212s Date: Thu, 05 Feb 2026 15:55:26 GMT 212s Transfer-Encoding: chunked 212s 212s -----BEGIN CERTIFICATE----- 212s MIICeTCCAWGgAwIBAgIIVtKQni7Orv8wDQYJKoZIhvcNAQELBQAwKDEmMCQGA1UE 212s AxMdUGViYmxlIEludGVybWVkaWF0ZSBDQSA1NDJkODQwHhcNMjYwMjA1MTU1NTI1 212s WhcNMzEwMjA1MTU1NTI0WjAAMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE47mj 212s RACijn4Bg/Oxl3XkvRrzuEoIFuNUFxmKf/l9/CYnWV7Xn6ZJMbG0Opj3OAJhSyjD 212s Js9m2J1qJwtHh8b5qaOBmTCBljAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYI 212s KwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFLYdc9X3 212s smdfxDO2ILGqnuVvSHVsMB8GA1UdIwQYMBaAFK6epq3GVvTmV2hXIurl2wDEB18s 212s MBcGA1UdEQEB/wQNMAuCCWxvY2FsaG9zdDANBgkqhkiG9w0BAQsFAAOCAQEAXZUG 212s w5EBY7uNLWcJOrRzwq+rvnZyfUzqdKnTVrp6JpdQ5RtE6dWekKj/oMAd1asaQtpg 212s FR+EiYIo0AeLEsmK5eHa5GhmKtneFwh6xe0AFpiP15+ZK3ZJgW1v/Bk72sau1myN 212s EqNXLlJDDq/oCjyT8GRL16AYRq2sA0AiergYyOqxWdPWK7AulXo7wbfmtjO6aul9 212s n8yKzVs0slbTPOpDX1YAOZWp0wHWUoQZ/JcJsbIsMDPi74/w/wnEqDE7Hop0+TFO 212s 07rhBGH+4589gMJwlCGnhprKjcAOtJtC7BiDXOzPfyN+wS9+QCik1CDN/B04PKgJ 212s 6jLwtdl7rWLn1NVbKA== 212s -----END CERTIFICATE----- 212s -----BEGIN CERTIFICATE----- 212s MIIDUDCCAjigAwIBAgIIWhoYmGLdhRwwDQYJKoZIhvcNAQELBQAwIDEeMBwGA1UE 212s AxMVUGViYmxlIFJvb3QgQ0EgNzY1Y2QzMCAXDTI2MDIwNTE1NTUyMFoYDzIwNTYw 212s MjA1MTU1NTIwWjAoMSYwJAYDVQQDEx1QZWJibGUgSW50ZXJtZWRpYXRlIENBIDU0 212s MmQ4NDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALzG2aECbxinyOWP 212s BYx4KKTBDO71xut89JjM5fRpijqpGZPUDeJf1ewcQtQqVWiyGJK//Qa4E43xK+tS 212s 3OLP+uHZvCat4JMYR6rn/+DN3sNxGdi3uoLK5d4QjVxROG7/TG15n8Dv1Qeq6w9p 212s N2b5CBt37SPF+j/g7AE7GjIpCoVYPhCuHAyBzHpZmF6w97TrLyR8ktFnG/V6/U1T 212s QNhoTDgXpXYeZZjwPZJXH01JqdQUCNit/AxrN5vAXz95YT2BxFHlXjusogfqzWPl 212s RAHF+chFnQAjy+yr9Kn7ugzh7IwAZb8xbmvtCb/bEaiT7+nS8UPC4dCOV4dxBE2y 212s Rw4nuBcCAwEAAaOBgzCBgDAOBgNVHQ8BAf8EBAMCAoQwHQYDVR0lBBYwFAYIKwYB 212s BQUHAwEGCCsGAQUFBwMCMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFK6epq3G 212s VvTmV2hXIurl2wDEB18sMB8GA1UdIwQYMBaAFIGymepOT9obdEJ9htl0GnpY2/HH 212s MA0GCSqGSIb3DQEBCwUAA4IBAQBitiCSvC4Zk1kaLfc8bp1k8bi/kryurz92gacW 212s JmAxZ3tHX0+JQZiftFzdFlTyMiAmQTiEdV2nMsYKLxfNOPBmQUr9BSJNDKbfHW4r 212s kNdfYaPdAtwRHsMyb0Hsvq6gRqBa77BoZ/SThnibVS06Q/XNWNgdJ7WTFRbn091+ 212s Oo1NQkgd68kSobstRjCJft2yaz8NW2zpeJD4/YcFlEozWmkMpN5xE5Bqas5vjkKW 212s pHiMNfAZMiHNrntHhQIm1byuadw4hofagVgbvO/1RhKnxnw45yl2eX3kwk2EjnJ/ 212s 6oabD9vv8YSQ4o39aWUdueKnYI3TZqXmHRfCSx0aXliVuoBV 212s -----END CERTIFICATE----- 212s 212s Storing nonce: z0n-Dqld7mDozD3WNmAeoQ 212s Non-standard path(s), might not work with crontab installed by your operating system package manager 212s Creating directory /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/archive. 212s Creating directory /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/live. 212s Writing README to /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/live/README. 212s Creating directory /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/archive/localhost. 212s Creating directory /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/live/localhost. 212s Writing certificate to /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/live/localhost/cert.pem. 212s Writing private key to /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/live/localhost/privkey.pem. 212s Writing chain to /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/live/localhost/chain.pem. 212s Writing full chain to /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/live/localhost/fullchain.pem. 212s Writing README to /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/live/localhost/README. 212s Var account=eef64035e7df281ca4dd7a579dad5c7e (set by user). 212s Var config_dir=/tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf (set by user). 212s Var work_dir=/tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/work (set by user). 212s Var logs_dir=/tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/logs (set by user). 212s Var server=https://localhost:14000/dir (set by user). 