https://launchpad.net/~myapps-reviewers/+snap/review-tools/+build/2484118 RUN: /usr/share/launchpad-buildd/bin/builder-prep Kernel version: Linux lcy02-amd64-108 5.4.0-182-generic #202-Ubuntu SMP Fri Apr 26 12:29:36 UTC 2024 x86_64 Buildd toolchain package versions: launchpad-buildd_237~660~ubuntu20.04.1 python3-lpbuildd_237~660~ubuntu20.04.1 sbuild_0.79.0-1ubuntu1 git-build-recipe_0.3.6 git_1:2.25.1-1ubuntu3.11 dpkg-dev_1.19.7ubuntu3.2 python3-debian_0.1.36ubuntu1.1. Syncing the system clock with the buildd NTP service... 15 May 15:32:44 ntpdate[1841]: adjust time server 10.131.248.1 offset 0.000967 sec RUN: /usr/share/launchpad-buildd/bin/in-target unpack-chroot --backend=lxd --series=focal --arch=amd64 SNAPBUILD-2484118 --image-type lxd /home/buildd/filecache-default/ba6dd7e2f3805466faa75c134aad1b11b0f50805 Creating target for build SNAPBUILD-2484118 To start your first container, try: lxc launch ubuntu:20.04 Or for a virtual machine: lxc launch ubuntu:20.04 --vm /usr/lib/python3/dist-packages/pylxd/models/operation.py:76: UserWarning: Attempted to set unknown attribute "location" on instance of "Operation" warnings.warn( RUN: /usr/share/launchpad-buildd/bin/in-target mount-chroot --backend=lxd --series=focal --arch=amd64 SNAPBUILD-2484118 Starting target for build SNAPBUILD-2484118 /usr/lib/python3/dist-packages/pylxd/models/operation.py:76: UserWarning: Attempted to set unknown attribute "location" on instance of "Operation" warnings.warn( Error: Instance is not running /usr/lib/python3/dist-packages/pylxd/models/_model.py:134: UserWarning: Attempted to set unknown attribute "type" on instance of "Container" warnings.warn( /usr/lib/python3/dist-packages/pylxd/models/_model.py:134: UserWarning: Attempted to set unknown attribute "project" on instance of "Container" warnings.warn( Error: Instance is not running Error: Instance is not running Error: Instance is not running RUN: /usr/share/launchpad-buildd/bin/in-target override-sources-list --backend=lxd --series=focal --arch=amd64 SNAPBUILD-2484118 'deb http://ftpmaster.internal/ubuntu focal main restricted universe multiverse' 'deb http://ftpmaster.internal/ubuntu focal-security main restricted universe multiverse' 'deb http://ftpmaster.internal/ubuntu focal-updates main restricted universe multiverse' Overriding sources.list in build-SNAPBUILD-2484118 /usr/lib/python3/dist-packages/pylxd/models/_model.py:134: UserWarning: Attempted to set unknown attribute "type" on instance of "Container" warnings.warn( /usr/lib/python3/dist-packages/pylxd/models/_model.py:134: UserWarning: Attempted to set unknown attribute "project" on instance of "Container" warnings.warn( RUN: /usr/share/launchpad-buildd/bin/in-target update-debian-chroot --backend=lxd --series=focal --arch=amd64 SNAPBUILD-2484118 Updating target for build SNAPBUILD-2484118 Get:1 http://ftpmaster.internal/ubuntu focal InRelease [265 kB] Get:2 http://ftpmaster.internal/ubuntu focal-security InRelease [114 kB] Get:3 http://ftpmaster.internal/ubuntu focal-updates InRelease [114 kB] Get:4 http://ftpmaster.internal/ubuntu focal/main amd64 Packages [970 kB] Get:5 http://ftpmaster.internal/ubuntu focal/main Translation-en [506 kB] Get:6 http://ftpmaster.internal/ubuntu focal/universe amd64 Packages [8628 kB] Get:7 http://ftpmaster.internal/ubuntu focal/universe Translation-en [5124 kB] Get:8 http://ftpmaster.internal/ubuntu focal-security/main amd64 Packages [2951 kB] Get:9 http://ftpmaster.internal/ubuntu focal-security/main Translation-en [442 kB] Get:10 http://ftpmaster.internal/ubuntu focal-security/restricted amd64 Packages [2830 kB] Get:11 http://ftpmaster.internal/ubuntu focal-security/restricted Translation-en [396 kB] Get:12 http://ftpmaster.internal/ubuntu focal-security/universe amd64 Packages [961 kB] Get:13 http://ftpmaster.internal/ubuntu focal-security/universe Translation-en [202 kB] Get:14 http://ftpmaster.internal/ubuntu focal-security/multiverse amd64 Packages [24.0 kB] Get:15 http://ftpmaster.internal/ubuntu focal-security/multiverse Translation-en [5904 B] Get:16 http://ftpmaster.internal/ubuntu focal-updates/main amd64 Packages [3328 kB] Get:17 http://ftpmaster.internal/ubuntu focal-updates/main Translation-en [524 kB] Get:18 http://ftpmaster.internal/ubuntu focal-updates/restricted amd64 Packages [2946 kB] Get:19 http://ftpmaster.internal/ubuntu focal-updates/restricted Translation-en [412 kB] Get:20 http://ftpmaster.internal/ubuntu focal-updates/universe amd64 Packages [1187 kB] Get:21 http://ftpmaster.internal/ubuntu focal-updates/universe Translation-en [284 kB] Get:22 http://ftpmaster.internal/ubuntu focal-updates/multiverse amd64 Packages [26.2 kB] Get:23 http://ftpmaster.internal/ubuntu focal-updates/multiverse Translation-en [7880 B] Fetched 32.2 MB in 6s (5470 kB/s) Reading package lists... Reading package lists... Building dependency tree... Reading state information... Calculating upgrade... The following packages will be upgraded: advancecomp apt base-files bash binutils binutils-common binutils-x86-64-linux-gnu bsdutils build-essential ca-certificates cpp-9 dpkg dpkg-dev e2fsprogs fdisk g++-9 gcc-10-base gcc-9 gcc-9-base gpg gpg-agent gpgconf gpgv gzip libapparmor1 libapt-pkg6.0 libasan5 libatomic1 libbinutils libblkid1 libc-bin libc-dev-bin libc6 libc6-dev libcap2 libcc1-0 libcom-err2 libcryptsetup12 libctf-nobfd0 libctf0 libdpkg-perl libext2fs2 libfdisk1 libgcc-9-dev libgcc-s1 libgcrypt20 libgmp10 libgnutls30 libgomp1 libhogweed5 libip4tc2 libitm1 libjson-c4 libkmod2 liblsan0 liblz4-1 liblzma5 libmount1 libncurses6 libncursesw6 libnettle7 libp11-kit0 libpam-modules libpam-modules-bin libpam-runtime libpam0g libpcre2-8-0 libpcre3 libperl5.30 libprocps8 libquadmath0 libseccomp2 libsepol1 libsmartcols1 libsqlite3-0 libss2 libssl1.1 libstdc++-9-dev libstdc++6 libsystemd0 libtinfo6 libtsan0 libubsan1 libudev1 libuuid1 libzstd1 linux-libc-dev login logsave mount ncurses-base ncurses-bin openssl passwd perl perl-base perl-modules-5.30 pkgbinarymangler procps systemd systemd-sysv systemd-timesyncd tar tzdata ubuntu-keyring util-linux xz-utils zlib1g 108 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Need to get 75.5 MB of archives. After this operation, 28.3 MB of additional disk space will be used. Get:1 http://ftpmaster.internal/ubuntu focal-security/main amd64 libc6-dev amd64 2.31-0ubuntu9.15 [2519 kB] Get:2 http://ftpmaster.internal/ubuntu focal-security/main amd64 libc-dev-bin amd64 2.31-0ubuntu9.15 [71.8 kB] Get:3 http://ftpmaster.internal/ubuntu focal-security/main amd64 linux-libc-dev amd64 5.4.0-182.202 [1134 kB] Get:4 http://ftpmaster.internal/ubuntu focal-security/main amd64 libubsan1 amd64 10.5.0-1ubuntu1~20.04 [785 kB] Get:5 http://ftpmaster.internal/ubuntu focal-security/main amd64 libtsan0 amd64 10.5.0-1ubuntu1~20.04 [2016 kB] Get:6 http://ftpmaster.internal/ubuntu focal-security/main amd64 libquadmath0 amd64 10.5.0-1ubuntu1~20.04 [146 kB] Get:7 http://ftpmaster.internal/ubuntu focal-security/main amd64 liblsan0 amd64 10.5.0-1ubuntu1~20.04 [835 kB] Get:8 http://ftpmaster.internal/ubuntu focal-security/main amd64 libitm1 amd64 10.5.0-1ubuntu1~20.04 [26.2 kB] Get:9 http://ftpmaster.internal/ubuntu focal-security/main amd64 libgomp1 amd64 10.5.0-1ubuntu1~20.04 [102 kB] Get:10 http://ftpmaster.internal/ubuntu focal-security/main amd64 gcc-10-base amd64 10.5.0-1ubuntu1~20.04 [20.8 kB] Get:11 http://ftpmaster.internal/ubuntu focal-security/main amd64 libgcc-s1 amd64 10.5.0-1ubuntu1~20.04 [41.8 kB] Get:12 http://ftpmaster.internal/ubuntu focal-security/main amd64 libcc1-0 amd64 10.5.0-1ubuntu1~20.04 [48.8 kB] Get:13 http://ftpmaster.internal/ubuntu focal-security/main amd64 libatomic1 amd64 10.5.0-1ubuntu1~20.04 [9284 B] Get:14 http://ftpmaster.internal/ubuntu focal-security/main amd64 libstdc++6 amd64 10.5.0-1ubuntu1~20.04 [501 kB] Get:15 http://ftpmaster.internal/ubuntu focal-security/main amd64 libc6 amd64 2.31-0ubuntu9.15 [2723 kB] Get:16 http://ftpmaster.internal/ubuntu focal-updates/main amd64 base-files amd64 11ubuntu5.8 [60.3 kB] Get:17 http://ftpmaster.internal/ubuntu focal-security/main amd64 bash amd64 5.0-6ubuntu1.2 [639 kB] Get:18 http://ftpmaster.internal/ubuntu focal-security/main amd64 bsdutils amd64 1:2.34-0.1ubuntu9.6 [63.3 kB] Get:19 http://ftpmaster.internal/ubuntu focal-security/main amd64 tar amd64 1.30+dfsg-7ubuntu0.20.04.4 [240 kB] Get:20 http://ftpmaster.internal/ubuntu focal-security/main amd64 dpkg amd64 1.19.7ubuntu3.2 [1128 kB] Get:21 http://ftpmaster.internal/ubuntu focal-security/main amd64 gzip amd64 1.10-0ubuntu4.1 [95.2 kB] Get:22 http://ftpmaster.internal/ubuntu focal-security/main amd64 login amd64 1:4.8.1-1ubuntu5.20.04.5 [220 kB] Get:23 http://ftpmaster.internal/ubuntu focal-security/main amd64 ncurses-bin amd64 6.2-0ubuntu2.1 [172 kB] Get:24 http://ftpmaster.internal/ubuntu focal-security/main amd64 libperl5.30 amd64 5.30.0-9ubuntu0.5 [3941 kB] Get:25 http://ftpmaster.internal/ubuntu focal-security/main amd64 perl amd64 5.30.0-9ubuntu0.5 [224 kB] Get:26 http://ftpmaster.internal/ubuntu focal-security/main amd64 perl-base amd64 5.30.0-9ubuntu0.5 [1514 kB] Get:27 http://ftpmaster.internal/ubuntu focal-security/main amd64 perl-modules-5.30 all 5.30.0-9ubuntu0.5 [2739 kB] Get:28 http://ftpmaster.internal/ubuntu focal-security/main amd64 zlib1g amd64 1:1.2.11.dfsg-2ubuntu1.5 [54.2 kB] Get:29 http://ftpmaster.internal/ubuntu focal-security/main amd64 libblkid1 amd64 2.34-0.1ubuntu9.6 [137 kB] Get:30 http://ftpmaster.internal/ubuntu focal-security/main amd64 libuuid1 amd64 2.34-0.1ubuntu9.6 [20.0 kB] Get:31 http://ftpmaster.internal/ubuntu focal-security/main amd64 libfdisk1 amd64 2.34-0.1ubuntu9.6 [175 kB] Get:32 http://ftpmaster.internal/ubuntu focal-security/main amd64 libmount1 amd64 2.34-0.1ubuntu9.6 [149 kB] Get:33 http://ftpmaster.internal/ubuntu focal-security/main amd64 libncurses6 amd64 6.2-0ubuntu2.1 [101 kB] Get:34 http://ftpmaster.internal/ubuntu focal-security/main amd64 libncursesw6 amd64 6.2-0ubuntu2.1 [132 kB] Get:35 http://ftpmaster.internal/ubuntu focal-security/main amd64 libtinfo6 amd64 6.2-0ubuntu2.1 [87.4 kB] Get:36 http://ftpmaster.internal/ubuntu focal-security/main amd64 libsmartcols1 amd64 2.34-0.1ubuntu9.6 [100 kB] Get:37 http://ftpmaster.internal/ubuntu focal-security/main amd64 fdisk amd64 2.34-0.1ubuntu9.6 [120 kB] Get:38 http://ftpmaster.internal/ubuntu focal-security/main amd64 util-linux amd64 2.34-0.1ubuntu9.6 [1022 kB] Get:39 http://ftpmaster.internal/ubuntu focal-security/main amd64 libc-bin amd64 2.31-0ubuntu9.15 [634 kB] Get:40 http://ftpmaster.internal/ubuntu focal-security/main amd64 ncurses-base all 6.2-0ubuntu2.1 [18.9 kB] Get:41 http://ftpmaster.internal/ubuntu focal-security/main amd64 libgcrypt20 amd64 1.8.5-5ubuntu1.1 [420 kB] Get:42 http://ftpmaster.internal/ubuntu focal-security/main amd64 liblz4-1 amd64 1.9.2-2ubuntu0.20.04.1 [56.1 kB] Get:43 http://ftpmaster.internal/ubuntu focal-security/main amd64 liblzma5 amd64 5.2.4-1ubuntu1.1 [91.8 kB] Get:44 http://ftpmaster.internal/ubuntu focal-updates/main amd64 systemd-timesyncd amd64 245.4-4ubuntu3.23 [28.1 kB] Get:45 http://ftpmaster.internal/ubuntu focal-updates/main amd64 systemd-sysv amd64 245.4-4ubuntu3.23 [10.3 kB] Get:46 http://ftpmaster.internal/ubuntu focal-updates/main amd64 libapparmor1 amd64 2.13.3-7ubuntu5.3 [35.4 kB] Get:47 http://ftpmaster.internal/ubuntu focal-security/main amd64 libcap2 amd64 1:2.32-1ubuntu0.1 [15.8 kB] Get:48 http://ftpmaster.internal/ubuntu focal-security/main amd64 libjson-c4 amd64 0.13.1+dfsg-7ubuntu0.3 [29.3 kB] Get:49 http://ftpmaster.internal/ubuntu focal-security/main amd64 libssl1.1 amd64 1.1.1f-1ubuntu2.22 [1323 kB] Get:50 http://ftpmaster.internal/ubuntu focal-security/main amd64 libcryptsetup12 amd64 2:2.2.2-3ubuntu2.4 [166 kB] Get:51 http://ftpmaster.internal/ubuntu focal-security/main amd64 libgmp10 amd64 2:6.2.0+dfsg-4ubuntu0.1 [241 kB] Get:52 http://ftpmaster.internal/ubuntu focal-security/main amd64 libnettle7 amd64 3.5.1+really3.5.1-2ubuntu0.2 [115 kB] Get:53 http://ftpmaster.internal/ubuntu focal-security/main amd64 libhogweed5 amd64 3.5.1+really3.5.1-2ubuntu0.2 [138 kB] Get:54 http://ftpmaster.internal/ubuntu focal-security/main amd64 libp11-kit0 amd64 0.23.20-1ubuntu0.1 [188 kB] Get:55 http://ftpmaster.internal/ubuntu focal-security/main amd64 libgnutls30 amd64 3.6.13-2ubuntu1.11 [828 kB] Get:56 http://ftpmaster.internal/ubuntu focal-updates/main amd64 libip4tc2 amd64 1.8.4-3ubuntu2.1 [19.1 kB] Get:57 http://ftpmaster.internal/ubuntu focal-security/main amd64 libzstd1 amd64 1.4.4+dfsg-3ubuntu0.1 [237 kB] Get:58 http://ftpmaster.internal/ubuntu focal-updates/main amd64 libkmod2 amd64 27-1ubuntu2.1 [45.3 kB] Get:59 http://ftpmaster.internal/ubuntu focal-security/main amd64 libpam0g amd64 1.3.1-5ubuntu4.7 [55.4 kB] Get:60 http://ftpmaster.internal/ubuntu focal-security/main amd64 libpcre2-8-0 amd64 10.34-7ubuntu0.1 [198 kB] Get:61 http://ftpmaster.internal/ubuntu focal-security/main amd64 libseccomp2 amd64 2.5.1-1ubuntu1~20.04.2 [42.5 kB] Get:62 http://ftpmaster.internal/ubuntu focal-security/main amd64 mount amd64 2.34-0.1ubuntu9.6 [115 kB] Get:63 http://ftpmaster.internal/ubuntu focal-updates/main amd64 systemd amd64 245.4-4ubuntu3.23 [3811 kB] Get:64 http://ftpmaster.internal/ubuntu focal-updates/main amd64 libsystemd0 amd64 245.4-4ubuntu3.23 [268 kB] Get:65 http://ftpmaster.internal/ubuntu focal-updates/main amd64 libudev1 amd64 245.4-4ubuntu3.23 [75.6 kB] Get:66 http://ftpmaster.internal/ubuntu focal-updates/main amd64 libapt-pkg6.0 amd64 2.0.10 [843 kB] Get:67 http://ftpmaster.internal/ubuntu focal-security/main amd64 gpgv amd64 2.2.19-3ubuntu2.2 [200 kB] Get:68 http://ftpmaster.internal/ubuntu focal-updates/main amd64 ubuntu-keyring all 2020.02.11.4 [22.1 kB] Get:69 http://ftpmaster.internal/ubuntu focal-updates/main amd64 apt amd64 2.0.10 [1280 kB] Get:70 http://ftpmaster.internal/ubuntu focal-security/main amd64 libpam-modules-bin amd64 1.3.1-5ubuntu4.7 [41.2 kB] Get:71 http://ftpmaster.internal/ubuntu focal-security/main amd64 libpam-modules amd64 1.3.1-5ubuntu4.7 [261 kB] Get:72 http://ftpmaster.internal/ubuntu focal-security/main amd64 logsave amd64 1.45.5-2ubuntu1.1 [10.2 kB] Get:73 http://ftpmaster.internal/ubuntu focal-security/main amd64 libext2fs2 amd64 1.45.5-2ubuntu1.1 [183 kB] Get:74 http://ftpmaster.internal/ubuntu focal-security/main amd64 e2fsprogs amd64 1.45.5-2ubuntu1.1 [527 kB] Get:75 http://ftpmaster.internal/ubuntu focal-security/main amd64 libpam-runtime all 1.3.1-5ubuntu4.7 [37.3 kB] Get:76 http://ftpmaster.internal/ubuntu focal-security/main amd64 libpcre3 amd64 2:8.39-12ubuntu0.1 [232 kB] Get:77 http://ftpmaster.internal/ubuntu focal-security/main amd64 libsepol1 amd64 3.0-1ubuntu0.1 [252 kB] Get:78 http://ftpmaster.internal/ubuntu focal-security/main amd64 passwd amd64 1:4.8.1-1ubuntu5.20.04.5 [797 kB] Get:79 http://ftpmaster.internal/ubuntu focal-security/main amd64 libcom-err2 amd64 1.45.5-2ubuntu1.1 [9548 B] Get:80 http://ftpmaster.internal/ubuntu focal-security/main amd64 libprocps8 amd64 2:3.3.16-1ubuntu2.4 [33.1 kB] Get:81 http://ftpmaster.internal/ubuntu focal-security/main amd64 libss2 amd64 1.45.5-2ubuntu1.1 [11.3 kB] Get:82 http://ftpmaster.internal/ubuntu focal-security/main amd64 procps amd64 2:3.3.16-1ubuntu2.4 [232 kB] Get:83 http://ftpmaster.internal/ubuntu focal-security/main amd64 openssl amd64 1.1.1f-1ubuntu2.22 [622 kB] Get:84 http://ftpmaster.internal/ubuntu focal-security/main amd64 ca-certificates all 20230311ubuntu0.20.04.1 [152 kB] Get:85 http://ftpmaster.internal/ubuntu focal-security/main amd64 libsqlite3-0 amd64 3.31.1-4ubuntu0.6 [549 kB] Get:86 http://ftpmaster.internal/ubuntu focal-security/main amd64 tzdata all 2024a-0ubuntu0.20.04 [301 kB] Get:87 http://ftpmaster.internal/ubuntu focal-security/main amd64 xz-utils amd64 5.2.4-1ubuntu1.1 [82.6 kB] Get:88 http://ftpmaster.internal/ubuntu focal-security/main amd64 advancecomp amd64 2.1-2.1ubuntu0.20.04.1 [201 kB] Get:89 http://ftpmaster.internal/ubuntu focal-security/main amd64 libctf0 amd64 2.34-6ubuntu1.9 [46.6 kB] Get:90 http://ftpmaster.internal/ubuntu focal-security/main amd64 binutils-x86-64-linux-gnu amd64 2.34-6ubuntu1.9 [1614 kB] Get:91 http://ftpmaster.internal/ubuntu focal-security/main amd64 libbinutils amd64 2.34-6ubuntu1.9 [475 kB] Get:92 http://ftpmaster.internal/ubuntu focal-security/main amd64 binutils amd64 2.34-6ubuntu1.9 [3380 B] Get:93 http://ftpmaster.internal/ubuntu focal-security/main amd64 binutils-common amd64 2.34-6ubuntu1.9 [208 kB] Get:94 http://ftpmaster.internal/ubuntu focal-security/main amd64 libctf-nobfd0 amd64 2.34-6ubuntu1.9 [48.2 kB] Get:95 http://ftpmaster.internal/ubuntu focal-security/main amd64 dpkg-dev all 1.19.7ubuntu3.2 [679 kB] Get:96 http://ftpmaster.internal/ubuntu focal-security/main amd64 libdpkg-perl all 1.19.7ubuntu3.2 [231 kB] Get:97 http://ftpmaster.internal/ubuntu focal-updates/main amd64 build-essential amd64 12.8ubuntu1.1 [4664 B] Get:98 http://ftpmaster.internal/ubuntu focal-security/main amd64 libasan5 amd64 9.4.0-1ubuntu1~20.04.2 [2752 kB] Get:99 http://ftpmaster.internal/ubuntu focal-security/main amd64 g++-9 amd64 9.4.0-1ubuntu1~20.04.2 [8421 kB] Get:100 http://ftpmaster.internal/ubuntu focal-security/main amd64 gcc-9 amd64 9.4.0-1ubuntu1~20.04.2 [8276 kB] Get:101 http://ftpmaster.internal/ubuntu focal-security/main amd64 libstdc++-9-dev amd64 9.4.0-1ubuntu1~20.04.2 [1722 kB] Get:102 http://ftpmaster.internal/ubuntu focal-security/main amd64 libgcc-9-dev amd64 9.4.0-1ubuntu1~20.04.2 [2359 kB] Get:103 http://ftpmaster.internal/ubuntu focal-security/main amd64 cpp-9 amd64 9.4.0-1ubuntu1~20.04.2 [7502 kB] Get:104 http://ftpmaster.internal/ubuntu focal-security/main amd64 gcc-9-base amd64 9.4.0-1ubuntu1~20.04.2 [18.9 kB] Get:105 http://ftpmaster.internal/ubuntu focal-security/main amd64 gpg amd64 2.2.19-3ubuntu2.2 [482 kB] Get:106 http://ftpmaster.internal/ubuntu focal-security/main amd64 gpgconf amd64 2.2.19-3ubuntu2.2 [124 kB] Get:107 http://ftpmaster.internal/ubuntu focal-security/main amd64 gpg-agent amd64 2.2.19-3ubuntu2.2 [232 kB] Get:108 http://ftpmaster.internal/ubuntu focal-updates/main amd64 pkgbinarymangler all 144.20.04.0 [57.8 kB] debconf: delaying package configuration, since apt-utils is not installed Fetched 75.5 MB in 1s (66.3 MB/s) (Reading database ... 12816 files and directories currently installed.) Preparing to unpack .../0-libc6-dev_2.31-0ubuntu9.15_amd64.deb ... Unpacking libc6-dev:amd64 (2.31-0ubuntu9.15) over (2.31-0ubuntu9) ... Preparing to unpack .../1-libc-dev-bin_2.31-0ubuntu9.15_amd64.deb ... Unpacking libc-dev-bin (2.31-0ubuntu9.15) over (2.31-0ubuntu9) ... Preparing to unpack .../2-linux-libc-dev_5.4.0-182.202_amd64.deb ... Unpacking linux-libc-dev:amd64 (5.4.0-182.202) over (5.4.0-26.30) ... Preparing to unpack .../3-libubsan1_10.5.0-1ubuntu1~20.04_amd64.deb ... Unpacking libubsan1:amd64 (10.5.0-1ubuntu1~20.04) over (10-20200411-0ubuntu1) ... Preparing to unpack .../4-libtsan0_10.5.0-1ubuntu1~20.04_amd64.deb ... Unpacking libtsan0:amd64 (10.5.0-1ubuntu1~20.04) over (10-20200411-0ubuntu1) ... Preparing to unpack .../5-libquadmath0_10.5.0-1ubuntu1~20.04_amd64.deb ... Unpacking libquadmath0:amd64 (10.5.0-1ubuntu1~20.04) over (10-20200411-0ubuntu1) ... Preparing to unpack .../6-liblsan0_10.5.0-1ubuntu1~20.04_amd64.deb ... Unpacking liblsan0:amd64 (10.5.0-1ubuntu1~20.04) over (10-20200411-0ubuntu1) ... Preparing to unpack .../7-libitm1_10.5.0-1ubuntu1~20.04_amd64.deb ... Unpacking libitm1:amd64 (10.5.0-1ubuntu1~20.04) over (10-20200411-0ubuntu1) ... Preparing to unpack .../8-libgomp1_10.5.0-1ubuntu1~20.04_amd64.deb ... Unpacking libgomp1:amd64 (10.5.0-1ubuntu1~20.04) over (10-20200411-0ubuntu1) ... Preparing to unpack .../9-gcc-10-base_10.5.0-1ubuntu1~20.04_amd64.deb ... Unpacking gcc-10-base:amd64 (10.5.0-1ubuntu1~20.04) over (10-20200411-0ubuntu1) ... Setting up gcc-10-base:amd64 (10.5.0-1ubuntu1~20.04) ... (Reading database ... 12813 files and directories currently installed.) Preparing to unpack .../libgcc-s1_10.5.0-1ubuntu1~20.04_amd64.deb ... Unpacking libgcc-s1:amd64 (10.5.0-1ubuntu1~20.04) over (10-20200411-0ubuntu1) ... Setting up libgcc-s1:amd64 (10.5.0-1ubuntu1~20.04) ... (Reading database ... 12813 files and directories currently installed.) Preparing to unpack .../libcc1-0_10.5.0-1ubuntu1~20.04_amd64.deb ... Unpacking libcc1-0:amd64 (10.5.0-1ubuntu1~20.04) over (10-20200411-0ubuntu1) ... Preparing to unpack .../libatomic1_10.5.0-1ubuntu1~20.04_amd64.deb ... Unpacking libatomic1:amd64 (10.5.0-1ubuntu1~20.04) over (10-20200411-0ubuntu1) ... Preparing to unpack .../libstdc++6_10.5.0-1ubuntu1~20.04_amd64.deb ... Unpacking libstdc++6:amd64 (10.5.0-1ubuntu1~20.04) over (10-20200411-0ubuntu1) ... Setting up libstdc++6:amd64 (10.5.0-1ubuntu1~20.04) ... (Reading database ... 12813 files and directories currently installed.) Preparing to unpack .../libc6_2.31-0ubuntu9.15_amd64.deb ... Unpacking libc6:amd64 (2.31-0ubuntu9.15) over (2.31-0ubuntu9) ... Setting up libc6:amd64 (2.31-0ubuntu9.15) ... (Reading database ... 12813 files and directories currently installed.) Preparing to unpack .../base-files_11ubuntu5.8_amd64.deb ... /usr/sbin/policy-rc.d returned 101, not running 'stop motd-news.service' /usr/sbin/policy-rc.d returned 101, not running 'stop motd-news.timer' Unpacking base-files (11ubuntu5.8) over (11ubuntu5) ... Setting up base-files (11ubuntu5.8) ... Installing new version of config file /etc/issue ... Installing new version of config file /etc/issue.net ... Installing new version of config file /etc/lsb-release ... Installing new version of config file /etc/update-motd.d/10-help-text ... Installing new version of config file /etc/update-motd.d/50-motd-news ... /usr/sbin/policy-rc.d returned 101, not running 'start motd-news.timer' /usr/sbin/policy-rc.d returned 101, not running 'start motd-news.service' Removing obsolete conffile /etc/default/motd-news ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../bash_5.0-6ubuntu1.2_amd64.deb ... Unpacking bash (5.0-6ubuntu1.2) over (5.0-6ubuntu1) ... Setting up bash (5.0-6ubuntu1.2) ... update-alternatives: using /usr/share/man/man7/bash-builtins.7.gz to provide /usr/share/man/man7/builtins.7.gz (builtins.7.gz) in auto mode (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../bsdutils_1%3a2.34-0.1ubuntu9.6_amd64.deb ... Unpacking bsdutils (1:2.34-0.1ubuntu9.6) over (1:2.34-0.1ubuntu9) ... Setting up bsdutils (1:2.34-0.1ubuntu9.6) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../tar_1.30+dfsg-7ubuntu0.20.04.4_amd64.deb ... Unpacking tar (1.30+dfsg-7ubuntu0.20.04.4) over (1.30+dfsg-7) ... Setting up tar (1.30+dfsg-7ubuntu0.20.04.4) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../dpkg_1.19.7ubuntu3.2_amd64.deb ... Unpacking dpkg (1.19.7ubuntu3.2) over (1.19.7ubuntu3) ... Setting up dpkg (1.19.7ubuntu3.2) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../gzip_1.10-0ubuntu4.1_amd64.deb ... Unpacking gzip (1.10-0ubuntu4.1) over (1.10-0ubuntu4) ... Setting up gzip (1.10-0ubuntu4.1) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../login_1%3a4.8.1-1ubuntu5.20.04.5_amd64.deb ... Unpacking login (1:4.8.1-1ubuntu5.20.04.5) over (1:4.8.1-1ubuntu5) ... Setting up login (1:4.8.1-1ubuntu5.20.04.5) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../ncurses-bin_6.2-0ubuntu2.1_amd64.deb ... Unpacking ncurses-bin (6.2-0ubuntu2.1) over (6.2-0ubuntu2) ... Setting up ncurses-bin (6.2-0ubuntu2.1) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../libperl5.30_5.30.0-9ubuntu0.5_amd64.deb ... Unpacking libperl5.30:amd64 (5.30.0-9ubuntu0.5) over (5.30.0-9build1) ... Preparing to unpack .../perl_5.30.0-9ubuntu0.5_amd64.deb ... Unpacking perl (5.30.0-9ubuntu0.5) over (5.30.0-9build1) ... Preparing to unpack .../perl-base_5.30.0-9ubuntu0.5_amd64.deb ... Unpacking perl-base (5.30.0-9ubuntu0.5) over (5.30.0-9build1) ... Setting up perl-base (5.30.0-9ubuntu0.5) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../perl-modules-5.30_5.30.0-9ubuntu0.5_all.deb ... Unpacking perl-modules-5.30 (5.30.0-9ubuntu0.5) over (5.30.0-9build1) ... Preparing to unpack .../zlib1g_1%3a1.2.11.dfsg-2ubuntu1.5_amd64.deb ... Unpacking zlib1g:amd64 (1:1.2.11.dfsg-2ubuntu1.5) over (1:1.2.11.dfsg-2ubuntu1) ... Setting up zlib1g:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../libblkid1_2.34-0.1ubuntu9.6_amd64.deb ... Unpacking libblkid1:amd64 (2.34-0.1ubuntu9.6) over (2.34-0.1ubuntu9) ... Setting up libblkid1:amd64 (2.34-0.1ubuntu9.6) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../libuuid1_2.34-0.1ubuntu9.6_amd64.deb ... Unpacking libuuid1:amd64 (2.34-0.1ubuntu9.6) over (2.34-0.1ubuntu9) ... Setting up libuuid1:amd64 (2.34-0.1ubuntu9.6) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../libfdisk1_2.34-0.1ubuntu9.6_amd64.deb ... Unpacking libfdisk1:amd64 (2.34-0.1ubuntu9.6) over (2.34-0.1ubuntu9) ... Preparing to unpack .../libmount1_2.34-0.1ubuntu9.6_amd64.deb ... Unpacking libmount1:amd64 (2.34-0.1ubuntu9.6) over (2.34-0.1ubuntu9) ... Setting up libmount1:amd64 (2.34-0.1ubuntu9.6) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../libncurses6_6.2-0ubuntu2.1_amd64.deb ... Unpacking libncurses6:amd64 (6.2-0ubuntu2.1) over (6.2-0ubuntu2) ... Preparing to unpack .../libncursesw6_6.2-0ubuntu2.1_amd64.deb ... Unpacking libncursesw6:amd64 (6.2-0ubuntu2.1) over (6.2-0ubuntu2) ... Preparing to unpack .../libtinfo6_6.2-0ubuntu2.1_amd64.deb ... Unpacking libtinfo6:amd64 (6.2-0ubuntu2.1) over (6.2-0ubuntu2) ... Setting up libtinfo6:amd64 (6.2-0ubuntu2.1) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../libsmartcols1_2.34-0.1ubuntu9.6_amd64.deb ... Unpacking libsmartcols1:amd64 (2.34-0.1ubuntu9.6) over (2.34-0.1ubuntu9) ... Setting up libsmartcols1:amd64 (2.34-0.1ubuntu9.6) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../fdisk_2.34-0.1ubuntu9.6_amd64.deb ... Unpacking fdisk (2.34-0.1ubuntu9.6) over (2.34-0.1ubuntu9) ... Preparing to unpack .../util-linux_2.34-0.1ubuntu9.6_amd64.deb ... Unpacking util-linux (2.34-0.1ubuntu9.6) over (2.34-0.1ubuntu9) ... Setting up util-linux (2.34-0.1ubuntu9.6) ... /usr/sbin/policy-rc.d returned 101, not running 'restart fstrim.timer' /usr/sbin/policy-rc.d returned 101, not running 'try-restart fstrim.service fstrim.timer' (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../libc-bin_2.31-0ubuntu9.15_amd64.deb ... Unpacking libc-bin (2.31-0ubuntu9.15) over (2.31-0ubuntu9) ... Setting up libc-bin (2.31-0ubuntu9.15) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../ncurses-base_6.2-0ubuntu2.1_all.deb ... Unpacking ncurses-base (6.2-0ubuntu2.1) over (6.2-0ubuntu2) ... Setting up ncurses-base (6.2-0ubuntu2.1) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../libgcrypt20_1.8.5-5ubuntu1.1_amd64.deb ... Unpacking libgcrypt20:amd64 (1.8.5-5ubuntu1.1) over (1.8.5-5ubuntu1) ... Setting up libgcrypt20:amd64 (1.8.5-5ubuntu1.1) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../liblz4-1_1.9.2-2ubuntu0.20.04.1_amd64.deb ... Unpacking liblz4-1:amd64 (1.9.2-2ubuntu0.20.04.1) over (1.9.2-2) ... Setting up liblz4-1:amd64 (1.9.2-2ubuntu0.20.04.1) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../liblzma5_5.2.4-1ubuntu1.1_amd64.deb ... Unpacking liblzma5:amd64 (5.2.4-1ubuntu1.1) over (5.2.4-1) ... Setting up liblzma5:amd64 (5.2.4-1ubuntu1.1) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../0-systemd-timesyncd_245.4-4ubuntu3.23_amd64.deb ... Unpacking systemd-timesyncd (245.4-4ubuntu3.23) over (245.4-4ubuntu3) ... Preparing to unpack .../1-systemd-sysv_245.4-4ubuntu3.23_amd64.deb ... Unpacking systemd-sysv (245.4-4ubuntu3.23) over (245.4-4ubuntu3) ... Preparing to unpack .../2-libapparmor1_2.13.3-7ubuntu5.3_amd64.deb ... Unpacking libapparmor1:amd64 (2.13.3-7ubuntu5.3) over (2.13.3-7ubuntu5) ... Preparing to unpack .../3-libcap2_1%3a2.32-1ubuntu0.1_amd64.deb ... Unpacking libcap2:amd64 (1:2.32-1ubuntu0.1) over (1:2.32-1) ... Preparing to unpack .../4-libjson-c4_0.13.1+dfsg-7ubuntu0.3_amd64.deb ... Unpacking libjson-c4:amd64 (0.13.1+dfsg-7ubuntu0.3) over (0.13.1+dfsg-7) ... Preparing to unpack .../5-libssl1.1_1.1.1f-1ubuntu2.22_amd64.deb ... Unpacking libssl1.1:amd64 (1.1.1f-1ubuntu2.22) over (1.1.1f-1ubuntu2) ... Preparing to unpack .../6-libcryptsetup12_2%3a2.2.2-3ubuntu2.4_amd64.deb ... Unpacking libcryptsetup12:amd64 (2:2.2.2-3ubuntu2.4) over (2:2.2.2-3ubuntu2) ... Preparing to unpack .../7-libgmp10_2%3a6.2.0+dfsg-4ubuntu0.1_amd64.deb ... Unpacking libgmp10:amd64 (2:6.2.0+dfsg-4ubuntu0.1) over (2:6.2.0+dfsg-4) ... Setting up libgmp10:amd64 (2:6.2.0+dfsg-4ubuntu0.1) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../libnettle7_3.5.1+really3.5.1-2ubuntu0.2_amd64.deb ... Unpacking libnettle7:amd64 (3.5.1+really3.5.1-2ubuntu0.2) over (3.5.1+really3.5.1-2) ... Setting up libnettle7:amd64 (3.5.1+really3.5.1-2ubuntu0.2) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../libhogweed5_3.5.1+really3.5.1-2ubuntu0.2_amd64.deb ... Unpacking libhogweed5:amd64 (3.5.1+really3.5.1-2ubuntu0.2) over (3.5.1+really3.5.1-2) ... Setting up libhogweed5:amd64 (3.5.1+really3.5.1-2ubuntu0.2) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../libp11-kit0_0.23.20-1ubuntu0.1_amd64.deb ... Unpacking libp11-kit0:amd64 (0.23.20-1ubuntu0.1) over (0.23.20-1build1) ... Setting up libp11-kit0:amd64 (0.23.20-1ubuntu0.1) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../libgnutls30_3.6.13-2ubuntu1.11_amd64.deb ... Unpacking libgnutls30:amd64 (3.6.13-2ubuntu1.11) over (3.6.13-2ubuntu1) ... Setting up libgnutls30:amd64 (3.6.13-2ubuntu1.11) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../libip4tc2_1.8.4-3ubuntu2.1_amd64.deb ... Unpacking libip4tc2:amd64 (1.8.4-3ubuntu2.1) over (1.8.4-3ubuntu2) ... Preparing to unpack .../libzstd1_1.4.4+dfsg-3ubuntu0.1_amd64.deb ... Unpacking libzstd1:amd64 (1.4.4+dfsg-3ubuntu0.1) over (1.4.4+dfsg-3) ... Setting up libzstd1:amd64 (1.4.4+dfsg-3ubuntu0.1) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../libkmod2_27-1ubuntu2.1_amd64.deb ... Unpacking libkmod2:amd64 (27-1ubuntu2.1) over (27-1ubuntu2) ... Preparing to unpack .../libpam0g_1.3.1-5ubuntu4.7_amd64.deb ... Unpacking libpam0g:amd64 (1.3.1-5ubuntu4.7) over (1.3.1-5ubuntu4) ... Setting up libpam0g:amd64 (1.3.1-5ubuntu4.7) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../libpcre2-8-0_10.34-7ubuntu0.1_amd64.deb ... Unpacking libpcre2-8-0:amd64 (10.34-7ubuntu0.1) over (10.34-7) ... Setting up libpcre2-8-0:amd64 (10.34-7ubuntu0.1) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../libseccomp2_2.5.1-1ubuntu1~20.04.2_amd64.deb ... Unpacking libseccomp2:amd64 (2.5.1-1ubuntu1~20.04.2) over (2.4.3-1ubuntu1) ... Setting up libseccomp2:amd64 (2.5.1-1ubuntu1~20.04.2) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../mount_2.34-0.1ubuntu9.6_amd64.deb ... Unpacking mount (2.34-0.1ubuntu9.6) over (2.34-0.1ubuntu9) ... Preparing to unpack .../systemd_245.4-4ubuntu3.23_amd64.deb ... Unpacking systemd (245.4-4ubuntu3.23) over (245.4-4ubuntu3) ... Preparing to unpack .../libsystemd0_245.4-4ubuntu3.23_amd64.deb ... Unpacking libsystemd0:amd64 (245.4-4ubuntu3.23) over (245.4-4ubuntu3) ... Setting up libsystemd0:amd64 (245.4-4ubuntu3.23) ... (Reading database ... 12813 files and directories currently installed.) Preparing to unpack .../libudev1_245.4-4ubuntu3.23_amd64.deb ... Unpacking libudev1:amd64 (245.4-4ubuntu3.23) over (245.4-4ubuntu3) ... Setting up libudev1:amd64 (245.4-4ubuntu3.23) ... (Reading database ... 12813 files and directories currently installed.) Preparing to unpack .../libapt-pkg6.0_2.0.10_amd64.deb ... Unpacking libapt-pkg6.0:amd64 (2.0.10) over (2.0.2) ... Setting up libapt-pkg6.0:amd64 (2.0.10) ... (Reading database ... 12813 files and directories currently installed.) Preparing to unpack .../gpgv_2.2.19-3ubuntu2.2_amd64.deb ... Unpacking gpgv (2.2.19-3ubuntu2.2) over (2.2.19-3ubuntu2) ... Setting up gpgv (2.2.19-3ubuntu2.2) ... (Reading database ... 12813 files and directories currently installed.) Preparing to unpack .../ubuntu-keyring_2020.02.11.4_all.deb ... Unpacking ubuntu-keyring (2020.02.11.4) over (2020.02.11.2) ... Setting up ubuntu-keyring (2020.02.11.4) ... (Reading database ... 12813 files and directories currently installed.) Preparing to unpack .../archives/apt_2.0.10_amd64.deb ... Unpacking apt (2.0.10) over (2.0.2) ... Setting up apt (2.0.10) ... Removing obsolete conffile /etc/kernel/postinst.d/apt-auto-removal ... /usr/sbin/policy-rc.d returned 101, not running 'restart apt-daily-upgrade.timer apt-daily.timer' (Reading database ... 12810 files and directories currently installed.) Preparing to unpack .../libpam-modules-bin_1.3.1-5ubuntu4.7_amd64.deb ... Unpacking libpam-modules-bin (1.3.1-5ubuntu4.7) over (1.3.1-5ubuntu4) ... Setting up libpam-modules-bin (1.3.1-5ubuntu4.7) ... (Reading database ... 12812 files and directories currently installed.) Preparing to unpack .../libpam-modules_1.3.1-5ubuntu4.7_amd64.deb ... Unpacking libpam-modules:amd64 (1.3.1-5ubuntu4.7) over (1.3.1-5ubuntu4) ... Setting up libpam-modules:amd64 (1.3.1-5ubuntu4.7) ... (Reading database ... 12816 files and directories currently installed.) Preparing to unpack .../logsave_1.45.5-2ubuntu1.1_amd64.deb ... Unpacking logsave (1.45.5-2ubuntu1.1) over (1.45.5-2ubuntu1) ... Preparing to unpack .../libext2fs2_1.45.5-2ubuntu1.1_amd64.deb ... Unpacking libext2fs2:amd64 (1.45.5-2ubuntu1.1) over (1.45.5-2ubuntu1) ... Setting up libext2fs2:amd64 (1.45.5-2ubuntu1.1) ... (Reading database ... 12816 files and directories currently installed.) Preparing to unpack .../e2fsprogs_1.45.5-2ubuntu1.1_amd64.deb ... Unpacking e2fsprogs (1.45.5-2ubuntu1.1) over (1.45.5-2ubuntu1) ... Preparing to unpack .../libpam-runtime_1.3.1-5ubuntu4.7_all.deb ... Unpacking libpam-runtime (1.3.1-5ubuntu4.7) over (1.3.1-5ubuntu4) ... Setting up libpam-runtime (1.3.1-5ubuntu4.7) ... (Reading database ... 12816 files and directories currently installed.) Preparing to unpack .../libpcre3_2%3a8.39-12ubuntu0.1_amd64.deb ... Unpacking libpcre3:amd64 (2:8.39-12ubuntu0.1) over (2:8.39-12build1) ... Setting up libpcre3:amd64 (2:8.39-12ubuntu0.1) ... (Reading database ... 12816 files and directories currently installed.) Preparing to unpack .../libsepol1_3.0-1ubuntu0.1_amd64.deb ... Unpacking libsepol1:amd64 (3.0-1ubuntu0.1) over (3.0-1) ... Setting up libsepol1:amd64 (3.0-1ubuntu0.1) ... (Reading database ... 12816 files and directories currently installed.) Preparing to unpack .../passwd_1%3a4.8.1-1ubuntu5.20.04.5_amd64.deb ... Unpacking passwd (1:4.8.1-1ubuntu5.20.04.5) over (1:4.8.1-1ubuntu5) ... Setting up passwd (1:4.8.1-1ubuntu5.20.04.5) ... (Reading database ... 12816 files and directories currently installed.) Preparing to unpack .../00-libcom-err2_1.45.5-2ubuntu1.1_amd64.deb ... Unpacking libcom-err2:amd64 (1.45.5-2ubuntu1.1) over (1.45.5-2ubuntu1) ... Preparing to unpack .../01-libprocps8_2%3a3.3.16-1ubuntu2.4_amd64.deb ... Unpacking libprocps8:amd64 (2:3.3.16-1ubuntu2.4) over (2:3.3.16-1ubuntu2) ... Preparing to unpack .../02-libss2_1.45.5-2ubuntu1.1_amd64.deb ... Unpacking libss2:amd64 (1.45.5-2ubuntu1.1) over (1.45.5-2ubuntu1) ... Preparing to unpack .../03-procps_2%3a3.3.16-1ubuntu2.4_amd64.deb ... Unpacking procps (2:3.3.16-1ubuntu2.4) over (2:3.3.16-1ubuntu2) ... Preparing to unpack .../04-openssl_1.1.1f-1ubuntu2.22_amd64.deb ... Unpacking openssl (1.1.1f-1ubuntu2.22) over (1.1.1f-1ubuntu2) ... Preparing to unpack .../05-ca-certificates_20230311ubuntu0.20.04.1_all.deb ... Unpacking ca-certificates (20230311ubuntu0.20.04.1) over (20190110ubuntu1) ... Preparing to unpack .../06-libsqlite3-0_3.31.1-4ubuntu0.6_amd64.deb ... Unpacking libsqlite3-0:amd64 (3.31.1-4ubuntu0.6) over (3.31.1-4) ... Preparing to unpack .../07-tzdata_2024a-0ubuntu0.20.04_all.deb ... Unpacking tzdata (2024a-0ubuntu0.20.04) over (2019c-3ubuntu1) ... Preparing to unpack .../08-xz-utils_5.2.4-1ubuntu1.1_amd64.deb ... Unpacking xz-utils (5.2.4-1ubuntu1.1) over (5.2.4-1) ... Preparing to unpack .../09-advancecomp_2.1-2.1ubuntu0.20.04.1_amd64.deb ... Unpacking advancecomp (2.1-2.1ubuntu0.20.04.1) over (2.1-2.1build1) ... Preparing to unpack .../10-libctf0_2.34-6ubuntu1.9_amd64.deb ... Unpacking libctf0:amd64 (2.34-6ubuntu1.9) over (2.34-6ubuntu1) ... Preparing to unpack .../11-binutils-x86-64-linux-gnu_2.34-6ubuntu1.9_amd64.deb ... Unpacking binutils-x86-64-linux-gnu (2.34-6ubuntu1.9) over (2.34-6ubuntu1) ... Preparing to unpack .../12-libbinutils_2.34-6ubuntu1.9_amd64.deb ... Unpacking libbinutils:amd64 (2.34-6ubuntu1.9) over (2.34-6ubuntu1) ... Preparing to unpack .../13-binutils_2.34-6ubuntu1.9_amd64.deb ... Unpacking binutils (2.34-6ubuntu1.9) over (2.34-6ubuntu1) ... Preparing to unpack .../14-binutils-common_2.34-6ubuntu1.9_amd64.deb ... Unpacking binutils-common:amd64 (2.34-6ubuntu1.9) over (2.34-6ubuntu1) ... Preparing to unpack .../15-libctf-nobfd0_2.34-6ubuntu1.9_amd64.deb ... Unpacking libctf-nobfd0:amd64 (2.34-6ubuntu1.9) over (2.34-6ubuntu1) ... Preparing to unpack .../16-dpkg-dev_1.19.7ubuntu3.2_all.deb ... Unpacking dpkg-dev (1.19.7ubuntu3.2) over (1.19.7ubuntu3) ... Preparing to unpack .../17-libdpkg-perl_1.19.7ubuntu3.2_all.deb ... Unpacking libdpkg-perl (1.19.7ubuntu3.2) over (1.19.7ubuntu3) ... Preparing to unpack .../18-build-essential_12.8ubuntu1.1_amd64.deb ... Unpacking build-essential (12.8ubuntu1.1) over (12.8ubuntu1) ... Preparing to unpack .../19-libasan5_9.4.0-1ubuntu1~20.04.2_amd64.deb ... Unpacking libasan5:amd64 (9.4.0-1ubuntu1~20.04.2) over (9.3.0-10ubuntu2) ... Preparing to unpack .../20-g++-9_9.4.0-1ubuntu1~20.04.2_amd64.deb ... Unpacking g++-9 (9.4.0-1ubuntu1~20.04.2) over (9.3.0-10ubuntu2) ... Preparing to unpack .../21-gcc-9_9.4.0-1ubuntu1~20.04.2_amd64.deb ... Unpacking gcc-9 (9.4.0-1ubuntu1~20.04.2) over (9.3.0-10ubuntu2) ... Preparing to unpack .../22-libstdc++-9-dev_9.4.0-1ubuntu1~20.04.2_amd64.deb ... Unpacking libstdc++-9-dev:amd64 (9.4.0-1ubuntu1~20.04.2) over (9.3.0-10ubuntu2) ... Preparing to unpack .../23-libgcc-9-dev_9.4.0-1ubuntu1~20.04.2_amd64.deb ... Unpacking libgcc-9-dev:amd64 (9.4.0-1ubuntu1~20.04.2) over (9.3.0-10ubuntu2) ... Preparing to unpack .../24-cpp-9_9.4.0-1ubuntu1~20.04.2_amd64.deb ... Unpacking cpp-9 (9.4.0-1ubuntu1~20.04.2) over (9.3.0-10ubuntu2) ... Preparing to unpack .../25-gcc-9-base_9.4.0-1ubuntu1~20.04.2_amd64.deb ... Unpacking gcc-9-base:amd64 (9.4.0-1ubuntu1~20.04.2) over (9.3.0-10ubuntu2) ... Preparing to unpack .../26-gpg_2.2.19-3ubuntu2.2_amd64.deb ... Unpacking gpg (2.2.19-3ubuntu2.2) over (2.2.19-3ubuntu2) ... Preparing to unpack .../27-gpgconf_2.2.19-3ubuntu2.2_amd64.deb ... Unpacking gpgconf (2.2.19-3ubuntu2.2) over (2.2.19-3ubuntu2) ... Preparing to unpack .../28-gpg-agent_2.2.19-3ubuntu2.2_amd64.deb ... Unpacking gpg-agent (2.2.19-3ubuntu2.2) over (2.2.19-3ubuntu2) ... Preparing to unpack .../29-pkgbinarymangler_144.20.04.0_all.deb ... Unpacking pkgbinarymangler (144.20.04.0) over (144) ... Setting up libip4tc2:amd64 (1.8.4-3ubuntu2.1) ... Setting up libapparmor1:amd64 (2.13.3-7ubuntu5.3) ... Setting up perl-modules-5.30 (5.30.0-9ubuntu0.5) ... Setting up libssl1.1:amd64 (1.1.1f-1ubuntu2.22) ... Setting up libsqlite3-0:amd64 (3.31.1-4ubuntu0.6) ... Setting up binutils-common:amd64 (2.34-6ubuntu1.9) ... Setting up linux-libc-dev:amd64 (5.4.0-182.202) ... Setting up libctf-nobfd0:amd64 (2.34-6ubuntu1.9) ... Setting up libcom-err2:amd64 (1.45.5-2ubuntu1.1) ... Setting up libgomp1:amd64 (10.5.0-1ubuntu1~20.04) ... Setting up libcap2:amd64 (1:2.32-1ubuntu0.1) ... Setting up tzdata (2024a-0ubuntu0.20.04) ... Current default time zone: 'Etc/UTC' Local time is now: Wed May 15 15:33:39 UTC 2024. Universal Time is now: Wed May 15 15:33:39 UTC 2024. Run 'dpkg-reconfigure tzdata' if you wish to change it. Setting up libncurses6:amd64 (6.2-0ubuntu2.1) ... Setting up xz-utils (5.2.4-1ubuntu1.1) ... Setting up libquadmath0:amd64 (10.5.0-1ubuntu1~20.04) ... Setting up libatomic1:amd64 (10.5.0-1ubuntu1~20.04) ... Setting up libss2:amd64 (1.45.5-2ubuntu1.1) ... Setting up libncursesw6:amd64 (6.2-0ubuntu2.1) ... Setting up logsave (1.45.5-2ubuntu1.1) ... Setting up libfdisk1:amd64 (2.34-0.1ubuntu9.6) ... Setting up libubsan1:amd64 (10.5.0-1ubuntu1~20.04) ... Setting up advancecomp (2.1-2.1ubuntu0.20.04.1) ... Setting up mount (2.34-0.1ubuntu9.6) ... Setting up gpgconf (2.2.19-3ubuntu2.2) ... Setting up libperl5.30:amd64 (5.30.0-9ubuntu0.5) ... Setting up libjson-c4:amd64 (0.13.1+dfsg-7ubuntu0.3) ... Setting up libbinutils:amd64 (2.34-6ubuntu1.9) ... Setting up libc-dev-bin (2.31-0ubuntu9.15) ... Setting up openssl (1.1.1f-1ubuntu2.22) ... Setting up libcc1-0:amd64 (10.5.0-1ubuntu1~20.04) ... Setting up gpg (2.2.19-3ubuntu2.2) ... Setting up liblsan0:amd64 (10.5.0-1ubuntu1~20.04) ... Setting up libprocps8:amd64 (2:3.3.16-1ubuntu2.4) ... Setting up libitm1:amd64 (10.5.0-1ubuntu1~20.04) ... Setting up libkmod2:amd64 (27-1ubuntu2.1) ... Setting up gcc-9-base:amd64 (9.4.0-1ubuntu1~20.04.2) ... Setting up libtsan0:amd64 (10.5.0-1ubuntu1~20.04) ... Setting up libctf0:amd64 (2.34-6ubuntu1.9) ... Setting up gpg-agent (2.2.19-3ubuntu2.2) ... Setting up pkgbinarymangler (144.20.04.0) ... Installing new version of config file /etc/pkgbinarymangler/striptranslations.blacklist ... Setting up e2fsprogs (1.45.5-2ubuntu1.1) ... /usr/sbin/policy-rc.d returned 101, not running 'restart e2scrub_all.service e2scrub_all.timer e2scrub_reap.service' Setting up fdisk (2.34-0.1ubuntu9.6) ... Setting up ca-certificates (20230311ubuntu0.20.04.1) ... Updating certificates in /etc/ssl/certs... rehash: warning: skipping ca-certificates.crt,it does not contain exactly one certificate or CRL 47 added, 38 removed; done. Setting up libasan5:amd64 (9.4.0-1ubuntu1~20.04.2) ... Setting up perl (5.30.0-9ubuntu0.5) ... Setting up libdpkg-perl (1.19.7ubuntu3.2) ... Setting up procps (2:3.3.16-1ubuntu2.4) ... Setting up cpp-9 (9.4.0-1ubuntu1~20.04.2) ... Setting up libc6-dev:amd64 (2.31-0ubuntu9.15) ... Setting up libcryptsetup12:amd64 (2:2.2.2-3ubuntu2.4) ... Setting up binutils-x86-64-linux-gnu (2.34-6ubuntu1.9) ... Setting up binutils (2.34-6ubuntu1.9) ... Setting up dpkg-dev (1.19.7ubuntu3.2) ... Setting up libgcc-9-dev:amd64 (9.4.0-1ubuntu1~20.04.2) ... Setting up build-essential (12.8ubuntu1.1) ... Setting up gcc-9 (9.4.0-1ubuntu1~20.04.2) ... Setting up libstdc++-9-dev:amd64 (9.4.0-1ubuntu1~20.04.2) ... Setting up g++-9 (9.4.0-1ubuntu1~20.04.2) ... Setting up systemd-timesyncd (245.4-4ubuntu3.23) ... /usr/sbin/policy-rc.d returned 101, not running 'restart systemd-timesyncd.service' Setting up systemd (245.4-4ubuntu3.23) ... Installing new version of config file /etc/dhcp/dhclient-enter-hooks.d/resolved ... Installing new version of config file /etc/systemd/resolved.conf ... Setting up systemd-sysv (245.4-4ubuntu3.23) ... Processing triggers for libc-bin (2.31-0ubuntu9.15) ... Processing triggers for ca-certificates (20230311ubuntu0.20.04.1) ... Updating certificates in /etc/ssl/certs... 0 added, 0 removed; done. Running hooks in /etc/ca-certificates/update.d... done. RUN: /usr/share/launchpad-buildd/bin/in-target buildsnap --backend=lxd --series=focal --arch=amd64 SNAPBUILD-2484118 --channel core20=stable --channel snapcraft=stable --build-request-id 89029789 --build-request-timestamp 2024-05-15T15:30:10Z --build-url 'https://launchpad.net/~myapps-reviewers/+snap/review-tools/+build/2484118' --proxy-url http://10.10.10.1:8222/ --revocation-endpoint http://builder-proxy-auth.lp.internal:8080/tokens/SNAPBUILD-2484118-1715787041 --git-repository https://git.launchpad.net/review-tools --git-path master --target-arch amd64 review-tools Running install phase... /usr/lib/python3/dist-packages/pylxd/models/_model.py:134: UserWarning: Attempted to set unknown attribute "type" on instance of "Container" warnings.warn( /usr/lib/python3/dist-packages/pylxd/models/_model.py:134: UserWarning: Attempted to set unknown attribute "project" on instance of "Container" warnings.warn( Reading package lists... Building dependency tree... Reading state information... The following additional packages will be installed: apparmor dbus dbus-user-session git-man libasn1-8-heimdal libbrotli1 libbsd0 libcbor0.6 libcurl3-gnutls libdbus-1-3 libedit2 liberror-perl libexpat1 libfido2-1 libfuse2 libgssapi-krb5-2 libgssapi3-heimdal libhcrypto4-heimdal libheimbase1-heimdal libheimntlm0-heimdal libhx509-5-heimdal libk5crypto3 libkeyutils1 libkrb5-26-heimdal libkrb5-3 libkrb5support0 libldap-2.4-2 libldap-common liblzo2-2 libmpdec2 libnghttp2-14 libpam-systemd libpsl5 libpython3-stdlib libpython3.8-minimal libpython3.8-stdlib libroken18-heimdal librtmp1 libsasl2-2 libsasl2-modules-db libsquashfuse0 libssh-4 libwind0-heimdal libwrap0 mime-support openssh-client python3-minimal python3.8 python3.8-minimal squashfs-tools Suggested packages: apparmor-profiles-extra apparmor-utils gettext-base git-daemon-run | git-daemon-sysvinit git-doc git-el git-email git-gui gitk gitweb git-cvs git-mediawiki git-svn krb5-doc krb5-user keychain libpam-ssh monkeysphere ssh-askpass python3-doc python3-tk python3-venv python3.8-venv python3.8-doc binfmt-support zenity | kdialog Recommended packages: less krb5-locales publicsuffix libsasl2-modules file xauth gnupg The following NEW packages will be installed: apparmor dbus dbus-user-session fuse git git-man libasn1-8-heimdal libbrotli1 libbsd0 libcbor0.6 libcurl3-gnutls libdbus-1-3 libedit2 liberror-perl libexpat1 libfido2-1 libfuse2 libgssapi-krb5-2 libgssapi3-heimdal libhcrypto4-heimdal libheimbase1-heimdal libheimntlm0-heimdal libhx509-5-heimdal libk5crypto3 libkeyutils1 libkrb5-26-heimdal libkrb5-3 libkrb5support0 libldap-2.4-2 libldap-common liblzo2-2 libmpdec2 libnghttp2-14 libpam-systemd libpsl5 libpython3-stdlib libpython3.8-minimal libpython3.8-stdlib libroken18-heimdal librtmp1 libsasl2-2 libsasl2-modules-db libsquashfuse0 libssh-4 libwind0-heimdal libwrap0 mime-support openssh-client python3 python3-minimal python3.8 python3.8-minimal snapd socat squashfs-tools squashfuse sudo udev 0 upgraded, 58 newly installed, 0 to remove and 0 not upgraded. Need to get 42.5 MB of archives. After this operation, 194 MB of additional disk space will be used. Get:1 http://ftpmaster.internal/ubuntu focal-security/main amd64 libpython3.8-minimal amd64 3.8.10-0ubuntu1~20.04.9 [718 kB] Get:2 http://ftpmaster.internal/ubuntu focal-security/main amd64 libexpat1 amd64 2.2.9-1ubuntu0.6 [74.6 kB] Get:3 http://ftpmaster.internal/ubuntu focal-security/main amd64 python3.8-minimal amd64 3.8.10-0ubuntu1~20.04.9 [1890 kB] Get:4 http://ftpmaster.internal/ubuntu focal/main amd64 python3-minimal amd64 3.8.2-0ubuntu2 [23.6 kB] Get:5 http://ftpmaster.internal/ubuntu focal/main amd64 mime-support all 3.64ubuntu1 [30.6 kB] Get:6 http://ftpmaster.internal/ubuntu focal/main amd64 libmpdec2 amd64 2.4.2-3 [81.1 kB] Get:7 http://ftpmaster.internal/ubuntu focal-security/main amd64 libpython3.8-stdlib amd64 3.8.10-0ubuntu1~20.04.9 [1674 kB] Get:8 http://ftpmaster.internal/ubuntu focal-security/main amd64 python3.8 amd64 3.8.10-0ubuntu1~20.04.9 [387 kB] Get:9 http://ftpmaster.internal/ubuntu focal/main amd64 libpython3-stdlib amd64 3.8.2-0ubuntu2 [7068 B] Get:10 http://ftpmaster.internal/ubuntu focal/main amd64 python3 amd64 3.8.2-0ubuntu2 [47.6 kB] Get:11 http://ftpmaster.internal/ubuntu focal-security/main amd64 libdbus-1-3 amd64 1.12.16-2ubuntu2.3 [179 kB] Get:12 http://ftpmaster.internal/ubuntu focal-security/main amd64 dbus amd64 1.12.16-2ubuntu2.3 [151 kB] Get:13 http://ftpmaster.internal/ubuntu focal/main amd64 libbsd0 amd64 0.10.0-1 [45.4 kB] Get:14 http://ftpmaster.internal/ubuntu focal-updates/main amd64 libpam-systemd amd64 245.4-4ubuntu3.23 [186 kB] Get:15 http://ftpmaster.internal/ubuntu focal-security/main amd64 sudo amd64 1.8.31-1ubuntu1.5 [515 kB] Get:16 http://ftpmaster.internal/ubuntu focal-updates/main amd64 udev amd64 245.4-4ubuntu3.23 [1366 kB] Get:17 http://ftpmaster.internal/ubuntu focal-updates/main amd64 apparmor amd64 2.13.3-7ubuntu5.3 [502 kB] Get:18 http://ftpmaster.internal/ubuntu focal/main amd64 libfuse2 amd64 2.9.9-3 [82.0 kB] Get:19 http://ftpmaster.internal/ubuntu focal/main amd64 fuse amd64 2.9.9-3 [26.0 kB] Get:20 http://ftpmaster.internal/ubuntu focal/main amd64 libcbor0.6 amd64 0.6.0-0ubuntu1 [21.1 kB] Get:21 http://ftpmaster.internal/ubuntu focal/main amd64 libedit2 amd64 3.1-20191231-1 [87.0 kB] Get:22 http://ftpmaster.internal/ubuntu focal/main amd64 libfido2-1 amd64 1.3.1-1ubuntu2 [47.9 kB] Get:23 http://ftpmaster.internal/ubuntu focal-security/main amd64 libkrb5support0 amd64 1.17-6ubuntu4.4 [31.0 kB] Get:24 http://ftpmaster.internal/ubuntu focal-security/main amd64 libk5crypto3 amd64 1.17-6ubuntu4.4 [79.9 kB] Get:25 http://ftpmaster.internal/ubuntu focal-updates/main amd64 libkeyutils1 amd64 1.6-6ubuntu1.1 [10.3 kB] Get:26 http://ftpmaster.internal/ubuntu focal-security/main amd64 libkrb5-3 amd64 1.17-6ubuntu4.4 [330 kB] Get:27 http://ftpmaster.internal/ubuntu focal-security/main amd64 libgssapi-krb5-2 amd64 1.17-6ubuntu4.4 [121 kB] Get:28 http://ftpmaster.internal/ubuntu focal/main amd64 libpsl5 amd64 0.21.0-1ubuntu1 [51.5 kB] Get:29 http://ftpmaster.internal/ubuntu focal-security/main amd64 openssh-client amd64 1:8.2p1-4ubuntu0.11 [670 kB] Get:30 http://ftpmaster.internal/ubuntu focal-security/main amd64 dbus-user-session amd64 1.12.16-2ubuntu2.3 [9424 B] Get:31 http://ftpmaster.internal/ubuntu focal-security/main amd64 libbrotli1 amd64 1.0.7-6ubuntu0.1 [267 kB] Get:32 http://ftpmaster.internal/ubuntu focal-security/main amd64 libroken18-heimdal amd64 7.7.0+dfsg-1ubuntu1.4 [42.5 kB] Get:33 http://ftpmaster.internal/ubuntu focal-security/main amd64 libasn1-8-heimdal amd64 7.7.0+dfsg-1ubuntu1.4 [181 kB] Get:34 http://ftpmaster.internal/ubuntu focal-security/main amd64 libheimbase1-heimdal amd64 7.7.0+dfsg-1ubuntu1.4 [30.4 kB] Get:35 http://ftpmaster.internal/ubuntu focal-security/main amd64 libhcrypto4-heimdal amd64 7.7.0+dfsg-1ubuntu1.4 [88.1 kB] Get:36 http://ftpmaster.internal/ubuntu focal-security/main amd64 libwind0-heimdal amd64 7.7.0+dfsg-1ubuntu1.4 [47.7 kB] Get:37 http://ftpmaster.internal/ubuntu focal-security/main amd64 libhx509-5-heimdal amd64 7.7.0+dfsg-1ubuntu1.4 [107 kB] Get:38 http://ftpmaster.internal/ubuntu focal-security/main amd64 libkrb5-26-heimdal amd64 7.7.0+dfsg-1ubuntu1.4 [207 kB] Get:39 http://ftpmaster.internal/ubuntu focal-security/main amd64 libheimntlm0-heimdal amd64 7.7.0+dfsg-1ubuntu1.4 [15.1 kB] Get:40 http://ftpmaster.internal/ubuntu focal-security/main amd64 libgssapi3-heimdal amd64 7.7.0+dfsg-1ubuntu1.4 [96.5 kB] Get:41 http://ftpmaster.internal/ubuntu focal-security/main amd64 libsasl2-modules-db amd64 2.1.27+dfsg-2ubuntu0.1 [14.7 kB] Get:42 http://ftpmaster.internal/ubuntu focal-security/main amd64 libsasl2-2 amd64 2.1.27+dfsg-2ubuntu0.1 [49.3 kB] Get:43 http://ftpmaster.internal/ubuntu focal-security/main amd64 libldap-common all 2.4.49+dfsg-2ubuntu1.10 [16.5 kB] Get:44 http://ftpmaster.internal/ubuntu focal-security/main amd64 libldap-2.4-2 amd64 2.4.49+dfsg-2ubuntu1.10 [155 kB] Get:45 http://ftpmaster.internal/ubuntu focal-security/main amd64 libnghttp2-14 amd64 1.40.0-1ubuntu0.3 [79.9 kB] Get:46 http://ftpmaster.internal/ubuntu focal/main amd64 librtmp1 amd64 2.4+20151223.gitfa8646d.1-2build1 [54.9 kB] Get:47 http://ftpmaster.internal/ubuntu focal-security/main amd64 libssh-4 amd64 0.9.3-2ubuntu2.5 [171 kB] Get:48 http://ftpmaster.internal/ubuntu focal-security/main amd64 libcurl3-gnutls amd64 7.68.0-1ubuntu2.22 [233 kB] Get:49 http://ftpmaster.internal/ubuntu focal/main amd64 liberror-perl all 0.17029-1 [26.5 kB] Get:50 http://ftpmaster.internal/ubuntu focal-security/main amd64 git-man all 1:2.25.1-1ubuntu3.11 [887 kB] Get:51 http://ftpmaster.internal/ubuntu focal-security/main amd64 git amd64 1:2.25.1-1ubuntu3.11 [4605 kB] Get:52 http://ftpmaster.internal/ubuntu focal/main amd64 liblzo2-2 amd64 2.10-2 [50.8 kB] Get:53 http://ftpmaster.internal/ubuntu focal/universe amd64 libsquashfuse0 amd64 0.1.103-2 [24.5 kB] Get:54 http://ftpmaster.internal/ubuntu focal/main amd64 libwrap0 amd64 7.6.q-30 [46.3 kB] Get:55 http://ftpmaster.internal/ubuntu focal-security/main amd64 squashfs-tools amd64 1:4.4-1ubuntu0.3 [117 kB] Get:56 http://ftpmaster.internal/ubuntu focal-updates/main amd64 snapd amd64 2.62+20.04 [25.1 MB] Get:57 http://ftpmaster.internal/ubuntu focal/universe amd64 squashfuse amd64 0.1.103-2 [7564 B] Get:58 http://ftpmaster.internal/ubuntu focal/main amd64 socat amd64 1.7.3.3-2 [323 kB] debconf: delaying package configuration, since apt-utils is not installed Fetched 42.5 MB in 1s (77.1 MB/s) Selecting previously unselected package libpython3.8-minimal:amd64. (Reading database ... 