0s autopkgtest [17:37:54]: starting date and time: 2026-02-05 17:37:54+0000 0s autopkgtest [17:37:54]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [17:37:54]: host juju-7f2275-prod-proposed-migration-environment-15; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.wr51gll6/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:python-acme,src:sphinx-rtd-theme --apt-upgrade python-certbot-nginx --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=python-acme/4.0.0-2 sphinx-rtd-theme/3.1.0+dfsg-1' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-s390x --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-15@sto01-s390x-33.secgroup --name adt-resolute-s390x-python-certbot-nginx-20260205-172949-juju-7f2275-prod-proposed-migration-environment-15-eb919290-7c19-4030-bc6e-f7716472a348 --image adt/ubuntu-resolute-s390x-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-15 --net-id=net_prod-autopkgtest-workers-s390x -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 4s Creating nova instance adt-resolute-s390x-python-certbot-nginx-20260205-172949-juju-7f2275-prod-proposed-migration-environment-15-eb919290-7c19-4030-bc6e-f7716472a348 from image adt/ubuntu-resolute-s390x-server-20260205.img (UUID 269b3742-7045-4843-96ce-2a9dced91842)... 155s autopkgtest [17:40:29]: testbed dpkg architecture: s390x 156s autopkgtest [17:40:30]: testbed apt version: 3.1.14 157s autopkgtest [17:40:31]: @@@@@@@@@@@@@@@@@@@@ test bed setup 158s autopkgtest [17:40:32]: testbed release detected to be: None 162s autopkgtest [17:40:36]: updating testbed package index (apt update) 162s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 162s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 162s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 162s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 163s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [230 kB] 163s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1686 kB] 163s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 163s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [36.0 kB] 163s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x Packages [260 kB] 163s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe s390x Packages [1410 kB] 163s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse s390x Packages [11.0 kB] 166s Fetched 3762 kB in 3s (1096 kB/s) 171s Reading package lists... 212s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 212s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 212s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 212s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 219s Reading package lists... 219s Reading package lists... 220s Building dependency tree... 220s Reading state information... 221s Calculating upgrade... 222s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 222s autopkgtest [17:41:36]: upgrading testbed (apt dist-upgrade and autopurge) 223s Reading package lists... 225s Building dependency tree... 225s Reading state information... 225s Calculating upgrade... 226s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 228s Reading package lists... 229s Building dependency tree... 229s Reading state information... 229s Solving dependencies... 230s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 247s autopkgtest [17:42:01]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP Mon Jan 12 15:39:23 UTC 2026 247s autopkgtest [17:42:01]: @@@@@@@@@@@@@@@@@@@@ apt-source python-certbot-nginx 256s Get:1 http://ftpmaster.internal/ubuntu resolute/universe python-certbot-nginx 4.0.0-2 (dsc) [2563 B] 256s Get:2 http://ftpmaster.internal/ubuntu resolute/universe python-certbot-nginx 4.0.0-2 (tar) [79.7 kB] 256s Get:3 http://ftpmaster.internal/ubuntu resolute/universe python-certbot-nginx 4.0.0-2 (diff) [18.4 kB] 259s gpgv: Signature made Sun May 25 15:33:15 2025 UTC 259s gpgv: using RSA key 909B8ECA4FEE6E81034527269B3F22544E9AF451 259s gpgv: issuer "hlieberman@debian.org" 259s gpgv: Can't check signature: No public key 259s dpkg-source: warning: cannot verify inline signature for ./python-certbot-nginx_4.0.0-2.dsc: no acceptable signature found 260s autopkgtest [17:42:14]: testing package python-certbot-nginx version 4.0.0-2 263s autopkgtest [17:42:17]: build not needed 264s autopkgtest [17:42:18]: test command1: preparing testbed 265s Reading package lists... 267s Building dependency tree... 267s Reading state information... 268s Solving dependencies... 269s The following NEW packages will be installed: 269s certbot nginx nginx-common python3-acme python3-certbot 269s python3-certbot-nginx python3-configargparse python3-josepy 269s python3-parsedatetime python3-pytz python3-rfc3339 269s 0 upgraded, 11 newly installed, 0 to remove and 0 not upgraded. 269s Need to get 1293 kB of archives. 269s After this operation, 4877 kB of additional disk space will be used. 269s Get:1 http://ftpmaster.internal/ubuntu resolute/main s390x nginx-common all 1.28.1-2ubuntu1 [44.8 kB] 269s Get:2 http://ftpmaster.internal/ubuntu resolute/main s390x nginx s390x 1.28.1-2ubuntu1 [648 kB] 277s Get:3 http://ftpmaster.internal/ubuntu resolute/universe s390x python3-josepy all 2.2.0-1 [22.3 kB] 277s Get:4 http://ftpmaster.internal/ubuntu resolute/universe s390x python3-pytz all 2025.2-5 [32.4 kB] 277s Get:5 http://ftpmaster.internal/ubuntu resolute/universe s390x python3-rfc3339 all 2.0.1-2 [6530 B] 277s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe s390x python3-acme all 4.0.0-2 [49.3 kB] 277s Get:7 http://ftpmaster.internal/ubuntu resolute/universe s390x python3-configargparse all 1.7-2 [31.7 kB] 277s Get:8 http://ftpmaster.internal/ubuntu resolute/universe s390x python3-parsedatetime all 2.6-3build1 [32.1 kB] 277s Get:9 http://ftpmaster.internal/ubuntu resolute/universe s390x python3-certbot all 4.0.0-2 [267 kB] 277s Get:10 http://ftpmaster.internal/ubuntu resolute/universe s390x certbot all 4.0.0-2 [91.6 kB] 277s Get:11 http://ftpmaster.internal/ubuntu resolute/universe s390x python3-certbot-nginx all 4.0.0-2 [67.4 kB] 277s Preconfiguring packages ... 277s Fetched 1293 kB in 1s (2097 kB/s) 277s Selecting previously unselected package nginx-common. 277s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 277s Preparing to unpack .../00-nginx-common_1.28.1-2ubuntu1_all.deb ... 277s Unpacking nginx-common (1.28.1-2ubuntu1) ... 277s Selecting previously unselected package nginx. 277s Preparing to unpack .../01-nginx_1.28.1-2ubuntu1_s390x.deb ... 277s Unpacking nginx (1.28.1-2ubuntu1) ... 277s Selecting previously unselected package python3-josepy. 277s Preparing to unpack .../02-python3-josepy_2.2.0-1_all.deb ... 277s Unpacking python3-josepy (2.2.0-1) ... 277s Selecting previously unselected package python3-pytz. 277s Preparing to unpack .../03-python3-pytz_2025.2-5_all.deb ... 277s Unpacking python3-pytz (2025.2-5) ... 277s Selecting previously unselected package python3-rfc3339. 277s Preparing to unpack .../04-python3-rfc3339_2.0.1-2_all.deb ... 277s Unpacking python3-rfc3339 (2.0.1-2) ... 277s Selecting previously unselected package python3-acme. 277s Preparing to unpack .../05-python3-acme_4.0.0-2_all.deb ... 277s Unpacking python3-acme (4.0.0-2) ... 277s Selecting previously unselected package python3-configargparse. 277s Preparing to unpack .../06-python3-configargparse_1.7-2_all.deb ... 