212s Requested authenticator nginx and installer nginx 212s Requested authenticator nginx and installer nginx 212s Writing new config /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/renewal/localhost.conf. 212s Notifying user: 212s Successfully received certificate. 212s Certificate is saved at: /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/live/localhost/fullchain.pem 212s Key is saved at: /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/live/localhost/privkey.pem 212s This certificate expires on 2031-02-05. 212s These files will be updated when the certificate renews. 212s Certbot has set up a scheduled task to automatically renew this certificate in the background. 212s 212s Notifying user: Deploying certificate 212s Generating RSA key (2048 bits): /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/work/snakeoil/0000_key.pem 212s Deploying Certificate to VirtualHost /etc/nginx/sites-enabled/default 212s Notifying user: Successfully deployed certificate for localhost to /etc/nginx/sites-enabled/default 212s Successfully deployed certificate for localhost to /etc/nginx/sites-enabled/default 212s Creating backup of /etc/nginx/mime.types 212s Creating backup of /etc/nginx/nginx.conf 212s Creating backup of /etc/nginx/sites-enabled/default 212s Writing nginx conf tree to /etc/nginx/sites-enabled/default: 212s ## 212s # You should look at the following URL's in order to grasp a solid understanding 212s # of Nginx configuration files in order to fully unleash the power of Nginx. 212s # https://www.nginx.com/resources/wiki/start/ 212s # https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/ 212s # https://wiki.debian.org/Nginx/DirectoryStructure 212s # 212s # In most cases, administrators will remove this file from sites-enabled/ and 212s # leave it as reference inside of sites-available where it will continue to be 212s # updated by the nginx packaging team. 212s # 212s # This file will automatically load configuration files provided by other 212s # applications, such as Drupal or Wordpress. These applications will be made 212s # available underneath a path with that package name, such as /drupal8. 212s # 212s # Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples. 212s ## 212s 212s # Default server configuration 212s # 212s server { 212s listen 80 default_server; 212s listen [::]:80 default_server; 212s 212s # SSL configuration 212s # 212s # listen 443 ssl default_server; 212s # listen [::]:443 ssl default_server; 212s # 212s # Note: You should disable gzip for SSL traffic. 212s # See: https://bugs.debian.org/773332 212s # 212s # Read up on ssl_ciphers to ensure a secure configuration. 212s # See: https://bugs.debian.org/765782 212s # 212s # Self signed certs generated by the ssl-cert package 212s # Don't use them in a production server! 212s # 212s # include snippets/snakeoil.conf; 212s 212s root /var/www/html; 212s 212s # Add index.php to the list if you are using PHP 212s index index.html index.htm index.nginx-debian.html; 212s 212s server_name _; 212s 212s location / { 212s # First attempt to serve request as file, then 212s # as directory, then fall back to displaying a 404. 212s try_files $uri $uri/ =404; 212s } 212s 212s # pass PHP scripts to FastCGI server 212s # 212s #location ~ \.php$ { 212s # include snippets/fastcgi-php.conf; 212s # 212s # # With php-fpm (or other unix sockets): 212s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 212s # # With php-cgi (or other tcp sockets): 212s # fastcgi_pass 127.0.0.1:9000; 212s #} 212s 212s # deny access to .htaccess files, if Apache's document root 212s # concurs with nginx's one 212s # 212s #location ~ /\.ht { 212s # deny all; 212s #} 212s } 212s 212s 212s # Virtual Host configuration for example.com 212s # 212s # You can move that to a different file under sites-available/ and symlink that 212s # to sites-enabled/ to enable it. 212s # 212s #server { 212s # listen 80; 212s # listen [::]:80; 212s # 212s # server_name example.com; 212s # 212s # root /var/www/example.com; 212s # index index.html; 212s # 212s # location / { 212s # try_files $uri $uri/ =404; 212s # } 212s #} 212s 212s server { 212s listen 80 ; 212s listen [::]:80 ; 212s 212s # SSL configuration 212s # 212s # listen 443 ssl default_server; 212s # listen [::]:443 ssl default_server; 212s # 212s # Note: You should disable gzip for SSL traffic. 