12835 files and directories currently installed.) Preparing to unpack .../libpython3.8-minimal_3.8.10-0ubuntu1~20.04.9_amd64.deb ... Unpacking libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.9) ... Selecting previously unselected package libexpat1:amd64. Preparing to unpack .../libexpat1_2.2.9-1ubuntu0.6_amd64.deb ... Unpacking libexpat1:amd64 (2.2.9-1ubuntu0.6) ... Selecting previously unselected package python3.8-minimal. Preparing to unpack .../python3.8-minimal_3.8.10-0ubuntu1~20.04.9_amd64.deb ... Unpacking python3.8-minimal (3.8.10-0ubuntu1~20.04.9) ... Setting up libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.9) ... Setting up libexpat1:amd64 (2.2.9-1ubuntu0.6) ... Setting up python3.8-minimal (3.8.10-0ubuntu1~20.04.9) ... Selecting previously unselected package python3-minimal. (Reading database ... 13126 files and directories currently installed.) Preparing to unpack .../0-python3-minimal_3.8.2-0ubuntu2_amd64.deb ... Unpacking python3-minimal (3.8.2-0ubuntu2) ... Selecting previously unselected package mime-support. Preparing to unpack .../1-mime-support_3.64ubuntu1_all.deb ... Unpacking mime-support (3.64ubuntu1) ... Selecting previously unselected package libmpdec2:amd64. Preparing to unpack .../2-libmpdec2_2.4.2-3_amd64.deb ... Unpacking libmpdec2:amd64 (2.4.2-3) ... Selecting previously unselected package libpython3.8-stdlib:amd64. Preparing to unpack .../3-libpython3.8-stdlib_3.8.10-0ubuntu1~20.04.9_amd64.deb ... Unpacking libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.9) ... Selecting previously unselected package python3.8. Preparing to unpack .../4-python3.8_3.8.10-0ubuntu1~20.04.9_amd64.deb ... Unpacking python3.8 (3.8.10-0ubuntu1~20.04.9) ... Selecting previously unselected package libpython3-stdlib:amd64. Preparing to unpack .../5-libpython3-stdlib_3.8.2-0ubuntu2_amd64.deb ... Unpacking libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Setting up python3-minimal (3.8.2-0ubuntu2) ... Selecting previously unselected package python3. (Reading database ... 13528 files and directories currently installed.) Preparing to unpack .../00-python3_3.8.2-0ubuntu2_amd64.deb ... Unpacking python3 (3.8.2-0ubuntu2) ... Selecting previously unselected package libdbus-1-3:amd64. Preparing to unpack .../01-libdbus-1-3_1.12.16-2ubuntu2.3_amd64.deb ... Unpacking libdbus-1-3:amd64 (1.12.16-2ubuntu2.3) ... Selecting previously unselected package dbus. Preparing to unpack .../02-dbus_1.12.16-2ubuntu2.3_amd64.deb ... Unpacking dbus (1.12.16-2ubuntu2.3) ... Selecting previously unselected package libbsd0:amd64. Preparing to unpack .../03-libbsd0_0.10.0-1_amd64.deb ... Unpacking libbsd0:amd64 (0.10.0-1) ... Selecting previously unselected package libpam-systemd:amd64. Preparing to unpack .../04-libpam-systemd_245.4-4ubuntu3.23_amd64.deb ... Unpacking libpam-systemd:amd64 (245.4-4ubuntu3.23) ... Selecting previously unselected package sudo. Preparing to unpack .../05-sudo_1.8.31-1ubuntu1.5_amd64.deb ... Unpacking sudo (1.8.31-1ubuntu1.5) ... Selecting previously unselected package udev. Preparing to unpack .../06-udev_245.4-4ubuntu3.23_amd64.deb ... Unpacking udev (245.4-4ubuntu3.23) ... Selecting previously unselected package apparmor. Preparing to unpack .../07-apparmor_2.13.3-7ubuntu5.3_amd64.deb ... Unpacking apparmor (2.13.3-7ubuntu5.3) ... Selecting previously unselected package libfuse2:amd64. Preparing to unpack .../08-libfuse2_2.9.9-3_amd64.deb ... Unpacking libfuse2:amd64 (2.9.9-3) ... Selecting previously unselected package fuse. Preparing to unpack .../09-fuse_2.9.9-3_amd64.deb ... Unpacking fuse (2.9.9-3) ... Selecting previously unselected package libcbor0.6:amd64. Preparing to unpack .../10-libcbor0.6_0.6.0-0ubuntu1_amd64.deb ... Unpacking libcbor0.6:amd64 (0.6.0-0ubuntu1) ... Selecting previously unselected package libedit2:amd64. Preparing to unpack .../11-libedit2_3.1-20191231-1_amd64.deb ... Unpacking libedit2:amd64 (3.1-20191231-1) ... Selecting previously unselected package libfido2-1:amd64. Preparing to unpack .../12-libfido2-1_1.3.1-1ubuntu2_amd64.deb ... Unpacking libfido2-1:amd64 (1.3.1-1ubuntu2) ... Selecting previously unselected package libkrb5support0:amd64. Preparing to unpack .../13-libkrb5support0_1.17-6ubuntu4.4_amd64.deb ... Unpacking libkrb5support0:amd64 (1.17-6ubuntu4.4) ... Selecting previously unselected package libk5crypto3:amd64. Preparing to unpack .../14-libk5crypto3_1.17-6ubuntu4.4_amd64.deb ... Unpacking libk5crypto3:amd64 (1.17-6ubuntu4.4) ... Selecting previously unselected package libkeyutils1:amd64. Preparing to unpack .../15-libkeyutils1_1.6-6ubuntu1.1_amd64.deb ... Unpacking libkeyutils1:amd64 (1.6-6ubuntu1.1) ... Selecting previously unselected package libkrb5-3:amd64. Preparing to unpack .../16-libkrb5-3_1.17-6ubuntu4.4_amd64.deb ... Unpacking libkrb5-3:amd64 (1.17-6ubuntu4.4) ... Selecting previously unselected package libgssapi-krb5-2:amd64. Preparing to unpack .../17-libgssapi-krb5-2_1.17-6ubuntu4.4_amd64.deb ... Unpacking libgssapi-krb5-2:amd64 (1.17-6ubuntu4.4) ... Selecting previously unselected package libpsl5:amd64. Preparing to unpack .../18-libpsl5_0.21.0-1ubuntu1_amd64.deb ... Unpacking libpsl5:amd64 (0.21.0-1ubuntu1) ... Selecting previously unselected package openssh-client. Preparing to unpack .../19-openssh-client_1%3a8.2p1-4ubuntu0.11_amd64.deb ... Unpacking openssh-client (1:8.2p1-4ubuntu0.11) ... Selecting previously unselected package dbus-user-session. Preparing to unpack .../20-dbus-user-session_1.12.16-2ubuntu2.3_amd64.deb ... Unpacking dbus-user-session (1.12.16-2ubuntu2.3) ... Selecting previously unselected package libbrotli1:amd64. Preparing to unpack .../21-libbrotli1_1.0.7-6ubuntu0.1_amd64.deb ... Unpacking libbrotli1:amd64 (1.0.7-6ubuntu0.1) ... Selecting previously unselected package libroken18-heimdal:amd64. Preparing to unpack .../22-libroken18-heimdal_7.7.0+dfsg-1ubuntu1.4_amd64.deb ... Unpacking libroken18-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Selecting previously unselected package libasn1-8-heimdal:amd64. Preparing to unpack .../23-libasn1-8-heimdal_7.7.0+dfsg-1ubuntu1.4_amd64.deb ... Unpacking libasn1-8-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Selecting previously unselected package libheimbase1-heimdal:amd64. Preparing to unpack .../24-libheimbase1-heimdal_7.7.0+dfsg-1ubuntu1.4_amd64.deb ... Unpacking libheimbase1-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Selecting previously unselected package libhcrypto4-heimdal:amd64. Preparing to unpack .../25-libhcrypto4-heimdal_7.7.0+dfsg-1ubuntu1.4_amd64.deb ... Unpacking libhcrypto4-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Selecting previously unselected package libwind0-heimdal:amd64. Preparing to unpack .../26-libwind0-heimdal_7.7.0+dfsg-1ubuntu1.4_amd64.deb ... Unpacking libwind0-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Selecting previously unselected package libhx509-5-heimdal:amd64. Preparing to unpack .../27-libhx509-5-heimdal_7.7.0+dfsg-1ubuntu1.4_amd64.deb ... Unpacking libhx509-5-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Selecting previously unselected package libkrb5-26-heimdal:amd64. Preparing to unpack .../28-libkrb5-26-heimdal_7.7.0+dfsg-1ubuntu1.4_amd64.deb ... Unpacking libkrb5-26-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Selecting previously unselected package libheimntlm0-heimdal:amd64. Preparing to unpack .../29-libheimntlm0-heimdal_7.7.0+dfsg-1ubuntu1.4_amd64.deb ... Unpacking libheimntlm0-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Selecting previously unselected package libgssapi3-heimdal:amd64. Preparing to unpack .../30-libgssapi3-heimdal_7.7.0+dfsg-1ubuntu1.4_amd64.deb ... Unpacking libgssapi3-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Selecting previously unselected package libsasl2-modules-db:amd64. Preparing to unpack .../31-libsasl2-modules-db_2.1.27+dfsg-2ubuntu0.1_amd64.deb ... Unpacking libsasl2-modules-db:amd64 (2.1.27+dfsg-2ubuntu0.1) ... Selecting previously unselected package libsasl2-2:amd64. Preparing to unpack .../32-libsasl2-2_2.1.27+dfsg-2ubuntu0.1_amd64.deb ... Unpacking libsasl2-2:amd64 (2.1.27+dfsg-2ubuntu0.1) ... Selecting previously unselected package libldap-common. Preparing to unpack .../33-libldap-common_2.4.49+dfsg-2ubuntu1.10_all.deb ... Unpacking libldap-common (2.4.49+dfsg-2ubuntu1.10) ... Selecting previously unselected package libldap-2.4-2:amd64. Preparing to unpack .../34-libldap-2.4-2_2.4.49+dfsg-2ubuntu1.10_amd64.deb ... Unpacking libldap-2.4-2:amd64 (2.4.49+dfsg-2ubuntu1.10) ... Selecting previously unselected package libnghttp2-14:amd64. Preparing to unpack .../35-libnghttp2-14_1.40.0-1ubuntu0.3_amd64.deb ... Unpacking libnghttp2-14:amd64 (1.40.0-1ubuntu0.3) ... Selecting previously unselected package librtmp1:amd64. Preparing to unpack .../36-librtmp1_2.4+20151223.gitfa8646d.1-2build1_amd64.deb ... Unpacking librtmp1:amd64 (2.4+20151223.gitfa8646d.1-2build1) ... Selecting previously unselected package libssh-4:amd64. Preparing to unpack .../37-libssh-4_0.9.3-2ubuntu2.5_amd64.deb ... Unpacking libssh-4:amd64 (0.9.3-2ubuntu2.5) ... Selecting previously unselected package libcurl3-gnutls:amd64. Preparing to unpack .../38-libcurl3-gnutls_7.68.0-1ubuntu2.22_amd64.deb ... Unpacking libcurl3-gnutls:amd64 (7.68.0-1ubuntu2.22) ... Selecting previously unselected package liberror-perl. Preparing to unpack .../39-liberror-perl_0.17029-1_all.deb ... Unpacking liberror-perl (0.17029-1) ... Selecting previously unselected package git-man. Preparing to unpack .../40-git-man_1%3a2.25.1-1ubuntu3.11_all.deb ... Unpacking git-man (1:2.25.1-1ubuntu3.11) ... Selecting previously unselected package git. Preparing to unpack .../41-git_1%3a2.25.1-1ubuntu3.11_amd64.deb ... Unpacking git (1:2.25.1-1ubuntu3.11) ... Selecting previously unselected package liblzo2-2:amd64. Preparing to unpack .../42-liblzo2-2_2.10-2_amd64.deb ... Unpacking liblzo2-2:amd64 (2.10-2) ... Selecting previously unselected package libsquashfuse0:amd64. Preparing to unpack .../43-libsquashfuse0_0.1.103-2_amd64.deb ... Unpacking libsquashfuse0:amd64 (0.1.103-2) ... Selecting previously unselected package libwrap0:amd64. Preparing to unpack .../44-libwrap0_7.6.q-30_amd64.deb ... Unpacking libwrap0:amd64 (7.6.q-30) ... Selecting previously unselected package squashfs-tools. Preparing to unpack .../45-squashfs-tools_1%3a4.4-1ubuntu0.3_amd64.deb ... Unpacking squashfs-tools (1:4.4-1ubuntu0.3) ... Selecting previously unselected package snapd. Preparing to unpack .../46-snapd_2.62+20.04_amd64.deb ... Unpacking snapd (2.62+20.04) ... Selecting previously unselected package squashfuse. Preparing to unpack .../47-squashfuse_0.1.103-2_amd64.deb ... Unpacking squashfuse (0.1.103-2) ... Selecting previously unselected package socat. Preparing to unpack .../48-socat_1.7.3.3-2_amd64.deb ... Unpacking socat (1.7.3.3-2) ... Setting up libkeyutils1:amd64 (1.6-6ubuntu1.1) ... Setting up libpsl5:amd64 (0.21.0-1ubuntu1) ... Setting up mime-support (3.64ubuntu1) ... Setting up libbrotli1:amd64 (1.0.7-6ubuntu0.1) ... Setting up libnghttp2-14:amd64 (1.40.0-1ubuntu0.3) ... Setting up liblzo2-2:amd64 (2.10-2) ... Setting up libfuse2:amd64 (2.9.9-3) ... Setting up libcbor0.6:amd64 (0.6.0-0ubuntu1) ... Setting up libldap-common (2.4.49+dfsg-2ubuntu1.10) ... Setting up libkrb5support0:amd64 (1.17-6ubuntu4.4) ... Setting up libsasl2-modules-db:amd64 (2.1.27+dfsg-2ubuntu0.1) ... Setting up liberror-perl (0.17029-1) ... Setting up libwrap0:amd64 (7.6.q-30) ... Setting up librtmp1:amd64 (2.4+20151223.gitfa8646d.1-2build1) ... Setting up socat (1.7.3.3-2) ... Setting up libdbus-1-3:amd64 (1.12.16-2ubuntu2.3) ... Setting up dbus (1.12.16-2ubuntu2.3) ... Setting up udev (245.4-4ubuntu3.23) ... Setting up sudo (1.8.31-1ubuntu1.5) ... Setting up libk5crypto3:amd64 (1.17-6ubuntu4.4) ... Setting up libsasl2-2:amd64 (2.1.27+dfsg-2ubuntu0.1) ... Setting up libroken18-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Setting up libpam-systemd:amd64 (245.4-4ubuntu3.23) ... Setting up git-man (1:2.25.1-1ubuntu3.11) ... Setting up libkrb5-3:amd64 (1.17-6ubuntu4.4) ... Setting up libsquashfuse0:amd64 (0.1.103-2) ... Setting up libmpdec2:amd64 (2.4.2-3) ... Setting up libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.9) ... Setting up libfido2-1:amd64 (1.3.1-1ubuntu2) ... Setting up python3.8 (3.8.10-0ubuntu1~20.04.9) ... Setting up libbsd0:amd64 (0.10.0-1) ... Setting up libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Setting up libheimbase1-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Setting up fuse (2.9.9-3) ... Setting up squashfs-tools (1:4.4-1ubuntu0.3) ... Setting up libasn1-8-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Setting up libedit2:amd64 (3.1-20191231-1) ... Setting up python3 (3.8.2-0ubuntu2) ... running python rtupdate hooks for python3.8... running python post-rtupdate hooks for python3.8... Setting up libhcrypto4-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Setting up apparmor (2.13.3-7ubuntu5.3) ... Created symlink /etc/systemd/system/sysinit.target.wants/apparmor.service → /lib/systemd/system/apparmor.service. Reloading AppArmor profiles Setting up dbus-user-session (1.12.16-2ubuntu2.3) ... Setting up libwind0-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Setting up libgssapi-krb5-2:amd64 (1.17-6ubuntu4.4) ... Setting up libssh-4:amd64 (0.9.3-2ubuntu2.5) ... Setting up squashfuse (0.1.103-2) ... Setting up openssh-client (1:8.2p1-4ubuntu0.11) ... Setting up libhx509-5-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Setting up libkrb5-26-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Setting up snapd (2.62+20.04) ... Created symlink /etc/systemd/system/multi-user.target.wants/snapd.apparmor.service → /lib/systemd/system/snapd.apparmor.service. Created symlink /etc/systemd/system/multi-user.target.wants/snapd.autoimport.service → /lib/systemd/system/snapd.autoimport.service. Created symlink /etc/systemd/system/multi-user.target.wants/snapd.core-fixup.service → /lib/systemd/system/snapd.core-fixup.service. Created symlink /etc/systemd/system/multi-user.target.wants/snapd.recovery-chooser-trigger.service → /lib/systemd/system/snapd.recovery-chooser-trigger.service. Created symlink /etc/systemd/system/multi-user.target.wants/snapd.seeded.service → /lib/systemd/system/snapd.seeded.service. Created symlink /etc/systemd/system/cloud-final.service.wants/snapd.seeded.service → /lib/systemd/system/snapd.seeded.service. Created symlink /etc/systemd/system/multi-user.target.wants/snapd.service → /lib/systemd/system/snapd.service. Created symlink /etc/systemd/system/timers.target.wants/snapd.snap-repair.timer → /lib/systemd/system/snapd.snap-repair.timer. Created symlink /etc/systemd/system/sockets.target.wants/snapd.socket → /lib/systemd/system/snapd.socket. Created symlink /etc/systemd/system/final.target.wants/snapd.system-shutdown.service → /lib/systemd/system/snapd.system-shutdown.service. snapd.failure.service is a disabled or a static unit, not starting it. snapd.mounts-pre.target is a disabled or a static unit, not starting it. snapd.mounts.target is a disabled or a static unit, not starting it. snapd.snap-repair.service is a disabled or a static unit, not starting it. Setting up libheimntlm0-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Setting up libgssapi3-heimdal:amd64 (7.7.0+dfsg-1ubuntu1.4) ... Setting up libldap-2.4-2:amd64 (2.4.49+dfsg-2ubuntu1.10) ... Setting up libcurl3-gnutls:amd64 (7.68.0-1ubuntu2.22) ... Setting up git (1:2.25.1-1ubuntu3.11) ... Processing triggers for systemd (245.4-4ubuntu3.23) ... Processing triggers for libc-bin (2.31-0ubuntu9.15) ... core20 20240416 from Canonical** installed snap "core20" has no updates available 2024-05-15T15:34:13Z INFO Waiting for automatic snapd restart... snapcraft 8.2.7 from Canonical** installed Running repo phase... Cloning into 'review-tools'... [15/May/2024:15:34:49 +0000] "CONNECT git.launchpad.net:443 HTTP/1.1" 200 96577611 "-" "git/2.25.1" Running pull phase... [15/May/2024:15:34:56 +0000] "GET http://ftpmaster.internal/ubuntu/dists/focal/InRelease HTTP/1.1" 304 - "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" [15/May/2024:15:34:56 +0000] "GET http://ftpmaster.internal/ubuntu/dists/focal-security/InRelease HTTP/1.1" 304 - "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Hit:1 http://ftpmaster.internal/ubuntu focal InRelease Hit:2 http://ftpmaster.internal/ubuntu focal-security InRelease [15/May/2024:15:34:56 +0000] "GET http://ftpmaster.internal/ubuntu/dists/focal-updates/InRelease HTTP/1.1" 304 - "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Hit:3 http://ftpmaster.internal/ubuntu focal-updates InRelease Reading package lists... Installing build dependencies: build-essential execstack fakeroot file findutils flake8 git libmagic-mgc libmagic1 pylint3 python3-coverage python3-dev python3-magic python3-requests python3-ruamel.yaml python3-simplejson python3-venv python3-yaml squashfs-tools Reading package lists... Building dependency tree... Reading state information... fakeroot is already the newest version (1.24-1). findutils is already the newest version (4.7.0-1ubuntu1). git is already the newest version (1:2.25.1-1ubuntu3.11). squashfs-tools is already the newest version (1:4.4-1ubuntu0.3). squashfs-tools set to manually installed. build-essential is already the newest version (12.8ubuntu1.1). The following additional packages will be installed: libelf1 libexpat1-dev libpython3-dev libpython3.8 libpython3.8-dev libyaml-0-2 python-pip-whl python3-astroid python3-certifi python3-chardet python3-distutils python3-entrypoints python3-flake8 python3-idna python3-isort python3-lazy-object-proxy python3-lib2to3 python3-logilab-common python3-mccabe python3-pkg-resources python3-pycodestyle python3-pyflakes python3-setuptools python3-six python3-urllib3 python3-wrapt python3.8-dev python3.8-venv zlib1g-dev Suggested packages: pylint-doc python-coverage-doc python3-cryptography python3-openssl python3-socks python-setuptools-doc Recommended packages: python3-tk libjs-jquery-isonscreen libjs-jquery-tablesorter libjs-jquery-throttle-debounce libjs-jquery pyflakes3 The following NEW packages will be installed: execstack file flake8 libelf1 libexpat1-dev libmagic-mgc libmagic1 libpython3-dev libpython3.8 libpython3.8-dev libyaml-0-2 pylint python-pip-whl python3-astroid python3-certifi python3-chardet python3-coverage python3-dev python3-distutils python3-entrypoints python3-flake8 python3-idna python3-isort python3-lazy-object-proxy python3-lib2to3 python3-logilab-common python3-magic python3-mccabe python3-pkg-resources python3-pycodestyle python3-pyflakes python3-requests python3-ruamel.yaml python3-setuptools python3-simplejson python3-six python3-urllib3 python3-venv python3-wrapt python3-yaml python3.8-dev python3.8-venv zlib1g-dev 0 upgraded, 43 newly installed, 0 to remove and 0 not upgraded. Need to get 11.0 MB of archives. After this operation, 49.0 MB of additional disk space will be used. Get:1 http://ftpmaster.internal/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/f/file/libmagic-mgc_5.38-4_amd64.deb HTTP/1.1" 200 218104 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:2 http://ftpmaster.internal/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/f/file/libmagic1_5.38-4_amd64.deb HTTP/1.1" 200 75852 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/f/file/file_5.38-4_amd64.deb HTTP/1.1" 200 23332 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:3 http://ftpmaster.internal/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Get:4 http://ftpmaster.internal/ubuntu focal-security/main amd64 libelf1 amd64 0.176-1.1ubuntu0.1 [44.2 kB] [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/e/elfutils/libelf1_0.176-1.1ubuntu0.1_amd64.deb HTTP/1.1" 200 44180 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:5 http://ftpmaster.internal/ubuntu focal/main amd64 libyaml-0-2 amd64 0.2.2-1 [48.9 kB] [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/liby/libyaml/libyaml-0-2_0.2.2-1_amd64.deb HTTP/1.1" 200 48916 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:6 http://ftpmaster.internal/ubuntu focal-security/main amd64 python3-pkg-resources all 45.2.0-1ubuntu0.1 [130 kB] [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/s/setuptools/python3-pkg-resources_45.2.0-1ubuntu0.1_all.deb HTTP/1.1" 200 130100 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/s/six/python3-six_1.14.0-2_all.deb HTTP/1.1" 200 12088 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:7 http://ftpmaster.internal/ubuntu focal/main amd64 python3-six all 1.14.0-2 [12.1 kB] Get:8 http://ftpmaster.internal/ubuntu focal-security/main amd64 python3-yaml amd64 5.3.1-1ubuntu0.1 [136 kB] [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/pyyaml/python3-yaml_5.3.1-1ubuntu0.1_amd64.deb HTTP/1.1" 200 135572 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:9 http://ftpmaster.internal/ubuntu focal/universe amd64 execstack amd64 0.0.20131005-1 [74.4 kB] [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/universe/p/prelink/execstack_0.0.20131005-1_amd64.deb HTTP/1.1" 200 74386 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/universe/p/python-mccabe/python3-mccabe_0.6.1-3_all.deb HTTP/1.1" 200 8488 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:10 http://ftpmaster.internal/ubuntu focal/universe amd64 python3-mccabe all 0.6.1-3 [8488 B] Get:11 http://ftpmaster.internal/ubuntu focal-updates/universe amd64 python3-pyflakes all 2.1.1-2ubuntu1 [48.7 kB] [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/universe/p/pyflakes/python3-pyflakes_2.1.1-2ubuntu1_all.deb HTTP/1.1" 200 48684 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:12 http://ftpmaster.internal/ubuntu focal-security/main amd64 python3-lib2to3 all 3.8.10-0ubuntu1~20.04 [76.3 kB] [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python3-stdlib-extensions/python3-lib2to3_3.8.10-0ubuntu1%7e20.04_all.deb HTTP/1.1" 200 76320 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:13 http://ftpmaster.internal/ubuntu focal-security/main amd64 python3-distutils all 3.8.10-0ubuntu1~20.04 [141 kB] [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python3-stdlib-extensions/python3-distutils_3.8.10-0ubuntu1%7e20.04_all.deb HTTP/1.1" 200 141344 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:14 http://ftpmaster.internal/ubuntu focal-security/main amd64 python3-setuptools all 45.2.0-1ubuntu0.1 [330 kB] [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/s/setuptools/python3-setuptools_45.2.0-1ubuntu0.1_all.deb HTTP/1.1" 200 329744 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/e/entrypoints/python3-entrypoints_0.3-2ubuntu1_all.deb HTTP/1.1" 200 5740 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:15 http://ftpmaster.internal/ubuntu focal/main amd64 python3-entrypoints all 0.3-2ubuntu1 [5740 B] [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/universe/p/pycodestyle/python3-pycodestyle_2.5.0-2_all.deb HTTP/1.1" 200 36684 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:16 http://ftpmaster.internal/ubuntu focal/universe amd64 python3-pycodestyle all 2.5.0-2 [36.7 kB] Get:17 http://ftpmaster.internal/ubuntu focal/universe amd64 python3-flake8 all 3.7.9-2 [51.8 kB] [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/universe/p/python-flake8/python3-flake8_3.7.9-2_all.deb HTTP/1.1" 200 51840 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" [15/May/2024:15:35:03 +0000] "GET http://ftpmaster.internal/ubuntu/pool/universe/p/python-flake8/flake8_3.7.9-2_all.deb HTTP/1.1" 200 6016 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:18 http://ftpmaster.internal/ubuntu focal/universe amd64 flake8 all 3.7.9-2 [6016 B] Get:19 http://ftpmaster.internal/ubuntu focal-security/main amd64 libexpat1-dev amd64 2.2.9-1ubuntu0.6 [116 kB] [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/e/expat/libexpat1-dev_2.2.9-1ubuntu0.6_amd64.deb HTTP/1.1" 200 116392 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:20 http://ftpmaster.internal/ubuntu focal-security/main amd64 libpython3.8 amd64 3.8.10-0ubuntu1~20.04.9 [1625 kB] [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python3.8/libpython3.8_3.8.10-0ubuntu1%7e20.04.9_amd64.deb HTTP/1.1" 200 1624768 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:21 http://ftpmaster.internal/ubuntu focal-security/main amd64 libpython3.8-dev amd64 3.8.10-0ubuntu1~20.04.9 [3950 kB] [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python3.8/libpython3.8-dev_3.8.10-0ubuntu1%7e20.04.9_amd64.deb HTTP/1.1" 200 3950180 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python3-defaults/libpython3-dev_3.8.2-0ubuntu2_amd64.deb HTTP/1.1" 200 7236 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:22 http://ftpmaster.internal/ubuntu focal/main amd64 libpython3-dev amd64 3.8.2-0ubuntu2 [7236 B] Get:23 http://ftpmaster.internal/ubuntu focal/main amd64 python3-lazy-object-proxy amd64 1.4.3-1build1 [17.9 kB] [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/l/lazy-object-proxy/python3-lazy-object-proxy_1.4.3-1build1_amd64.deb HTTP/1.1" 200 17852 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-wrapt/python3-wrapt_1.11.2-2build1_amd64.deb HTTP/1.1" 200 30620 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:24 http://ftpmaster.internal/ubuntu