277s Unpacking python3-configargparse (1.7-2) ... 277s Selecting previously unselected package python3-parsedatetime. 277s Preparing to unpack .../07-python3-parsedatetime_2.6-3build1_all.deb ... 277s Unpacking python3-parsedatetime (2.6-3build1) ... 277s Selecting previously unselected package python3-certbot. 277s Preparing to unpack .../08-python3-certbot_4.0.0-2_all.deb ... 277s Unpacking python3-certbot (4.0.0-2) ... 277s Selecting previously unselected package certbot. 277s Preparing to unpack .../09-certbot_4.0.0-2_all.deb ... 277s Unpacking certbot (4.0.0-2) ... 277s Selecting previously unselected package python3-certbot-nginx. 277s Preparing to unpack .../10-python3-certbot-nginx_4.0.0-2_all.deb ... 277s Unpacking python3-certbot-nginx (4.0.0-2) ... 277s Setting up python3-configargparse (1.7-2) ... 277s Setting up python3-parsedatetime (2.6-3build1) ... 278s Setting up nginx-common (1.28.1-2ubuntu1) ... 281s Created symlink '/etc/systemd/system/multi-user.target.wants/nginx.service' → '/usr/lib/systemd/system/nginx.service'. 283s Setting up python3-pytz (2025.2-5) ... 284s Setting up python3-josepy (2.2.0-1) ... 285s Setting up python3-rfc3339 (2.0.1-2) ... 286s Setting up nginx (1.28.1-2ubuntu1) ... 288s * Upgrading binary nginx  [ OK ] 288s Setting up python3-acme (4.0.0-2) ... 290s Setting up python3-certbot (4.0.0-2) ... 292s Setting up certbot (4.0.0-2) ... 293s Created symlink '/etc/systemd/system/timers.target.wants/certbot.timer' → '/usr/lib/systemd/system/certbot.timer'. 295s Setting up python3-certbot-nginx (4.0.0-2) ... 296s Processing triggers for man-db (2.13.1-1) ... 318s Processing triggers for ufw (0.36.2-9build1) ... 326s autopkgtest [17:43:20]: test command1: certbot --help nginx | grep -q "sleep-seconds" 326s autopkgtest [17:43:20]: test command1: [----------------------- 335s autopkgtest [17:43:29]: test command1: -----------------------] 338s autopkgtest [17:43:32]: test command1: - - - - - - - - - - results - - - - - - - - - - 338s command1 PASS 340s autopkgtest [17:43:34]: test nginx: preparing testbed 341s Reading package lists... 342s Building dependency tree... 342s Reading state information... 343s Solving dependencies... 345s The following NEW packages will be installed: 345s pebble 345s 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. 345s Need to get 3888 kB of archives. 345s After this operation, 16.1 MB of additional disk space will be used. 345s Get:1 http://ftpmaster.internal/ubuntu resolute/universe s390x pebble s390x 2.6.0+ds1-1build1 [3888 kB] 348s Fetched 3888 kB in 1s (5108 kB/s) 349s Selecting previously unselected package pebble. 349s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 62405 files and directories currently installed.) 349s Preparing to unpack .../pebble_2.6.0+ds1-1build1_s390x.deb ... 349s Unpacking pebble (2.6.0+ds1-1build1) ... 350s Setting up pebble (2.6.0+ds1-1build1) ... 350s Processing triggers for man-db (2.13.1-1) ... 356s autopkgtest [17:43:50]: test nginx: [----------------------- 356s Waiting for pebble to start .Pebble 2026/02/05 17:45:11 Starting Pebble ACME server 361s ...Pebble 2026/02/05 17:45:16 Generated new root issuer CN=Pebble Root CA 5081ea with serial 64765775e9a05018 and SKI 2f614100e865d1700395b4bd85701f5e3638c43a 361s Pebble 2026/02/05 17:45:16 Generated new intermediate issuer CN=Pebble Intermediate CA 6f3fb0 with serial 6c3acba528fb1a58 and SKI c8645ffc520ecb7e3dd0aaba55e95f41b8cf78d9 361s Pebble 2026/02/05 17:45:16 Generated issuance chain: Pebble Root CA 5081ea -> Pebble Intermediate CA 6f3fb0 361s Pebble 2026/02/05 17:45:16 Using certificate validity period of 157766400 seconds 361s Pebble 2026/02/05 17:45:16 Using system DNS resolver for ACME challenges 361s Pebble 2026/02/05 17:45:16 Disabling random VA sleeps 361s Pebble 2026/02/05 17:45:16 Configured to reject 0% of good nonces 361s Pebble 2026/02/05 17:45:16 Configured to attempt authz reuse for each identifier 50% of the time 361s Pebble 2026/02/05 17:45:16 Configured to show 3 orders per page 361s Pebble 2026/02/05 17:45:16 Management interface listening on: 0.0.0.0:15000 361s Pebble 2026/02/05 17:45:16 Root CA certificate available at: https://0.0.0.0:15000/roots/0 361s Pebble 2026/02/05 17:45:16 Listening on: 0.0.0.0:14000 361s Pebble 2026/02/05 17:45:16 ACME directory available at: https://0.0.0.0:14000/dir 361s .Pebble 2026/02/05 17:45:16 GET /dir -> calling handler() 361s 361s Pebble server started and is ready 363s Root logging level set at 10 363s Saving debug log to /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/logs/letsencrypt.log 363s Requested authenticator nginx and installer nginx 363s Single candidate plugin: * nginx 363s Description: Nginx Web Server plugin 363s Interfaces: Authenticator, Installer, Plugin 363s Entry point: EntryPoint(name='nginx', value='certbot_nginx._internal.configurator:NginxConfigurator', group='certbot.plugins') 363s Initialized: 363s Prep: True 363s Selected authenticator and installer 363s Plugins selected: Authenticator nginx, Installer nginx 364s Sending GET request to https://localhost:14000/dir. 364s Starting new HTTPS connection (1): localhost:14000 364s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 364s warnings.warn( 364s https://localhost:14000 "GET /dir HTTP/1.1" 200 486 364s Received response: 364s HTTP 200 364s Cache-Control: public, max-age=0, no-cache 364s Content-Type: application/json; charset=utf-8 364s Date: Thu, 05 Feb 2026 17:45:19 GMT 364s Content-Length: 486 364s 364s { 364s "keyChange": "https://localhost:14000/rollover-account-key", 364s "meta": { 364s "externalAccountRequired": false, 364s "termsOfService": "data:text/plain,Do%20what%20thou%20wilt" 364s }, 364s "newAccount": "https://localhost:14000/sign-me-up", 364s "newNonce": "https://localhost:14000/nonce-plz", 364s "newOrder": "https://localhost:14000/order-plz", 364s "renewalInfo": "https://localhost:14000/draft-ietf-acme-ari-03/renewalInfo", 364s "revokeCert": "https://localhost:14000/revoke-cert" 364s } 364s Requesting fresh nonce 364s Sending HEAD request to https://localhost:14000/nonce-plz. 364s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 364s warnings.warn( 364s https://localhost:14000 "HEAD /nonce-plz HTTP/1.1" 200 0 364s Received response: 364s HTTP 200 364s Cache-Control: public, max-age=0, no-cache 364s Link: ;rel="index" 364s Replay-Nonce: 1LUHMrns6ZqWUnXdf8ngIw 364s Date: Thu, 05 Feb 2026 17:45:19 GMT 364s 364s 364s Storing nonce: 1LUHMrns6ZqWUnXdf8ngIw 364s JWS payload: 364s b'{\n "termsOfServiceAgreed": true\n}' 364s Pebble 2026/02/05 17:45:19 GET /dir -> calling handler() 364s Pebble 2026/02/05 17:45:19 HEAD /nonce-plz -> calling handler() 364s Sending POST request to https://localhost:14000/sign-me-up: 364s { 364s "protected": "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", 364s "signature": "WUPsPMoMyMa9XLo1rha0G-gkO5mRV7htnXKADtr4gWt_LPDZKIboKkBYnoNzjY_XZwp0TpkTlr9EO5Top_jHw5eTAVtQimE7J89571SxUmh7fHosjXXy8_Q4fVBWsOLm6D6vtq7QaJC10QOswbfmbZt4dBoHwdYRmucIloaXFNBeEj0-ryhq01XsJSrbMakoaB6wY7z5DA_Bts6WctoH4bWlZEmGsjVu2SnBPKrer2-CwSTOfIhkzR7H8djhBa0E5PTUahKJVE4_VrA4aTrybdl7cF2UsQAL1VZ-afl77ysNHJIwoNeH5s_vJYACi5o70sUFZh-rupWC2KA_uHjrgQ", 364s "payload": "ewogICJ0ZXJtc09mU2VydmljZUFncmVlZCI6IHRydWUKfQ" 364s } 364s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 364s warnings.warn( 364s https://localhost:14000 "POST /sign-me-up HTTP/1.1" 201 506 364s Pebble 2026/02/05 17:45:19 POST /sign-me-up -> calling handler() 364s Pebble 2026/02/05 17:45:19 There are now 1 accounts in memory 364s Account registered. 