212s # See: https://bugs.debian.org/773332 212s # 212s # Read up on ssl_ciphers to ensure a secure configuration. 212s # See: https://bugs.debian.org/765782 212s # 212s # Self signed certs generated by the ssl-cert package 212s # Don't use them in a production server! 212s # 212s # include snippets/snakeoil.conf; 212s 212s root /var/www/html; 212s 212s # Add index.php to the list if you are using PHP 212s index index.html index.htm index.nginx-debian.html; 212s server_name localhost; # managed by Certbot 212s 212s 212s location / { 212s # First attempt to serve request as file, then 212s # as directory, then fall back to displaying a 404. 212s try_files $uri $uri/ =404; 212s } 212s 212s # pass PHP scripts to FastCGI server 212s # 212s #location ~ \.php$ { 212s # include snippets/fastcgi-php.conf; 212s # 212s # # With php-fpm (or other unix sockets): 212s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 212s # # With php-cgi (or other tcp sockets): 212s # fastcgi_pass 127.0.0.1:9000; 212s #} 212s 212s # deny access to .htaccess files, if Apache's document root 212s # concurs with nginx's one 212s # 212s #location ~ /\.ht { 212s # deny all; 212s #} 212s 212s 212s listen 443 ssl; # managed by Certbot 212s listen [::]:443 ssl ipv6only=on; # managed by Certbot 212s ssl_certificate /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/live/localhost/fullchain.pem; # managed by Certbot 212s ssl_certificate_key /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/live/localhost/privkey.pem; # managed by Certbot 212s include /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/options-ssl-nginx.conf; # managed by Certbot 212s ssl_dhparam /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/ssl-dhparams.pem; # managed by Certbot 212s 212s } 212s Writing nginx conf tree to /etc/nginx/sites-enabled/default: 212s ## 212s # You should look at the following URL's in order to grasp a solid understanding 212s # of Nginx configuration files in order to fully unleash the power of Nginx. 212s # https://www.nginx.com/resources/wiki/start/ 212s # https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/ 212s # https://wiki.debian.org/Nginx/DirectoryStructure 212s # 212s # In most cases, administrators will remove this file from sites-enabled/ and 212s # leave it as reference inside of sites-available where it will continue to be 212s # updated by the nginx packaging team. 212s # 212s # This file will automatically load configuration files provided by other 212s # applications, such as Drupal or Wordpress. These applications will be made 212s # available underneath a path with that package name, such as /drupal8. 212s # 212s # Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples. 212s ## 212s 212s # Default server configuration 212s # 212s server { 212s listen 80 default_server; 212s listen [::]:80 default_server; 212s 212s # SSL configuration 212s # 212s # listen 443 ssl default_server; 212s # listen [::]:443 ssl default_server; 212s # 212s # Note: You should disable gzip for SSL traffic. 212s # See: https://bugs.debian.org/773332 212s # 212s # Read up on ssl_ciphers to ensure a secure configuration. 212s # See: https://bugs.debian.org/765782 212s # 212s # Self signed certs generated by the ssl-cert package 212s # Don't use them in a production server! 212s # 212s # include snippets/snakeoil.conf; 212s 212s root /var/www/html; 212s 212s # Add index.php to the list if you are using PHP 212s index index.html index.htm index.nginx-debian.html; 212s 212s server_name _; 212s 212s location / { 212s # First attempt to serve request as file, then 212s # as directory, then fall back to displaying a 404. 