focal/main amd64 python3-wrapt amd64 1.11.2-2build1 [30.6 kB] Get:25 http://ftpmaster.internal/ubuntu focal/main amd64 python3-astroid all 2.3.3-1 [127 kB] [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/a/astroid/python3-astroid_2.3.3-1_all.deb HTTP/1.1" 200 127348 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/universe/i/isort/python3-isort_4.3.4%2bds1-2_all.deb HTTP/1.1" 200 30700 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:26 http://ftpmaster.internal/ubuntu focal/universe amd64 python3-isort all 4.3.4+ds1-2 [30.7 kB] Get:27 http://ftpmaster.internal/ubuntu focal/main amd64 python3-logilab-common all 1.4.3-2 [119 kB] [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/l/logilab-common/python3-logilab-common_1.4.3-2_all.deb HTTP/1.1" 200 119456 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:28 http://ftpmaster.internal/ubuntu focal/universe amd64 pylint all 2.4.4-2 [218 kB] [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/universe/p/pylint/pylint_2.4.4-2_all.deb HTTP/1.1" 200 217748 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:29 http://ftpmaster.internal/ubuntu focal-security/universe amd64 python-pip-whl all 20.0.2-5ubuntu1.10 [1805 kB] [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/universe/p/python-pip/python-pip-whl_20.0.2-5ubuntu1.10_all.deb HTTP/1.1" 200 1805096 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:30 http://ftpmaster.internal/ubuntu focal/main amd64 python3-certifi all 2019.11.28-1 [149 kB] [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-certifi/python3-certifi_2019.11.28-1_all.deb HTTP/1.1" 200 148736 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:31 http://ftpmaster.internal/ubuntu focal/main amd64 python3-chardet all 3.0.4-4build1 [80.4 kB] [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/c/chardet/python3-chardet_3.0.4-4build1_all.deb HTTP/1.1" 200 80440 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:32 http://ftpmaster.internal/ubuntu focal/universe amd64 python3-coverage amd64 4.5.2+dfsg.1-4ubuntu1 [108 kB] [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/universe/p/python-coverage/python3-coverage_4.5.2%2bdfsg.1-4ubuntu1_amd64.deb HTTP/1.1" 200 107544 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:33 http://ftpmaster.internal/ubuntu focal-security/main amd64 zlib1g-dev amd64 1:1.2.11.dfsg-2ubuntu1.5 [155 kB] [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/z/zlib/zlib1g-dev_1.2.11.dfsg-2ubuntu1.5_amd64.deb HTTP/1.1" 200 155496 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:34 http://ftpmaster.internal/ubuntu focal-security/main amd64 python3.8-dev amd64 3.8.10-0ubuntu1~20.04.9 [514 kB] [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python3.8/python3.8-dev_3.8.10-0ubuntu1%7e20.04.9_amd64.deb HTTP/1.1" 200 514048 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python3-defaults/python3-dev_3.8.2-0ubuntu2_amd64.deb HTTP/1.1" 200 1212 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:35 http://ftpmaster.internal/ubuntu focal/main amd64 python3-dev amd64 3.8.2-0ubuntu2 [1212 B] [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-idna/python3-idna_2.8-1_all.deb HTTP/1.1" 200 34600 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:36 http://ftpmaster.internal/ubuntu focal/main amd64 python3-idna all 2.8-1 [34.6 kB] Get:37 http://ftpmaster.internal/ubuntu focal-security/main amd64 python3-urllib3 all 1.25.8-2ubuntu0.3 [88.7 kB] [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-urllib3/python3-urllib3_1.25.8-2ubuntu0.3_all.deb HTTP/1.1" 200 88744 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:38 http://ftpmaster.internal/ubuntu focal-security/main amd64 python3-requests all 2.22.0-2ubuntu1.1 [47.2 kB] [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/r/requests/python3-requests_2.22.0-2ubuntu1.1_all.deb HTTP/1.1" 200 47160 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:39 http://ftpmaster.internal/ubuntu focal/universe amd64 python3-ruamel.yaml amd64 0.15.89-3build1 [228 kB] [15/May/2024:15:35:04 +0000] "GET http://ftpmaster.internal/ubuntu/pool/universe/r/ruamel.yaml/python3-ruamel.yaml_0.15.89-3build1_amd64.deb HTTP/1.1" 200 228284 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:40 http://ftpmaster.internal/ubuntu focal/main amd64 python3-simplejson amd64 3.16.0-2ubuntu2 [50.8 kB] [15/May/2024:15:35:05 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/s/simplejson/python3-simplejson_3.16.0-2ubuntu2_amd64.deb HTTP/1.1" 200 50780 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" [15/May/2024:15:35:05 +0000] "GET http://ftpmaster.internal/ubuntu/pool/universe/p/python3.8/python3.8-venv_3.8.10-0ubuntu1%7e20.04.9_amd64.deb HTTP/1.1" 200 5452 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:41 http://ftpmaster.internal/ubuntu focal-security/universe amd64 python3.8-venv amd64 3.8.10-0ubuntu1~20.04.9 [5452 B] [15/May/2024:15:35:05 +0000] "GET http://ftpmaster.internal/ubuntu/pool/universe/p/python3-defaults/python3-venv_3.8.2-0ubuntu2_amd64.deb HTTP/1.1" 200 1228 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:42 http://ftpmaster.internal/ubuntu focal/universe amd64 python3-venv amd64 3.8.2-0ubuntu2 [1228 B] [15/May/2024:15:35:05 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-magic/python3-magic_0.4.15-3_all.deb HTTP/1.1" 200 9376 "-" "Debian APT-HTTP/1.3 (2.0.10) non-interactive" Get:43 http://ftpmaster.internal/ubuntu focal/main amd64 python3-magic all 2:0.4.15-3 [9376 B] debconf: delaying package configuration, since apt-utils is not installed Fetched 11.0 MB in 1s (8124 kB/s) Selecting previously unselected package libmagic-mgc. (Reading database ... 15356 files and directories currently installed.) Preparing to unpack .../00-libmagic-mgc_1%3a5.38-4_amd64.deb ... Unpacking libmagic-mgc (1:5.38-4) ... Selecting previously unselected package libmagic1:amd64. Preparing to unpack .../01-libmagic1_1%3a5.38-4_amd64.deb ... Unpacking libmagic1:amd64 (1:5.38-4) ... Selecting previously unselected package file. Preparing to unpack .../02-file_1%3a5.38-4_amd64.deb ... Unpacking file (1:5.38-4) ... Selecting previously unselected package libelf1:amd64. Preparing to unpack .../03-libelf1_0.176-1.1ubuntu0.1_amd64.deb ... Unpacking libelf1:amd64 (0.176-1.1ubuntu0.1) ... Selecting previously unselected package libyaml-0-2:amd64. Preparing to unpack .../04-libyaml-0-2_0.2.2-1_amd64.deb ... Unpacking libyaml-0-2:amd64 (0.2.2-1) ... Selecting previously unselected package python3-pkg-resources. Preparing to unpack .../05-python3-pkg-resources_45.2.0-1ubuntu0.1_all.deb ... Unpacking python3-pkg-resources (45.2.0-1ubuntu0.1) ... Selecting previously unselected package python3-six. Preparing to unpack .../06-python3-six_1.14.0-2_all.deb ... Unpacking python3-six (1.14.0-2) ... Selecting previously unselected package python3-yaml. Preparing to unpack .../07-python3-yaml_5.3.1-1ubuntu0.1_amd64.deb ... Unpacking python3-yaml (5.3.1-1ubuntu0.1) ... Selecting previously unselected package execstack. Preparing to unpack .../08-execstack_0.0.20131005-1_amd64.deb ... Unpacking execstack (0.0.20131005-1) ... Selecting previously unselected package python3-mccabe. Preparing to unpack .../09-python3-mccabe_0.6.1-3_all.deb ... Unpacking python3-mccabe (0.6.1-3) ... Selecting previously unselected package python3-pyflakes. Preparing to unpack .../10-python3-pyflakes_2.1.1-2ubuntu1_all.deb ... Unpacking python3-pyflakes (2.1.1-2ubuntu1) ... Selecting previously unselected package python3-lib2to3. Preparing to unpack .../11-python3-lib2to3_3.8.10-0ubuntu1~20.04_all.deb ... Unpacking python3-lib2to3 (3.8.10-0ubuntu1~20.04) ... Selecting previously unselected package python3-distutils. Preparing to unpack .../12-python3-distutils_3.8.10-0ubuntu1~20.04_all.deb ... Unpacking python3-distutils (3.8.10-0ubuntu1~20.04) ... Selecting previously unselected package python3-setuptools. Preparing to unpack .../13-python3-setuptools_45.2.0-1ubuntu0.1_all.deb ... Unpacking python3-setuptools (45.2.0-1ubuntu0.1) ... Selecting previously unselected package python3-entrypoints. Preparing to unpack .../14-python3-entrypoints_0.3-2ubuntu1_all.deb ... Unpacking python3-entrypoints (0.3-2ubuntu1) ... Selecting previously unselected package python3-pycodestyle. Preparing to unpack .../15-python3-pycodestyle_2.5.0-2_all.deb ... Unpacking python3-pycodestyle (2.5.0-2) ... Selecting previously unselected package python3-flake8. Preparing to unpack .../16-python3-flake8_3.7.9-2_all.deb ... Unpacking python3-flake8 (3.7.9-2) ... Selecting previously unselected package flake8. Preparing to unpack .../17-flake8_3.7.9-2_all.deb ... Unpacking flake8 (3.7.9-2) ... Selecting previously unselected package libexpat1-dev:amd64. Preparing to unpack .../18-libexpat1-dev_2.2.9-1ubuntu0.6_amd64.deb ... Unpacking libexpat1-dev:amd64 (2.2.9-1ubuntu0.6) ... Selecting previously unselected package libpython3.8:amd64. Preparing to unpack .../19-libpython3.8_3.8.10-0ubuntu1~20.04.9_amd64.deb ... Unpacking libpython3.8:amd64 (3.8.10-0ubuntu1~20.04.9) ... Selecting previously unselected package libpython3.8-dev:amd64. Preparing to unpack .../20-libpython3.8-dev_3.8.10-0ubuntu1~20.04.9_amd64.deb ... Unpacking libpython3.8-dev:amd64 (3.8.10-0ubuntu1~20.04.9) ... Selecting previously unselected package libpython3-dev:amd64. Preparing to unpack .../21-libpython3-dev_3.8.2-0ubuntu2_amd64.deb ... Unpacking libpython3-dev:amd64 (3.8.2-0ubuntu2) ... Selecting previously unselected package python3-lazy-object-proxy. Preparing to unpack .../22-python3-lazy-object-proxy_1.4.3-1build1_amd64.deb ... Unpacking python3-lazy-object-proxy (1.4.3-1build1) ... Selecting previously unselected package python3-wrapt. Preparing to unpack .../23-python3-wrapt_1.11.2-2build1_amd64.deb ... Unpacking python3-wrapt (1.11.2-2build1) ... Selecting previously unselected package python3-astroid. Preparing to unpack .../24-python3-astroid_2.3.3-1_all.deb ... Unpacking python3-astroid (2.3.3-1) ... Selecting previously unselected package python3-isort. Preparing to unpack .../25-python3-isort_4.3.4+ds1-2_all.deb ... Unpacking python3-isort (4.3.4+ds1-2) ... Selecting previously unselected package python3-logilab-common. Preparing to unpack .../26-python3-logilab-common_1.4.3-2_all.deb ... Unpacking python3-logilab-common (1.4.3-2) ... Selecting previously unselected package pylint. Preparing to unpack .../27-pylint_2.4.4-2_all.deb ... Unpacking pylint (2.4.4-2) ... Selecting previously unselected package python-pip-whl. Preparing to unpack .../28-python-pip-whl_20.0.2-5ubuntu1.10_all.deb ... Unpacking python-pip-whl (20.0.2-5ubuntu1.10) ... Selecting previously unselected package python3-certifi. Preparing to unpack .../29-python3-certifi_2019.11.28-1_all.deb ... Unpacking python3-certifi (2019.11.28-1) ... Selecting previously unselected package python3-chardet. Preparing to unpack .../30-python3-chardet_3.0.4-4build1_all.deb ... Unpacking python3-chardet (3.0.4-4build1) ... Selecting previously unselected package python3-coverage. Preparing to unpack .../31-python3-coverage_4.5.2+dfsg.1-4ubuntu1_amd64.deb ... Unpacking python3-coverage (4.5.2+dfsg.1-4ubuntu1) ... Selecting previously unselected package zlib1g-dev:amd64. Preparing to unpack .../32-zlib1g-dev_1%3a1.2.11.dfsg-2ubuntu1.5_amd64.deb ... Unpacking zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Selecting previously unselected package python3.8-dev. Preparing to unpack .../33-python3.8-dev_3.8.10-0ubuntu1~20.04.9_amd64.deb ... Unpacking python3.8-dev (3.8.10-0ubuntu1~20.04.9) ... Selecting previously unselected package python3-dev. Preparing to unpack .../34-python3-dev_3.8.2-0ubuntu2_amd64.deb ... Unpacking python3-dev (3.8.2-0ubuntu2) ... Selecting previously unselected package python3-idna. Preparing to unpack .../35-python3-idna_2.8-1_all.deb ... Unpacking python3-idna (2.8-1) ... Selecting previously unselected package python3-urllib3. Preparing to unpack .../36-python3-urllib3_1.25.8-2ubuntu0.3_all.deb ... Unpacking python3-urllib3 (1.25.8-2ubuntu0.3) ... Selecting previously unselected package python3-requests. Preparing to unpack .../37-python3-requests_2.22.0-2ubuntu1.1_all.deb ... Unpacking python3-requests (2.22.0-2ubuntu1.1) ... Selecting previously unselected package python3-ruamel.yaml. Preparing to unpack .../38-python3-ruamel.yaml_0.15.89-3build1_amd64.deb ... Unpacking python3-ruamel.yaml (0.15.89-3build1) ... Selecting previously unselected package python3-simplejson. Preparing to unpack .../39-python3-simplejson_3.16.0-2ubuntu2_amd64.deb ... Unpacking python3-simplejson (3.16.0-2ubuntu2) ... Selecting previously unselected package python3.8-venv. Preparing to unpack .../40-python3.8-venv_3.8.10-0ubuntu1~20.04.9_amd64.deb ... Unpacking python3.8-venv (3.8.10-0ubuntu1~20.04.9) ... Selecting previously unselected package python3-venv. Preparing to unpack .../41-python3-venv_3.8.2-0ubuntu2_amd64.deb ... Unpacking python3-venv (3.8.2-0ubuntu2) ... Selecting previously