364s Requesting a certificate for localhost 364s Pebble 2026/02/05 17:45:19 POST /order-plz -> calling handler() 364s Pebble 2026/02/05 17:45:19 There are now 1 authorizations in the db 364s Pebble 2026/02/05 17:45:19 Added order "3ol6BdJcW1MI20vwjvJVptOiXQ262kLBvkBHfVZN-uc" to the db 364s Pebble 2026/02/05 17:45:19 There are now 1 orders in the db 364s Pebble 2026/02/05 17:45:19 POST /authZ/ -> calling handler() 364s Received response: 364s HTTP 201 364s Cache-Control: public, max-age=0, no-cache 364s Content-Type: application/json; charset=utf-8 364s Link: ;rel="index" 364s Location: https://localhost:14000/my-account/5c928848b45885d2 364s Replay-Nonce: RjdD0KCeE1zssL54bzEJUQ 364s Date: Thu, 05 Feb 2026 17:45:19 GMT 364s Content-Length: 506 364s 364s { 364s "status": "valid", 364s "orders": "https://localhost:14000/list-orderz/5c928848b45885d2", 364s "key": { 364s "kty": "RSA", 364s "n": "2SRVl-TM0v0m0PDMMLgUFvJLRhjPV604cBT6KDfNCEJLFCLLkcYdMU8Ti7HO8kIJ4iBisoZeJIgGeqMy2IXcN_JV0CGLjkm2vQhV1cggzIqzDeNG9nuBF7B_Mgro8RpVnFWDGfSfe8lRKwMpKR0NhRaRdsTJ42-9qCaQ7A_VkWPt5QQXnTgOkinVGZWjTkmKu2uIlzAfF4gZRUw4o6I25V_ySekDOjFydeavQmiSPAUIRYtSpFrMM0YIK0vSvkHATFqcv1Rex1snCvuZAs2gSOgEw8Qij3ImH_zkatk9HAAivZFe8EFsUdPbNHBw23hZnYw8t-0RKWRgYM12c4sw2Q", 364s "e": "AQAB" 364s } 364s } 364s Storing nonce: RjdD0KCeE1zssL54bzEJUQ 364s Notifying user: Account registered. 364s Picked account: )>), contact=(), agreement=None, status='valid', terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://localhost:14000/my-account/5c928848b45885d2', new_authzr_uri=None, terms_of_service=None), e633f7320b56a1b7a9854b7075515666, Meta(creation_dt=datetime.datetime(2026, 2, 5, 17, 45, 19, tzinfo=), creation_host='autopkgtest.local', register_to_eff=None))> 364s Notifying user: Requesting a certificate for localhost 364s JWS payload: 364s b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "localhost"\n }\n ]\n}' 364s Sending POST request to https://localhost:14000/order-plz: 364s { 364s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvNWM5Mjg4NDhiNDU4ODVkMiIsICJub25jZSI6ICJSamREMEtDZUUxenNzTDU0YnpFSlVRIiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9vcmRlci1wbHoifQ", 364s "signature": "V_nSZH92fRDtk9hten_Ig8Mcw4Iz9lnPDq1e6CXx0UutMAce7XRn84QAr3I-rb1Kys8BF5ExmpaF_ZMLqzfpP2hfCgOFGD6iPeKYyI2tn1wW897tuNzHNfq1evagwuuPNoFib39-SL5MJQ8hD8-84OYI5PgVOeZxTJoJF1a2CXfHU8fakNnpvQBL049AoEA9JVZIV6_09RvmV58g4Bxe_6-7PsBJNwfbH0XT3JnVXk9Ol0x-rcXSsR6CMDIW2oP0sA7qA_l0AZOUMkkN3y_dIhr7druS3UfbkrG9D8IZHS5LM4vXnOForIGEMfPmCcrxMm7NMcspvjEsD1S6KQmVEA", 364s "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImxvY2FsaG9zdCIKICAgIH0KICBdCn0" 364s } 364s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 364s warnings.warn( 364s https://localhost:14000 "POST /order-plz HTTP/1.1" 201 372 364s Received response: 364s HTTP 201 364s Cache-Control: public, max-age=0, no-cache 364s Content-Type: application/json; charset=utf-8 364s Link: ;rel="index" 364s Location: https://localhost:14000/my-order/3ol6BdJcW1MI20vwjvJVptOiXQ262kLBvkBHfVZN-uc 364s Replay-Nonce: sdROhtPrBZgA9AaeYn-AgA 364s Date: Thu, 05 Feb 2026 17:45:19 GMT 364s Content-Length: 372 364s 364s { 364s "status": "pending", 364s "expires": "2026-02-06T17:45:19Z", 364s "identifiers": [ 364s { 364s "type": "dns", 364s "value": "localhost" 364s } 364s ], 364s "finalize": "https://localhost:14000/finalize-order/3ol6BdJcW1MI20vwjvJVptOiXQ262kLBvkBHfVZN-uc", 364s "authorizations": [ 364s "https://localhost:14000/authZ/VTR-zNyOxGtLPof6nZLg-xhkYof6dW2BqMBGloGv3Ks" 364s ] 364s } 364s Storing nonce: sdROhtPrBZgA9AaeYn-AgA 364s JWS payload: 364s b'' 364s Sending POST request to https://localhost:14000/authZ/VTR-zNyOxGtLPof6nZLg-xhkYof6dW2BqMBGloGv3Ks: 364s { 364s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvNWM5Mjg4NDhiNDU4ODVkMiIsICJub25jZSI6ICJzZFJPaHRQckJaZ0E5QWFlWW4tQWdBIiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9hdXRoWi9WVFItek55T3hHdExQb2Y2blpMZy14aGtZb2Y2ZFcyQnFNQkdsb0d2M0tzIn0", 364s "signature": "SfIQHKZsvfjxtpRsrtt-N30DVE879JunYGlqBhxg4ov__fv4nSdiGPlTeMll83S2YMnQj4mCddbVvt_lM8kssoop-09mNgsFhK8_0MhO_fm7D5-YmMN92dVjDsfzyvsm4D4ijv-OubEVYRIZ7Bnky1_Oe6w8l8ChvgVMqy7TKN4TAfsZC8IB-8yNsOZnkfw0gxsBwbhuhy0QYCTNV5Z4N1JNQl3npV7kZTqovBEchfg8PoVevRZWgUuu7-6tjKsvIzfUPTFYqzxT6q-JeN1ZNW2kKOpjjV68Hw9Fo4bDK0GVKqB9mjftfqL0TwL3PuCWABMjRGha_zBzPLH2-yF4wg", 364s "payload": "" 364s } 364s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 364s warnings.warn( 364s https://localhost:14000 "POST /authZ/VTR-zNyOxGtLPof6nZLg-xhkYof6dW2BqMBGloGv3Ks HTTP/1.1" 200 1099 364s Received response: 364s HTTP 200 364s Cache-Control: public, max-age=0, no-cache 364s Content-Type: application/json; charset=utf-8 364s Link: ;rel="index" 364s Replay-Nonce: 4RZsrx704Gg4twrW207Kew 364s Date: Thu, 05 Feb 2026 17:45:19 GMT 364s Content-Length: 1099 364s 364s { 364s "status": "pending", 364s "identifier": { 364s "type": "dns", 364s "value": "localhost" 364s }, 364s "challenges": [ 364s { 364s "type": "http-01", 364s "url": "https://localhost:14000/chalZ/R1gl5aZVZfmQr5q82e5QR-JDmtaQXh57fy9_znBCVxc", 364s "token": "9rGiSTw7IjU_PSb0vc93P4ODVNWtaHQqnEdsiAYeUWs", 364s "status": "pending" 364s }, 364s { 364s "type": "tls-alpn-01", 364s "url": "https://localhost:14000/chalZ/FraoMqI6aQ91QbXIDj-d4w_U17MZPdUrca3uTCUiFRs", 364s "token": "D75kav55SLbJ5j5iJk3XA97uT5unz0gtHiKW_cU951s", 364s "status": "pending" 364s }, 364s { 364s "type": "dns-01", 364s "url": "https://localhost:14000/chalZ/ly-V4m98xIW1AO7g2cmSmmYu0t83-zFx3keN-WiBLD0", 364s "token": "aEe9j7A9ws2v9v9vwyW3IXEMr-QuTw1lryNB4LDo_Xg", 364s "status": "pending" 364s }, 364s { 364s "type": "dns-account-01", 364s "url": "https://localhost:14000/chalZ/S_jvi99bJ0a_z-kDuJTnm4-_X5h0zEvdw491smiRilY", 364s "token": "6-dH61fAO_Sjxz1ThnUhuqHuFoHs38hEE02QGdWLkA4", 364s "status": "pending" 364s } 364s ], 364s "expires": "2026-02-05T18:45:19Z" 364s } 364s Storing nonce: 4RZsrx704Gg4twrW207Kew 364s dns-account-01 was not recognized, full message: {'type': 'dns-account-01', 'url': 'https://localhost:14000/chalZ/S_jvi99bJ0a_z-kDuJTnm4-_X5h0zEvdw491smiRilY', 'token': '6-dH61fAO_Sjxz1ThnUhuqHuFoHs38hEE02QGdWLkA4', 'status': 'pending'} 364s Performing the following challenges: 364s http-01 challenge for localhost 364s Generated server block: 364s [] 364s Creating backup of /etc/nginx/mime.types 364s Creating backup of /etc/nginx/nginx.conf 364s Creating backup of /etc/nginx/sites-enabled/default 364s Writing nginx conf tree to /etc/nginx/nginx.conf: 364s user www-data; 364s worker_processes auto; 364s worker_cpu_affinity auto; 364s pid /run/nginx.pid; 364s error_log /var/log/nginx/error.log; 364s include /etc/nginx/modules-enabled/*.conf; 364s 364s events { 364s worker_connections 768; 364s # multi_accept on; 364s } 364s 364s http { 364s server_names_hash_bucket_size 128; 364s include /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/le_http_01_cert_challenge.conf; 364s 364s ## 364s # Basic Settings 364s ## 364s 364s sendfile on; 364s tcp_nopush on; 364s types_hash_max_size 2048; 364s server_tokens build; # Recommended practice is to turn this off 364s 364s # server_names_hash_bucket_size 64; 364s # server_name_in_redirect off; 364s 364s include /etc/nginx/mime.types; 364s default_type application/octet-stream; 364s 364s ## 364s # SSL Settings 364s ## 364s 364s ssl_protocols TLSv1.2 TLSv1.3; # Dropping SSLv3 (POODLE), TLS 1.0, 1.1 364s ssl_prefer_server_ciphers off; # Don't force server cipher order. 