212s try_files $uri $uri/ =404; 212s } 212s 212s # pass PHP scripts to FastCGI server 212s # 212s #location ~ \.php$ { 212s # include snippets/fastcgi-php.conf; 212s # 212s # # With php-fpm (or other unix sockets): 212s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 212s # # With php-cgi (or other tcp sockets): 212s # fastcgi_pass 127.0.0.1:9000; 212s #} 212s 212s # deny access to .htaccess files, if Apache's document root 212s # concurs with nginx's one 212s # 212s #location ~ /\.ht { 212s # deny all; 212s #} 212s } 212s 212s 212s # Virtual Host configuration for example.com 212s # 212s # You can move that to a different file under sites-available/ and symlink that 212s # to sites-enabled/ to enable it. 212s # 212s #server { 212s # listen 80; 212s # listen [::]:80; 212s # 212s # server_name example.com; 212s # 212s # root /var/www/example.com; 212s # index index.html; 212s # 212s # location / { 212s # try_files $uri $uri/ =404; 212s # } 212s #} 212s 212s server { 212s listen 80 ; 212s listen [::]:80 ; 212s 212s # SSL configuration 212s # 212s # listen 443 ssl default_server; 212s # listen [::]:443 ssl default_server; 212s # 212s # Note: You should disable gzip for SSL traffic. 212s # See: https://bugs.debian.org/773332 212s # 212s # Read up on ssl_ciphers to ensure a secure configuration. 212s # See: https://bugs.debian.org/765782 212s # 212s # Self signed certs generated by the ssl-cert package 212s # Don't use them in a production server! 212s # 212s # include snippets/snakeoil.conf; 212s 212s root /var/www/html; 212s 212s # Add index.php to the list if you are using PHP 212s index index.html index.htm index.nginx-debian.html; 212s server_name localhost; # managed by Certbot 212s 212s 212s location / { 212s # First attempt to serve request as file, then 212s # as directory, then fall back to displaying a 404. 212s try_files $uri $uri/ =404; 212s } 212s 212s # pass PHP scripts to FastCGI server 212s # 212s #location ~ \.php$ { 212s # include snippets/fastcgi-php.conf; 212s # 212s # # With php-fpm (or other unix sockets): 212s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 212s # # With php-cgi (or other tcp sockets): 212s # fastcgi_pass 127.0.0.1:9000; 212s #} 212s 212s # deny access to .htaccess files, if Apache's document root 212s # concurs with nginx's one 212s # 212s #location ~ /\.ht { 212s # deny all; 212s #} 212s 212s 212s listen 443 ssl; # managed by Certbot 212s listen [::]:443 ssl ipv6only=on; # managed by Certbot 212s ssl_certificate /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/live/localhost/fullchain.pem; # managed by Certbot 212s ssl_certificate_key /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/live/localhost/privkey.pem; # managed by Certbot 212s include /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/options-ssl-nginx.conf; # managed by Certbot 212s ssl_dhparam /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/ssl-dhparams.pem; # managed by Certbot 212s 212s } 213s Notifying user: Congratulations! You have successfully enabled HTTPS on https://localhost 213s Notifying user: If you like Certbot, please consider supporting our work by: 213s * Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate 213s * Donating to EFF: https://eff.org/donate-le 213s Congratulations! You have successfully enabled HTTPS on https://localhost 213s 213s - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 213s If you like Certbot, please consider supporting our work by: 213s * Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate 213s * Donating to EFF: https://eff.org/donate-le 213s - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 214s * Uses proxy env variable no_proxy == '127.0.0.1,127.0.1.1,localhost,localdomain,internal,login.ubuntu.com,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com,radosgw.ps5.canonical.com' 214s * Host localhost:443 was resolved. 214s * IPv6: ::1 214s * IPv4: 127.0.0.1 214s % Total % Received % Xferd Average Speed Time Time Time Current 214s Dload Upload Total Spent Left Speed 214s 0 0 0 0 0 0 0 0 0* Trying [::1]:443... 214s * ALPN: curl offers h2,http/1.1 214s } [5 bytes data] 214s * TLSv1.3 (OUT), TLS handshake, Client hello (1): 214s } [1564 bytes data] 214s * SSL Trust Anchors: 214s * CAfile: /tmp/autopkgtest.1f4p21/autopkgtest_tmp/certbot/nginx/conf/live/localhost/chain.pem 214s * CApath: /etc/ssl/certs 214s 214s 214s 214s Welcome to nginx! 214s 214s 214s 214s

Welcome to nginx!