364s 364s ## 364s # Logging Settings 364s ## 364s 364s access_log /var/log/nginx/access.log; 364s 364s ## 364s # Gzip Settings 364s ## 364s 364s gzip on; 364s 364s # gzip_vary on; 364s # gzip_proxied any; 364s # gzip_comp_level 6; 364s # gzip_buffers 16 8k; 364s # gzip_http_version 1.1; 364s # gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript; 364s 364s ## 364s # Virtual Host Configs 364s ## 364s 364s include /etc/nginx/conf.d/*.conf; 364s include /etc/nginx/sites-enabled/*; 364s } 364s 364s 364s #mail { 364s # # See sample authentication script at: 364s # # http://wiki.nginx.org/ImapAuthenticateWithApachePhpScript 364s # 364s # # auth_http localhost/auth.php; 364s # # pop3_capabilities "TOP" "USER"; 364s # # imap_capabilities "IMAP4rev1" "UIDPLUS"; 364s # 364s # server { 364s # listen localhost:110; 364s # protocol pop3; 364s # proxy on; 364s # } 364s # 364s # server { 364s # listen localhost:143; 364s # protocol imap; 364s # proxy on; 364s # } 364s #} 364s 364s Writing nginx conf tree to /etc/nginx/sites-enabled/default: 364s ## 364s # You should look at the following URL's in order to grasp a solid understanding 364s # of Nginx configuration files in order to fully unleash the power of Nginx. 364s # https://www.nginx.com/resources/wiki/start/ 364s # https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/ 364s # https://wiki.debian.org/Nginx/DirectoryStructure 364s # 364s # In most cases, administrators will remove this file from sites-enabled/ and 364s # leave it as reference inside of sites-available where it will continue to be 364s # updated by the nginx packaging team. 364s # 364s # This file will automatically load configuration files provided by other 364s # applications, such as Drupal or Wordpress. These applications will be made 364s # available underneath a path with that package name, such as /drupal8. 364s # 364s # Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples. 364s ## 364s 364s # Default server configuration 364s # 364s server { 364s listen 80 default_server; 364s listen [::]:80 default_server; 364s 364s # SSL configuration 364s # 364s # listen 443 ssl default_server; 364s # listen [::]:443 ssl default_server; 364s # 364s # Note: You should disable gzip for SSL traffic. 364s # See: https://bugs.debian.org/773332 364s # 364s # Read up on ssl_ciphers to ensure a secure configuration. 364s # See: https://bugs.debian.org/765782 364s # 364s # Self signed certs generated by the ssl-cert package 364s # Don't use them in a production server! 364s # 364s # include snippets/snakeoil.conf; 364s 364s root /var/www/html; 364s 364s # Add index.php to the list if you are using PHP 364s index index.html index.htm index.nginx-debian.html; 364s 364s server_name _; 364s 364s location / { 364s # First attempt to serve request as file, then 364s # as directory, then fall back to displaying a 404. 364s try_files $uri $uri/ =404; 364s } 364s 364s # pass PHP scripts to FastCGI server 364s # 364s #location ~ \.php$ { 364s # include snippets/fastcgi-php.conf; 364s # 364s # # With php-fpm (or other unix sockets): 364s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 364s # # With php-cgi (or other tcp sockets): 364s # fastcgi_pass 127.0.0.1:9000; 364s #} 364s 364s # deny access to .htaccess files, if Apache's document root 364s # concurs with nginx's one 364s # 364s #location ~ /\.ht { 364s # deny all; 364s #} 364s } 364s 364s 364s # Virtual Host configuration for example.com 364s # 364s # You can move that to a different file under sites-available/ and symlink that 364s # to sites-enabled/ to enable it. 364s # 364s #server { 364s # listen 80; 364s # listen [::]:80; 364s # 364s # server_name example.com; 364s # 364s # root /var/www/example.com; 364s # index index.html; 364s # 364s # location / { 364s # try_files $uri $uri/ =404; 364s # } 364s #} 364s 364s server {rewrite ^(/.well-known/acme-challenge/.*) $1 break; # managed by Certbot 364s 364s 364s listen 80 ; 364s listen [::]:80 ; 364s 364s # SSL configuration 364s # 364s # listen 443 ssl default_server; 364s # listen [::]:443 ssl default_server; 364s # 364s # Note: You should disable gzip for SSL traffic. 364s # See: https://bugs.debian.org/773332 364s # 364s # Read up on ssl_ciphers to ensure a secure configuration. 364s # See: https://bugs.debian.org/765782 364s # 364s # Self signed certs generated by the ssl-cert package 364s # Don't use them in a production server! 364s # 364s # include snippets/snakeoil.conf; 364s 364s root /var/www/html; 364s 364s # Add index.php to the list if you are using PHP 364s index index.html index.htm index.nginx-debian.html; 364s server_name localhost; # managed by Certbot 364s 364s 364s location / { 364s # First attempt to serve request as file, then 364s # as directory, then fall back to displaying a 404. 364s try_files $uri $uri/ =404; 364s } 364s 364s # pass PHP scripts to FastCGI server 364s # 364s #location ~ \.php$ { 364s # include snippets/fastcgi-php.conf; 364s # 364s # # With php-fpm (or other unix sockets): 364s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 364s # # With php-cgi (or other tcp sockets): 364s # fastcgi_pass 127.0.0.1:9000; 364s #} 364s 364s # deny access to .htaccess files, if Apache's document root 364s # concurs with nginx's one 364s # 364s #location ~ /\.ht { 364s # deny all; 364s #} 364s 364s location = /.well-known/acme-challenge/9rGiSTw7IjU_PSb0vc93P4ODVNWtaHQqnEdsiAYeUWs{default_type text/plain;return 200 9rGiSTw7IjU_PSb0vc93P4ODVNWtaHQqnEdsiAYeUWs.kloJhrmwrw3Xfrf-K9sg9obHuk13kUcx_zvH-w0i6gM;} # managed by Certbot 364s 364s } 365s JWS payload: 365s b'{}' 365s Sending POST request to https://localhost:14000/chalZ/R1gl5aZVZfmQr5q82e5QR-JDmtaQXh57fy9_znBCVxc: 365s { 365s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvNWM5Mjg4NDhiNDU4ODVkMiIsICJub25jZSI6ICI0Ulpzcng3MDRHZzR0d3JXMjA3S2V3IiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9jaGFsWi9SMWdsNWFaVlpmbVFyNXE4MmU1UVItSkRtdGFRWGg1N2Z5OV96bkJDVnhjIn0", 365s "signature": "GRto-SqphYnEENZ-IKW1e9mr5TceBUQaMsyvJstysYcxo_lOmD1sh9aQhEoXyLLJpwOcw7KrHop_9asy1Zv_lhD7kqnStQQQr7LWvJ2W_LKr9N5xO61lsmrTq0rW2L7k-EDFQnU5xNyb0yxRfBPQpO8uLncqjtkdbrPt2qnD25PSixCdY9oWOr30BHEwIdMed3SqoS0mUCFQf-QGfPgfNqQogPTdfoN1krlBZAgYb0Xuo1CMrQNpwGVS_9j-GZF3qcqFuZyKCFB-7At_90bKLWNU09Mh-SYVh_pegZo7J3ckdovRrEBkViaH4E34hrl_V1LoXjR7Fxr4FMAXAxETWg", 365s "payload": "e30" 365s } 365s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 365s warnings.warn( 365s https://localhost:14000 "POST /chalZ/R1gl5aZVZfmQr5q82e5QR-JDmtaQXh57fy9_znBCVxc HTTP/1.1" 200 197 365s Received response: 365s HTTP 200 365s Cache-Control: public, max-age=0, no-cache 365s Content-Type: application/json; charset=utf-8 365s Link: ;rel="index", ;rel="up" 365s Replay-Nonce: 8D0g7--fg_Y3NKOYLRh4FA 365s Date: Thu, 05 Feb 2026 17:45:20 GMT 365s Content-Length: 197 365s 365s { 365s "type": "http-01", 365s "url": "https://localhost:14000/chalZ/R1gl5aZVZfmQr5q82e5QR-JDmtaQXh57fy9_znBCVxc", 365s "token": "9rGiSTw7IjU_PSb0vc93P4ODVNWtaHQqnEdsiAYeUWs", 365s "status": "processing" 365s } 365s Storing nonce: 8D0g7--fg_Y3NKOYLRh4FA 365s Waiting for verification... 365s Pebble 2026/02/05 17:45:20 POST /chalZ/ -> calling handler() 365s Pebble 2026/02/05 17:45:20 Pulled a task from the Tasks queue: &va.vaTask{Identifier:acme.Identifier{Type:"dns", Value:"localhost"}, Challenge:(*core.Challenge)(0xc000093ea0), Account:(*core.Account)(0xc0002f3380), AccountURL:"https://localhost:14000/my-account/5c928848b45885d2", Wildcard:false} 365s Pebble 2026/02/05 17:45:20 Starting 3 validations. 365s Pebble 2026/02/05 17:45:20 Attempting to validate w/ HTTP: http://localhost:80/.well-known/acme-challenge/9rGiSTw7IjU_PSb0vc93P4ODVNWtaHQqnEdsiAYeUWs 365s Pebble 2026/02/05 17:45:20 Attempting to validate w/ HTTP: http://localhost:80/.well-known/acme-challenge/9rGiSTw7IjU_PSb0vc93P4ODVNWtaHQqnEdsiAYeUWs 365s Pebble 2026/02/05 17:45:20 Attempting to validate w/ HTTP: http://localhost:80/.well-known/acme-challenge/9rGiSTw7IjU_PSb0vc93P4ODVNWtaHQqnEdsiAYeUWs 365s Pebble 2026/02/05 17:45:20 authz VTR-zNyOxGtLPof6nZLg-xhkYof6dW2BqMBGloGv3Ks set VALID by completed challenge R1gl5aZVZfmQr5q82e5QR-JDmtaQXh57fy9_znBCVxc 366s JWS payload: 366s b'' 366s Sending POST request to https://localhost:14000/authZ/VTR-zNyOxGtLPof6nZLg-xhkYof6dW2BqMBGloGv3Ks: 366s { 366s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvNWM5Mjg4NDhiNDU4ODVkMiIsICJub25jZSI6ICI4RDBnNy0tZmdfWTNOS09ZTFJoNEZBIiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9hdXRoWi9WVFItek55T3hHdExQb2Y2blpMZy14aGtZb2Y2ZFcyQnFNQkdsb0d2M0tzIn0", 366s "signature": "Rd5yiNAGSZGknzl-R8635FMuWm9rKRLCYgxjEUF2liTmZcC-3-QfBGAWPoPqlAMKnUk4AT02ZHTQ1Kk_FUXo-LyXZivL-jeCYpiWNPhnr36V7KnGMpdtK16tnqXa8oljuSX4Yi4Nuu8odgnKGxcIvWnz0fER_k6Ww-l0Vud4w2ApkM9V4CTZezD4sTe_ePXlL7IH9hj_YJlA__ThiY1QSYSV8G3Ldze7R7Sm2WnFz31jzIhvjbVa9UsgEere8h2yCMMiR1V8X7x1AQv1YCZwPlSCNkW7mL4AfWRiEVTZy23j0Z7VSaLGE2qndMT7ojydaMJX1ULF4JNyodYPipRb6A", 366s "payload": "" 366s } 366s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 366s warnings.warn( 366s https://localhost:14000 "POST /authZ/VTR-zNyOxGtLPof6nZLg-xhkYof6dW2BqMBGloGv3Ks HTTP/1.1" 200 435 366s Received response: 366s HTTP 200 366s Cache-Control: public, max-age=0, no-cache 366s Content-Type: application/json; charset=utf-8 366s Link: ;rel="index" 366s Replay-Nonce: 97JchQ6pLDzvRhpaDUKKkg 366s Date: Thu, 05 Feb 2026 17:45:21 GMT 366s Content-Length: 435 366s 366s { 366s "status": "valid", 366s "identifier": { 366s "type": "dns", 366s "value": "localhost" 366s }, 366s "challenges": [ 366s { 366s "type": "http-01", 366s "url": "https://localhost:14000/chalZ/R1gl5aZVZfmQr5q82e5QR-JDmtaQXh57fy9_znBCVxc", 366s "token": "9rGiSTw7IjU_PSb0vc93P4ODVNWtaHQqnEdsiAYeUWs", 366s "status": "valid", 366s "validated": "2026-02-05T17:45:20Z" 366s } 366s ], 366s "expires": "2026-02-05T18:45:20Z" 366s } 366s Storing nonce: 97JchQ6pLDzvRhpaDUKKkg 366s Calling registered functions 366s Cleaning up challenges 366s Pebble 2026/02/05 17:45:21 POST /authZ/ -> calling handler() 368s CSR: CSR(file=None, data=b'-----BEGIN CERTIFICATE REQUEST-----\nMIHiMIGJAgEAMAAwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATTrCjo2fbYLf3W\nQ0R/lNoz0xz0nkFTlxrwO8o5eZxcHMCyue3zzglnxmVrxI/VNwUskyJ4paqQp9J0\n7luNR5qhoCcwJQYJKoZIhvcNAQkOMRgwFjAUBgNVHREEDTALgglsb2NhbGhvc3Qw\nCgYIKoZIzj0EAwIDSAAwRQIgEHkubTZXaCFcmv03ZNDbn27aE5rxxLhuamWKVXGQ\nvYYCIQDTIMgvCiQ5hpB9QZYOBDHD0GiZGa5X2leFi123TZZdoA==\n-----END CERTIFICATE REQUEST-----\n', form='pem') 368s Will poll for certificate issuance until 2026-02-05 17:46:53.146266 368s JWS payload: 368s b'{\n "csr": "MIHiMIGJAgEAMAAwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATTrCjo2fbYLf3WQ0R_lNoz0xz0nkFTlxrwO8o5eZxcHMCyue3zzglnxmVrxI_VNwUskyJ4paqQp9J07luNR5qhoCcwJQYJKoZIhvcNAQkOMRgwFjAUBgNVHREEDTALgglsb2NhbGhvc3QwCgYIKoZIzj0EAwIDSAAwRQIgEHkubTZXaCFcmv03ZNDbn27aE5rxxLhuamWKVXGQvYYCIQDTIMgvCiQ5hpB9QZYOBDHD0GiZGa5X2leFi123TZZdoA"\n}' 368s Sending POST request to https://localhost:14000/finalize-order/3ol6BdJcW1MI20vwjvJVptOiXQ262kLBvkBHfVZN-uc: 368s { 368s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvNWM5Mjg4NDhiNDU4ODVkMiIsICJub25jZSI6ICI5N0pjaFE2cExEenZSaHBhRFVLS2tnIiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9maW5hbGl6ZS1vcmRlci8zb2w2QmRKY1cxTUkyMHZ3anZKVnB0T2lYUTI2MmtMQnZrQkhmVlpOLXVjIn0", 368s "signature": "k6lToVnmj26z6mU1S97aPhnDVhkbN_o_Od-J0wPfotPb9tGijzJiDADNyPiWJ1XKYgSM17j2NxnOFGht3fH9b214crscPnzlKYYny_pLN11y9IoGNLdsQk4Fr2ngkhEhCCY_ano6OfXnPrAe25YuTJGsFYlVGhl208meP-7xgcpRarkcLLR2Di5VmjUYAFyrGi6w1ubcsVr_oYVYCRjfY2hH9s0RYF4p0N3nbS2uk9PJxbqISyd3oXBtNiKQu2uef12dclYmTrSUbpTnSbiJEI63gr090MCb9wP4OWqGL6dptJYNpdV7uYTKxB7vnIfQRONPIYfOBaW_noHKqEGFzw", 368s "payload": "ewogICJjc3IiOiAiTUlIaU1JR0pBZ0VBTUFBd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFUVHJDam8yZmJZTGYzV1EwUl9sTm96MHh6MG5rRlRseHJ3TzhvNWVaeGNITUN5dWUzenpnbG54bVZyeElfVk53VXNreUo0cGFxUXA5SjA3bHVOUjVxaG9DY3dKUVlKS29aSWh2Y05BUWtPTVJnd0ZqQVVCZ05WSFJFRURUQUxnZ2xzYjJOaGJHaHZjM1F3Q2dZSUtvWkl6ajBFQXdJRFNBQXdSUUlnRUhrdWJUWlhhQ0ZjbXYwM1pORGJuMjdhRTVyeHhMaHVhbVdLVlhHUXZZWUNJUURUSU1ndkNpUTVocEI5UVpZT0JESEQwR2laR2E1WDJsZUZpMTIzVFpaZG9BIgp9" 368s } 368s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 368s warnings.warn( 368s Pebble 2026/02/05 17:45:23 POST /finalize-order/ -> calling handler() 368s Pebble 2026/02/05 17:45:23 Order 3ol6BdJcW1MI20vwjvJVptOiXQ262kLBvkBHfVZN-uc is fully authorized. Processing finalization 368s https://localhost:14000 "POST /finalize-order/3ol6BdJcW1MI20vwjvJVptOiXQ262kLBvkBHfVZN-uc HTTP/1.1" 200 375 368s Received response: 368s HTTP 200 368s Cache-Control: public, max-age=0, no-cache 368s Content-Type: application/json; charset=utf-8 368s Link: ;rel="index" 368s Location: https://localhost:14000/my-order/3ol6BdJcW1MI20vwjvJVptOiXQ262kLBvkBHfVZN-uc 368s Replay-Nonce: r-u9zL_SRCZph-QqwfXHKg 368s Date: Thu, 05 Feb 2026 17:45:23 GMT 368s Content-Length: 375 368s 368s { 368s "status": "processing", 368s "expires": "2026-02-06T17:45:19Z", 368s "identifiers": [ 368s { 368s "type": "dns", 368s "value": "localhost" 368s } 368s ], 368s "finalize": "https://localhost:14000/finalize-order/3ol6BdJcW1MI20vwjvJVptOiXQ262kLBvkBHfVZN-uc", 368s "authorizations": [ 368s "https://localhost:14000/authZ/VTR-zNyOxGtLPof6nZLg-xhkYof6dW2BqMBGloGv3Ks" 368s ] 368s } 368s Storing nonce: r-u9zL_SRCZph-QqwfXHKg 368s Pebble 2026/02/05 17:45:23 Issued certificate serial 3f203f96ef2551e2 for order 3ol6BdJcW1MI20vwjvJVptOiXQ262kLBvkBHfVZN-uc 369s JWS payload: 369s b'' 369s Pebble 2026/02/05 17:45:24 POST /my-order/ -> calling handler() 369s Sending POST request to https://localhost:14000/my-order/3ol6BdJcW1MI20vwjvJVptOiXQ262kLBvkBHfVZN-uc: 369s { 369s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvNWM5Mjg4NDhiNDU4ODVkMiIsICJub25jZSI6ICJyLXU5ekxfU1JDWnBoLVFxd2ZYSEtnIiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9teS1vcmRlci8zb2w2QmRKY1cxTUkyMHZ3anZKVnB0T2lYUTI2MmtMQnZrQkhmVlpOLXVjIn0", 369s "signature": "BpnGWwwhIy8A9d4W-VfuaoFbuJKvosE7YapR7Idl5lFf04Z9oPIrWr39KNTIeCMFUPoW7WMiOLvq_DMypH44PadcOdWDH1cr8RI-6Ak0UdTTZN9wFbL8POw5tFriQBNbJtwKTagfyeY5XAGfb8pWlHhaEL01Qd3SZCrCGpHUmyJGlCEdVQAvZHc03dcFSyOUGWI-DXo16WduuKUToBL0_r4DQqSHR45SBj6q0zAG03BmgbMh_5vL4h3lNCl9oosvzEi-QtxwiLGJLtox5OJSupQiRiVoFlScvVO0jzDQ-8T0lTLFoOahKhTIlQJAsKOEnRRC3IySYDA77XRD1ZUkcw", 