214s

If you see this page, the nginx web server is successfully installed and 214s working. Further configuration is required.

214s 214s

For online documentation and support please refer to 214s nginx.org.
214s Commercial support is available at 214s nginx.com.

214s 214s

Thank you for using nginx.

214s 214s 214s { [5 bytes data] 214s * TLSv1.3 (IN), TLS handshake, Server hello (2): 214s { [1210 bytes data] 214s * TLSv1.3 (IN), TLS change cipher, Change cipher spec (1): 214s { [1 bytes data] 214s * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): 214s { [25 bytes data] 214s * TLSv1.3 (IN), TLS handshake, Certificate (11): 214s { [1507 bytes data] 214s * TLSv1.3 (IN), TLS handshake, CERT verify (15): 214s { [78 bytes data] 214s * TLSv1.3 (IN), TLS handshake, Finished (20): 214s { [52 bytes data] 214s * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): 214s } [1 bytes data] 214s * TLSv1.3 (OUT), TLS handshake, Finished (20): 214s } [52 bytes data] 214s * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519MLKEM768 / id-ecPublicKey 214s * ALPN: server accepted http/1.1 214s * Server certificate: 214s * subject: 214s * start date: Feb 5 15:55:25 2026 GMT 214s * expire date: Feb 5 15:55:24 2031 GMT 214s * issuer: CN=Pebble Intermediate CA 542d84 214s * Certificate level 0: Public key type EC/prime256v1 (256/128 Bits/secBits), signed using sha256WithRSAEncryption 214s * Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption 214s * subjectAltName: "localhost" matches cert's "localhost" 214s * SSL certificate verified via OpenSSL. 214s * Established connection to localhost (::1 port 443) from ::1 port 43518 214s * using HTTP/1.x 214s } [5 bytes data] 214s > GET / HTTP/1.1 214s > Host: localhost 214s > User-Agent: curl/8.18.0 214s > Accept: */* 214s > 214s * Request completely sent off 214s { [5 bytes data] 214s * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): 214s { [57 bytes data] 214s * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): 214s { [57 bytes data] 214s < HTTP/1.1 200 OK 214s < Server: nginx/1.28.1 (Ubuntu) 214s < Date: Thu, 05 Feb 2026 15:55:27 GMT 214s < Content-Type: text/html 214s < Content-Length: 615 214s < Last-Modified: Thu, 05 Feb 2026 15:54:34 GMT 214s < Connection: keep-alive 214s < ETag: "6984bd3a-267" 214s < Accept-Ranges: bytes 214s < 214s { [615 bytes data] 214s 100 615 100 615 0 0 64709 0 0 100 615 100 615 0 0 64370 0 0 100 615 100 615 0 0 64115 0 0 214s * Connection #0 to host localhost:443 left intact 214s autopkgtest [15:55:28]: test nginx: -----------------------] 218s nginx PASS 218s autopkgtest [15:55:32]: test nginx: - - - - - - - - - - results - - - - - - - - - - 222s autopkgtest [15:55:36]: @@@@@@@@@@@@@@@@@@@@ summary 222s command1 PASS 222s nginx PASS