369s "payload": "" 369s } 369s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 369s warnings.warn( 369s https://localhost:14000 "POST /my-order/3ol6BdJcW1MI20vwjvJVptOiXQ262kLBvkBHfVZN-uc HTTP/1.1" 200 438 369s Received response: 369s HTTP 200 369s Cache-Control: public, max-age=0, no-cache 369s Content-Type: application/json; charset=utf-8 369s Link: ;rel="index" 369s Replay-Nonce: xfSQhnh-3FTBLJcOC0BhEw 369s Date: Thu, 05 Feb 2026 17:45:24 GMT 369s Content-Length: 438 369s 369s { 369s "status": "valid", 369s "expires": "2026-02-06T17:45:19Z", 369s "identifiers": [ 369s { 369s "type": "dns", 369s "value": "localhost" 369s } 369s ], 369s "finalize": "https://localhost:14000/finalize-order/3ol6BdJcW1MI20vwjvJVptOiXQ262kLBvkBHfVZN-uc", 369s "authorizations": [ 369s "https://localhost:14000/authZ/VTR-zNyOxGtLPof6nZLg-xhkYof6dW2BqMBGloGv3Ks" 369s ], 369s "certificate": "https://localhost:14000/certZ/3f203f96ef2551e2" 369s } 369s Storing nonce: xfSQhnh-3FTBLJcOC0BhEw 369s JWS payload: 369s b'' 369s Sending POST request to https://localhost:14000/certZ/3f203f96ef2551e2: 369s { 369s "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vbG9jYWxob3N0OjE0MDAwL215LWFjY291bnQvNWM5Mjg4NDhiNDU4ODVkMiIsICJub25jZSI6ICJ4ZlNRaG5oLTNGVEJMSmNPQzBCaEV3IiwgInVybCI6ICJodHRwczovL2xvY2FsaG9zdDoxNDAwMC9jZXJ0Wi8zZjIwM2Y5NmVmMjU1MWUyIn0", 369s "signature": "cLXwenkRDrud9egSaAGX60sRcSrfDFqH1Fvye27jXBIw-4viyG2CqRetEX6uuuJJYpFtJQqzoJPzM9dKTirAsdfe766-b_i8DxtISmFQVJtST1DSXO1YT7-2DYRFM3e2Ft8fmyG_8kWs8HwVlzoCRwRTcWoCZjN73s2tR-JRQc2Tw-8uvu6_3w3saS9ox1ODxuUHEuouBlWgy1h_4SqlOAgQ3KqTw0xUT5dRmVmhAUPaabtCoXsFTqDaIPftq94zjEjnUWWNfmd-vg-O30gje7XdgkKHkG7zM_Kw_7NfiZsS9-bW472b0DO2XpdTeJXbz0cfM-2Bdp3HEEH7IC_3gw", 369s "payload": "" 369s } 369s /usr/lib/python3/dist-packages/urllib3/connectionpool.py:1097: InsecureRequestWarning: Unverified HTTPS request is being made to host 'localhost'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings 369s warnings.warn( 369s Pebble 2026/02/05 17:45:24 POST /certZ/ -> calling handler() 369s https://localhost:14000 "POST /certZ/3f203f96ef2551e2 HTTP/1.1" 200 None 369s Received response: 369s HTTP 200 369s Cache-Control: public, max-age=0, no-cache 369s Content-Type: application/pem-certificate-chain; charset=utf-8 369s Link: ;rel="index" 369s Replay-Nonce: emNfs-3222usIRqjrRfHmw 369s Date: Thu, 05 Feb 2026 17:45:24 GMT 369s Transfer-Encoding: chunked 369s 369s -----BEGIN CERTIFICATE----- 369s MIICeTCCAWGgAwIBAgIIPyA/lu8lUeIwDQYJKoZIhvcNAQELBQAwKDEmMCQGA1UE 369s AxMdUGViYmxlIEludGVybWVkaWF0ZSBDQSA2ZjNmYjAwHhcNMjYwMjA1MTc0NTIz 369s WhcNMzEwMjA1MTc0NTIyWjAAMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE06wo 369s 6Nn22C391kNEf5TaM9Mc9J5BU5ca8DvKOXmcXBzAsrnt884JZ8Zla8SP1TcFLJMi 369s eKWqkKfSdO5bjUeaoaOBmTCBljAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYI 369s KwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFPty6QS5 369s SnXGJ5rEfQssQAEmL9GnMB8GA1UdIwQYMBaAFMhkX/xSDst+PdCqulXpX0G4z3jZ 369s MBcGA1UdEQEB/wQNMAuCCWxvY2FsaG9zdDANBgkqhkiG9w0BAQsFAAOCAQEAc9WG 369s ep/OPs6+dexflSyi8v5uQQkj5SSw1G2/gIyMiobPB+H1/HaJ8eMZ6gQIoaU4aXsN 369s 2aigfxmwYKnf32SZpyz2Jz6hVoA584duxTEk0WajIZGef/S+HC+ajFQzYeUUlS85 369s LSG7gu2ma99Zz0faxR5+AHvOxV8OvdvONX9cZog+H3Gq2xd0ITztLDUsAKPG0I0k 369s cfuyBvIdPDa/ZkYKUVUEdjlNDr1/Y/PewQdPn+QuEqwxAwUrxnmpxWAxGVucnMNG 369s ngJRuQoB1MqpWgwhcwo6KCKbIxlusYu21EjOJ+yaqcIrHqu9jOoHyxxVACLzaf58 369s FvoqVlw8EGYtw5GwdQ== 369s -----END CERTIFICATE----- 369s -----BEGIN CERTIFICATE----- 369s MIIDUDCCAjigAwIBAgIIbDrLpSj7GlgwDQYJKoZIhvcNAQELBQAwIDEeMBwGA1UE 369s AxMVUGViYmxlIFJvb3QgQ0EgNTA4MWVhMCAXDTI2MDIwNTE3NDUxNloYDzIwNTYw 369s MjA1MTc0NTE2WjAoMSYwJAYDVQQDEx1QZWJibGUgSW50ZXJtZWRpYXRlIENBIDZm 369s M2ZiMDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKvSENgwpz/nDDnT 369s 3YR8GU/blvAQZqeTaVgMDMoTpraiNydpGr0ke64GLRYcsKtUvjbg8GKcoOWNyuFk 369s N28FWUJxGskCH/p/YYbS4dwvZO1DuF4E09JpWszOYzeyDrPqpq827EK0ezD6OjpI 369s nqrALI9KAHbK/jiFwgdG0H0P/a0Ob0iAfGQmkhFR/dVGhsb/LE0AzhzAHeP2eLee 369s cnXg8Ela5HGRcUcqaqaOq/tH51kInzRtE896JNy2/8hn9Tu0uI/1lwrDY9eOojtZ 369s hrMAW1IftfiN9QbfzbOwE+F//ie7B9cd8Z603Kq3FBR90nrZKUvPuUe7ZYiKu13C 369s 3BNEA7sCAwEAAaOBgzCBgDAOBgNVHQ8BAf8EBAMCAoQwHQYDVR0lBBYwFAYIKwYB 369s BQUHAwEGCCsGAQUFBwMCMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFMhkX/xS 369s Dst+PdCqulXpX0G4z3jZMB8GA1UdIwQYMBaAFC9hQQDoZdFwA5W0vYVwH142OMQ6 369s MA0GCSqGSIb3DQEBCwUAA4IBAQCfyHoojl9jwy8CBSOyfAjWVc5KRNaUeh6dG2Kf 369s Xs21oa9pZj+IVToYZkjCYovCn378VyEoOAUMqLwUi3WupZVL3M2TR0zBNho3twRe 369s wxOL7GB0xfzE1OP1lcYApcsHYxGf8E9aFfoQUHnercc2VkR3nSaZv87iKg0Z5vXW 369s xUtRBNobK4bXHKM3pDczJJX74kxyI1R53SsxvG7DTP8UFY+WggFWfVldSLmR1j8m 369s 2ESpL1zQTImlAZi0hy1tEEoSlFWhnESxHfzrwWYTvryee1EtUmuUEjO8AHmF2iG1 369s KwMP0I/6k/I0A0nObGzA3NN2Y9mVRAXAmIaznUXfQoQcZX+U 369s -----END CERTIFICATE----- 369s 369s Storing nonce: emNfs-3222usIRqjrRfHmw 369s Non-standard path(s), might not work with crontab installed by your operating system package manager 369s Creating directory /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/archive. 369s Creating directory /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/live. 369s Writing README to /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/live/README. 369s Creating directory /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/archive/localhost. 369s Creating directory /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/live/localhost. 369s Writing certificate to /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/live/localhost/cert.pem. 369s Writing private key to /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/live/localhost/privkey.pem. 369s Writing chain to /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/live/localhost/chain.pem. 369s Writing full chain to /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/live/localhost/fullchain.pem. 369s Writing README to /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/live/localhost/README. 369s Var account=e633f7320b56a1b7a9854b7075515666 (set by user). 369s Var config_dir=/tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf (set by user). 369s Var work_dir=/tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/work (set by user). 369s Var logs_dir=/tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/logs (set by user). 369s Var server=https://localhost:14000/dir (set by user). 369s 369s Successfully received certificate. 369s Certificate is saved at: /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/live/localhost/fullchain.pem 369s Key is saved at: /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/live/localhost/privkey.pem 369s This certificate expires on 2031-02-05. 369s These files will be updated when the certificate renews. 369s Certbot has set up a scheduled task to automatically renew this certificate in the background. 369s 369s Deploying certificate 369s Requested authenticator nginx and installer nginx 369s Requested authenticator nginx and installer nginx 369s Writing new config /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/renewal/localhost.conf. 369s Notifying user: 369s Successfully received certificate. 369s Certificate is saved at: /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/live/localhost/fullchain.pem 369s Key is saved at: /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/live/localhost/privkey.pem 369s This certificate expires on 2031-02-05. 369s These files will be updated when the certificate renews. 369s Certbot has set up a scheduled task to automatically renew this certificate in the background. 369s 369s Notifying user: Deploying certificate 369s Generating RSA key (2048 bits): /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/work/snakeoil/0000_key.pem 371s Deploying Certificate to VirtualHost /etc/nginx/sites-enabled/default 371s Notifying user: Successfully deployed certificate for localhost to /etc/nginx/sites-enabled/default 371s Successfully deployed certificate for localhost to /etc/nginx/sites-enabled/default 371s Creating backup of /etc/nginx/mime.types 371s Creating backup of /etc/nginx/nginx.conf 371s Creating backup of /etc/nginx/sites-enabled/default 371s Writing nginx conf tree to /etc/nginx/sites-enabled/default: 371s ## 371s # You should look at the following URL's in order to grasp a solid understanding 371s # of Nginx configuration files in order to fully unleash the power of Nginx. 371s # https://www.nginx.com/resources/wiki/start/ 371s # https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/ 371s # https://wiki.debian.org/Nginx/DirectoryStructure 371s # 371s # In most cases, administrators will remove this file from sites-enabled/ and 371s # leave it as reference inside of sites-available where it will continue to be 371s # updated by the nginx packaging team. 371s # 371s # This file will automatically load configuration files provided by other 371s # applications, such as Drupal or Wordpress. These applications will be made 371s # available underneath a path with that package name, such as /drupal8. 371s # 371s # Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples. 371s ## 371s 371s # Default server configuration 371s # 371s server { 371s listen 80 default_server; 371s listen [::]:80 default_server; 371s 371s # SSL configuration 371s # 371s # listen 443 ssl default_server; 371s # listen [::]:443 ssl default_server; 371s # 371s # Note: You should disable gzip for SSL traffic. 371s # See: https://bugs.debian.org/773332 371s # 371s # Read up on ssl_ciphers to ensure a secure configuration. 371s # See: https://bugs.debian.org/765782 371s # 371s # Self signed certs generated by the ssl-cert package 371s # Don't use them in a production server! 371s # 371s # include snippets/snakeoil.conf; 371s 371s root /var/www/html; 371s 371s # Add index.php to the list if you are using PHP 371s index index.html index.htm index.nginx-debian.html; 371s 371s server_name _; 371s 371s location / { 371s # First attempt to serve request as file, then 371s # as directory, then fall back to displaying a 404. 371s try_files $uri $uri/ =404; 371s } 371s 371s # pass PHP scripts to FastCGI server 371s # 371s #location ~ \.php$ { 371s # include snippets/fastcgi-php.conf; 371s # 371s # # With php-fpm (or other unix sockets): 371s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 371s # # With php-cgi (or other tcp sockets): 371s # fastcgi_pass 127.0.0.1:9000; 371s #} 371s 371s # deny access to .htaccess files, if Apache's document root 371s # concurs with nginx's one 371s # 371s #location ~ /\.ht { 371s # deny all; 371s #} 371s } 371s 371s 371s # Virtual Host configuration for example.com 371s # 371s # You can move that to a different file under sites-available/ and symlink that 371s # to sites-enabled/ to enable it. 371s # 371s #server { 371s # listen 80; 371s # listen [::]:80; 371s # 371s # server_name example.com; 371s # 371s # root /var/www/example.com; 371s # index index.html; 371s # 371s # location / { 371s # try_files $uri $uri/ =404; 371s # } 371s #} 371s 371s server { 371s listen 80 ; 371s listen [::]:80 ; 371s 371s # SSL configuration 371s # 371s # listen 443 ssl default_server; 371s # listen [::]:443 ssl default_server; 371s # 371s # Note: You should disable gzip for SSL traffic. 371s # See: https://bugs.debian.org/773332 371s # 371s # Read up on ssl_ciphers to ensure a secure configuration. 371s # See: https://bugs.debian.org/765782 371s # 371s # Self signed certs generated by the ssl-cert package 371s # Don't use them in a production server! 371s # 371s # include snippets/snakeoil.conf; 371s 371s root /var/www/html; 371s 371s # Add index.php to the list if you are using PHP 371s index index.html index.htm index.nginx-debian.html; 371s server_name localhost; # managed by Certbot 371s 371s 371s location / { 371s # First attempt to serve request as file, then 371s # as directory, then fall back to displaying a 404. 371s try_files $uri $uri/ =404; 371s } 371s 371s # pass PHP scripts to FastCGI server 371s # 371s #location ~ \.php$ { 371s # include snippets/fastcgi-php.conf; 371s # 371s # # With php-fpm (or other unix sockets): 371s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 371s # # With php-cgi (or other tcp sockets): 371s # fastcgi_pass 127.0.0.1:9000; 371s #} 371s 371s # deny access to .htaccess files, if Apache's document root 371s # concurs with nginx's one 371s # 371s #location ~ /\.ht { 371s # deny all; 371s #} 371s 371s 371s listen 443 ssl; # managed by Certbot 371s listen [::]:443 ssl ipv6only=on; # managed by Certbot 371s ssl_certificate /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/live/localhost/fullchain.pem; # managed by Certbot 371s ssl_certificate_key /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/live/localhost/privkey.pem; # managed by Certbot 371s include /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/options-ssl-nginx.conf; # managed by Certbot 371s ssl_dhparam /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/ssl-dhparams.pem; # managed by Certbot 371s 371s } 371s Writing nginx conf tree to /etc/nginx/sites-enabled/default: 371s ## 371s # You should look at the following URL's in order to grasp a solid understanding 371s # of Nginx configuration files in order to fully unleash the power of Nginx. 371s # https://www.nginx.com/resources/wiki/start/ 371s # https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/ 371s # https://wiki.debian.org/Nginx/DirectoryStructure 371s # 371s # In most cases, administrators will remove this file from sites-enabled/ and 371s # leave it as reference inside of sites-available where it will continue to be 371s # updated by the nginx packaging team. 371s # 371s # This file will automatically load configuration files provided by other 371s # applications, such as Drupal or Wordpress. These applications will be made 371s # available underneath a path with that package name, such as /drupal8. 371s # 371s # Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples. 371s ## 371s 371s # Default server configuration 371s # 371s server { 371s listen 80 default_server; 371s listen [::]:80 default_server; 371s 371s # SSL configuration 371s # 371s # listen 443 ssl default_server; 371s # listen [::]:443 ssl default_server; 371s # 371s # Note: You should disable gzip for SSL traffic. 371s # See: https://bugs.debian.org/773332 371s # 371s # Read up on ssl_ciphers to ensure a secure configuration. 371s # See: https://bugs.debian.org/765782 371s # 371s # Self signed certs generated by the ssl-cert package 371s # Don't use them in a production server! 371s # 371s # include snippets/snakeoil.conf; 371s 371s root /var/www/html; 371s 371s # Add index.php to the list if you are using PHP 371s index index.html index.htm index.nginx-debian.html; 371s 371s server_name _; 371s 371s location / { 371s # First attempt to serve request as file, then 371s # as directory, then fall back to displaying a 404. 371s try_files $uri $uri/ =404; 371s } 371s 371s # pass PHP scripts to FastCGI server 371s # 371s #location ~ \.php$ { 371s # include snippets/fastcgi-php.conf; 371s # 371s # # With php-fpm (or other unix sockets): 371s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 371s # # With php-cgi (or other tcp sockets): 371s # fastcgi_pass 127.0.0.1:9000; 371s #} 371s 371s # deny access to .htaccess files, if Apache's document root 371s # concurs with nginx's one 371s # 371s #location ~ /\.ht { 371s # deny all; 371s #} 371s } 371s 371s 371s # Virtual Host configuration for example.com 371s # 371s # You can move that to a different file under sites-available/ and symlink that 371s # to sites-enabled/ to enable it. 371s # 371s #server { 371s # listen 80; 371s # listen [::]:80; 371s # 371s # server_name example.com; 371s # 371s # root /var/www/example.com; 371s # index index.html; 371s # 371s # location / { 371s # try_files $uri $uri/ =404; 371s # } 371s #} 371s 371s server { 371s listen 80 ; 371s listen [::]:80 ; 371s 371s # SSL configuration 371s # 371s # listen 443 ssl default_server; 371s # listen [::]:443 ssl default_server; 371s # 371s # Note: You should disable gzip for SSL traffic. 371s # See: https://bugs.debian.org/773332 371s # 371s # Read up on ssl_ciphers to ensure a secure configuration. 371s # See: https://bugs.debian.org/765782 371s # 371s # Self signed certs generated by the ssl-cert package 371s # Don't use them in a production server! 371s # 371s # include snippets/snakeoil.conf; 371s 371s root /var/www/html; 371s 371s # Add index.php to the list if you are using PHP 371s index index.html index.htm index.nginx-debian.html; 371s server_name localhost; # managed by Certbot 371s 371s 371s location / { 371s # First attempt to serve request as file, then 371s # as directory, then fall back to displaying a 404. 371s try_files $uri $uri/ =404; 371s } 371s 371s # pass PHP scripts to FastCGI server 371s # 371s #location ~ \.php$ { 371s # include snippets/fastcgi-php.conf; 371s # 371s # # With php-fpm (or other unix sockets): 371s # fastcgi_pass unix:/run/php/php7.4-fpm.sock; 371s # # With php-cgi (or other tcp sockets): 371s # fastcgi_pass 127.0.0.1:9000; 371s #} 371s 371s # deny access to .htaccess files, if Apache's document root 371s # concurs with nginx's one 371s # 371s #location ~ /\.ht { 371s # deny all; 371s #} 371s 371s 371s listen 443 ssl; # managed by Certbot 371s listen [::]:443 ssl ipv6only=on; # managed by Certbot 371s ssl_certificate /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/live/localhost/fullchain.pem; # managed by Certbot 371s ssl_certificate_key /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/live/localhost/privkey.pem; # managed by Certbot 371s include /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/options-ssl-nginx.conf; # managed by Certbot 371s ssl_dhparam /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/ssl-dhparams.pem; # managed by Certbot 371s 371s } 372s Congratulations! You have successfully enabled HTTPS on https://localhost 372s 372s - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 372s If you like Certbot, please consider supporting our work by: 372s * Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate 372s * Donating to EFF: https://eff.org/donate-le 372s - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 372s Notifying user: Congratulations! You have successfully enabled HTTPS on https://localhost 372s Notifying user: If you like Certbot, please consider supporting our work by: 372s * Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate 372s * Donating to EFF: https://eff.org/donate-le 372s * Uses proxy env variable no_proxy == '127.0.0.1,127.0.1.1,localhost,localdomain' 372s * Host localhost:443 was resolved. 372s * IPv6: ::1 372s * IPv4: 127.0.0.1 372s % Total % Received % Xferd Average Speed Time Time Time Current 372s Dload Upload Total Spent Left Speed 372s 0 0 0 0 0 372s 372s 372s Welcome to nginx! 372s 372s 372s 372s

Welcome to nginx!

372s

If you see this page, the nginx web server is successfully installed and 372s working. Further configuration is required.

372s 372s

For online documentation and support please refer to 372s nginx.org.
372s Commercial support is available at 372s nginx.com.

372s 372s

Thank you for using nginx.

372s 372s 372s 0 0 0 0* Trying [::1]:443... 372s * ALPN: curl offers h2,http/1.1 372s } [5 bytes data] 372s * TLSv1.3 (OUT), TLS handshake, Client hello (1): 372s } [1564 bytes data] 372s * SSL Trust Anchors: 372s * CAfile: /tmp/autopkgtest.DdKLS2/autopkgtest_tmp/certbot/nginx/conf/live/localhost/chain.pem 372s * CApath: /etc/ssl/certs 372s { [5 bytes data] 372s * TLSv1.3 (IN), TLS handshake, Server hello (2): 372s { [1210 bytes data] 372s * TLSv1.3 (IN), TLS change cipher, Change cipher spec (1): 372s { [1 bytes data] 372s * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): 372s { [25 bytes data] 372s * TLSv1.3 (IN), TLS handshake, Certificate (11): 372s { [1507 bytes data] 372s * TLSv1.3 (IN), TLS handshake, CERT verify (15): 372s { [79 bytes data] 372s * TLSv1.3 (IN), TLS handshake, Finished (20): 372s { [52 bytes data] 372s * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): 372s } [1 bytes data] 372s * TLSv1.3 (OUT), TLS handshake, Finished (20): 372s } [52 bytes data] 372s * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519MLKEM768 / id-ecPublicKey 372s * ALPN: server accepted http/1.1 372s * Server certificate: 372s * subject: 372s * start date: Feb 5 17:45:23 2026 GMT 372s * expire date: Feb 5 17:45:22 2031 GMT 372s * issuer: CN=Pebble Intermediate CA 6f3fb0 372s * Certificate level 0: Public key type EC/prime256v1 (256/128 Bits/secBits), signed using sha256WithRSAEncryption 372s * Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption 372s * subjectAltName: "localhost" matches cert's "localhost" 372s * SSL certificate verified via OpenSSL. 372s * Established connection to localhost (::1 port 443) from ::1 port 45220 372s * using HTTP/1.x 372s } [5 bytes data] 372s > GET / HTTP/1.1 372s > Host: localhost 372s > User-Agent: curl/8.18.0 372s > Accept: */* 372s > 372s * Request completely sent off 372s { [5 bytes data] 372s * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): 372s { [57 bytes data] 372s * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): 372s { [57 bytes data] 372s < HTTP/1.1 200 OK 372s < Server: nginx/1.28.1 (Ubuntu) 372s < Date: Thu, 05 Feb 2026 17:45:27 GMT 372s < Content-Type: text/html 372s < Content-Length: 615 372s < Last-Modified: Thu, 05 Feb 2026 17:43:54 GMT 372s < Connection: keep-alive 372s < ETag: "6984d6da-267" 372s < Accept-Ranges: bytes 372s < 372s { [615 bytes data] 372s 100 615 100 615 0 0 13058 0 0 100 615 100 615 0 0 12568 0 0 100 615 100 615 0 0 12563 0 0 372s * Connection #0 to host localhost:443 left intact 372s autopkgtest [17:44:06]: test nginx: -----------------------] 375s nginx PASS 375s autopkgtest [17:44:09]: test nginx: - - - - - - - - - - results - - - - - - - - - - 376s autopkgtest [17:44:10]: @@@@@@@@@@@@@@@@@@@@ summary 376s command1 PASS 376s nginx PASS