unselected package python3-magic. Preparing to unpack .../42-python3-magic_2%3a0.4.15-3_all.deb ... Unpacking python3-magic (2:0.4.15-3) ... Setting up python3-pkg-resources (45.2.0-1ubuntu0.1) ... Setting up python3-entrypoints (0.3-2ubuntu1) ... Setting up libmagic-mgc (1:5.38-4) ... Setting up libyaml-0-2:amd64 (0.2.2-1) ... Setting up python3-pyflakes (2.1.1-2ubuntu1) ... Setting up libmagic1:amd64 (1:5.38-4) ... Setting up python3-coverage (4.5.2+dfsg.1-4ubuntu1) ... Setting up python3-yaml (5.3.1-1ubuntu0.1) ... Setting up file (1:5.38-4) ... Setting up python3-six (1.14.0-2) ... Setting up python3-simplejson (3.16.0-2ubuntu2) ... Setting up python3-pycodestyle (2.5.0-2) ... Setting up python3-chardet (3.0.4-4build1) ... Setting up libexpat1-dev:amd64 (2.2.9-1ubuntu0.6) ... Setting up python3-certifi (2019.11.28-1) ... Setting up libpython3.8:amd64 (3.8.10-0ubuntu1~20.04.9) ... Setting up python3-idna (2.8-1) ... Setting up python3-wrapt (1.11.2-2build1) ... Setting up python3-isort (4.3.4+ds1-2) ... Setting up python3-urllib3 (1.25.8-2ubuntu0.3) ... Setting up python3-ruamel.yaml (0.15.89-3build1) ... Setting up zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Setting up python3-mccabe (0.6.1-3) ... Setting up python-pip-whl (20.0.2-5ubuntu1.10) ... Setting up python3-lazy-object-proxy (1.4.3-1build1) ... Setting up python3-magic (2:0.4.15-3) ... Setting up python3-lib2to3 (3.8.10-0ubuntu1~20.04) ... Setting up libelf1:amd64 (0.176-1.1ubuntu0.1) ... Setting up python3-distutils (3.8.10-0ubuntu1~20.04) ... Setting up execstack (0.0.20131005-1) ... Setting up python3-setuptools (45.2.0-1ubuntu0.1) ... Setting up python3-logilab-common (1.4.3-2) ... Setting up python3-flake8 (3.7.9-2) ... Setting up libpython3.8-dev:amd64 (3.8.10-0ubuntu1~20.04.9) ... Setting up python3.8-venv (3.8.10-0ubuntu1~20.04.9) ... Setting up python3-requests (2.22.0-2ubuntu1.1) ... Setting up python3.8-dev (3.8.10-0ubuntu1~20.04.9) ... Setting up python3-astroid (2.3.3-1) ... Setting up pylint (2.4.4-2) ... Setting up libpython3-dev:amd64 (3.8.2-0ubuntu2) ... Setting up flake8 (3.7.9-2) ... Setting up python3-venv (3.8.2-0ubuntu2) ... Setting up python3-dev (3.8.2-0ubuntu2) ... Processing triggers for libc-bin (2.31-0ubuntu9.15) ... pylint3 can not be marked as it is not installed. build-essential set to automatically installed. execstack set to automatically installed. fakeroot set to automatically installed. file set to automatically installed. findutils set to automatically installed. flake8 set to automatically installed. git set to automatically installed. libmagic-mgc set to automatically installed. libmagic1 set to automatically installed. python3-coverage set to automatically installed. python3-dev set to automatically installed. python3-magic set to automatically installed. python3-requests set to automatically installed. python3-ruamel.yaml set to automatically installed. python3-simplejson set to automatically installed. python3-venv set to automatically installed. python3-yaml set to automatically installed. squashfs-tools set to automatically installed. [15/May/2024:15:35:17 +0000] "CONNECT api.snapcraft.io:443 HTTP/1.0" 200 14508 "-" "-" [15/May/2024:15:35:21 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/b/blinker/python3-blinker_1.4%2bdfsg1-0.3ubuntu1_all.deb HTTP/1.1" 200 13244 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:21 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-tz/python3-tz_2019.3-1ubuntu0.20.04.0_all.deb HTTP/1.1" 200 24528 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:21 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-oslo.log/python3-oslo.log_4.1.1-0ubuntu1_all.deb HTTP/1.1" 200 42680 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:21 +0000] "GET http://ftpmaster.internal/ubuntu/pool/universe/r/ruamel.yaml/python3-ruamel.yaml_0.15.89-3build1_amd64.deb HTTP/1.1" 200 228284 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:21 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-babel/python-babel-localedata_2.6.0%2bdfsg.1-1ubuntu2.2_all.deb HTTP/1.1" 200 4627760 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:21 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/b/binutils/libctf-nobfd0_2.34-6ubuntu1.9_amd64.deb HTTP/1.1" 200 48248 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:21 +0000] "GET http://ftpmaster.internal/ubuntu/pool/universe/p/prelink/execstack_0.0.20131005-1_amd64.deb HTTP/1.1" 200 74386 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:21 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-dateutil/python3-dateutil_2.7.3-3ubuntu1_all.deb HTTP/1.1" 200 63272 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:21 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/f/file/libmagic-mgc_5.38-4_amd64.deb HTTP/1.1" 200 218104 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:21 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-monotonic/python3-monotonic_1.5-0ubuntu2_all.deb HTTP/1.1" 200 5660 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:21 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-cffi/python3-cffi-backend_1.14.0-1build1_amd64.deb HTTP/1.1" 200 68708 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:22 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/s/sgml-base/sgml-base_1.29.1_all.deb HTTP/1.1" 200 12432 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:22 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/d/db5.3/libdb5.3_5.3.28%2bdfsg1-0.6ubuntu2_amd64.deb HTTP/1.1" 200 675076 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:22 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/b/binutils/libbinutils_2.34-6ubuntu1.9_amd64.deb HTTP/1.1" 200 474932 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:22 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/f/fakeroot/libfakeroot_1.24-1_amd64.deb HTTP/1.1" 200 25720 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:22 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-wrapt/python3-wrapt_1.11.2-2build1_amd64.deb HTTP/1.1" 200 30620 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:22 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/f/file/libmagic1_5.38-4_amd64.deb HTTP/1.1" 200 75852 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:22 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/b/binutils/binutils-x86-64-linux-gnu_2.34-6ubuntu1.9_amd64.deb HTTP/1.1" 200 1613596 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:22 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-oslo.context/python3-oslo.context_3.0.2-0ubuntu1_all.deb HTTP/1.1" 200 12968 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:22 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/f/file/file_5.38-4_amd64.deb HTTP/1.1" 200 23332 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:22 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/r/requests/python3-requests_2.22.0-2ubuntu1.1_all.deb HTTP/1.1" 200 47160 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:22 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-os-service-types/python3-os-service-types_1.7.0-0ubuntu1_all.deb HTTP/1.1" 200 13068 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:22 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-urllib3/python3-urllib3_1.25.8-2ubuntu0.3_all.deb HTTP/1.1" 200 88744 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:22 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/s/squashfs-tools/squashfs-tools_4.4-1ubuntu0.3_amd64.deb HTTP/1.1" 200 117356 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:23 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/pyparsing/python3-pyparsing_2.4.6-1_all.deb HTTP/1.1" 200 61300 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:23 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-oslo.serialization/python3-oslo.serialization_3.1.1-0ubuntu1_all.deb HTTP/1.1" 200 16240 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:23 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/libx/libxml2/libxml2_2.9.10%2bdfsg-5ubuntu0.20.04.7_amd64.deb HTTP/1.1" 200 640292 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:23 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-oslo.i18n/python3-oslo.i18n_4.0.1-0ubuntu1_all.deb HTTP/1.1" 200 22396 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:23 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/w/wget/wget_1.20.3-1ubuntu2_amd64.deb HTTP/1.1" 200 348052 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:23 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/i/ieee-data/ieee-data_20180805.1_all.deb HTTP/1.1" 200 1588948 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:23 +0000] "GET http://ftpmaster.internal/ubuntu/pool/universe/p/python-coverage/python3-coverage_4.5.2%2bdfsg.1-4ubuntu1_amd64.deb HTTP/1.1" 200 107544 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:23 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-keystoneauth1/python3-keystoneauth1_4.0.0-0ubuntu1_all.deb HTTP/1.1" 200 156284 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:23 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-netaddr/python3-netaddr_0.7.19-3ubuntu1_all.deb HTTP/1.1" 200 235780 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:23 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-docutils/docutils-common_0.16%2bdfsg-2_all.deb HTTP/1.1" 200 116056 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:23 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-babel/python3-babel_2.6.0%2bdfsg.1-1ubuntu2.2_all.deb HTTP/1.1" 200 83460 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:23 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/l/lxml/python3-lxml_4.5.0-1ubuntu0.5_amd64.deb HTTP/1.1" 200 1383624 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:23 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-oauthlib/python3-oauthlib_3.1.0-1ubuntu2_all.deb HTTP/1.1" 200 84844 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:23 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-docutils/python3-docutils_0.16%2bdfsg-2_all.deb HTTP/1.1" 200 368236 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:23 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-debtcollector/python3-debtcollector_2.0.0-0ubuntu1_all.deb HTTP/1.1" 200 13568 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:23 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/b/binutils/libctf0_2.34-6ubuntu1.9_amd64.deb HTTP/1.1" 200 46620 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/pyinotify/python3-pyinotify_0.9.6-1.2ubuntu1_all.deb HTTP/1.1" 200 24820 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-roman/python3-roman_2.0.0-3build1_all.deb HTTP/1.1" 200 8728 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/n/netifaces/python3-netifaces_0.10.4-1ubuntu4_amd64.deb HTTP/1.1" 200 16064 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-certifi/python3-certifi_2019.11.28-1_all.deb HTTP/1.1" 200 148736 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/libx/libxslt/libxslt1.1_1.1.34-4ubuntu0.20.04.1_amd64.deb HTTP/1.1" 200 151316 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/pyjwt/python3-jwt_1.7.1-2ubuntu2.1_all.deb HTTP/1.1" 200 18048 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/b/binutils/binutils-common_2.34-6ubuntu1.9_amd64.deb HTTP/1.1" 200 207936 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-pbr/python3-pbr_5.4.5-0ubuntu1_all.deb HTTP/1.1" 200 64012 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/s/six/python3-six_1.14.0-2_all.deb HTTP/1.1" 200 12088 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/pyyaml/python3-yaml_5.3.1-1ubuntu0.1_amd64.deb HTTP/1.1" 200 135572 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" Get:1 python3-blinker_1.4+dfsg1-0.3ubuntu1_all.deb [13.2 kB] Fetched 13.2 kB in 0s (0 B/s) Get:1 python3-tz_2019.3-1ubuntu0.20.04.0_all.deb [24.5 kB] Fetched 24.5 kB in 0s (0 B/s) Get:1 python3-oslo.log_4.1.1-0ubuntu1_all.deb [42.7 kB] Fetched 42.7 kB in 0s (0 B/s) Get:1 python3-ruamel.yaml_0.15.89-3build1_amd64.deb [228 kB] Fetched 228 kB in 0s (0 B/s) Get:1 python-babel-localedata_2.6.0+dfsg.1-1ubuntu2.2_all.deb [4628 kB] Fetched 4628 kB in 0s (0 B/s) Get:1 libctf-nobfd0_2.34-6ubuntu1.9_amd64.deb [48.2 kB] Fetched 48.2 kB in 0s (0 B/s) Get:1 execstack_0.0.20131005-1_amd64.deb [74.4 kB] Fetched 74.4 kB in 0s (0 B/s) Get:1 python3-dateutil_2.7.3-3ubuntu1_all.deb [63.3 kB] Fetched 63.3 kB in 0s (0 B/s) Get:1 libmagic-mgc_5.38-4_amd64.deb [218 kB] Fetched 218 kB in 0s (0 B/s) Get:1 python3-monotonic_1.5-0ubuntu2_all.deb [5660 B] Fetched 5660 B in 0s (0 B/s) Get:1 python3-cffi-backend_1.14.0-1build1_amd64.deb [68.7 kB] Fetched 68.7 kB in 0s (0 B/s) Get:1 sgml-base_1.29.1_all.deb [12.4 kB] Fetched 12.4 kB in 0s (0 B/s) Get:1 libdb5.3_5.3.28+dfsg1-0.6ubuntu2_amd64.deb [675 kB] Fetched 675 kB in 0s (0 B/s) Get:1 libbinutils_2.34-6ubuntu1.9_amd64.deb [475 kB] Fetched 475 kB in 0s (0 B/s) Get:1 libfakeroot_1.24-1_amd64.deb [25.7 kB] Fetched 25.7 kB in 0s (0 B/s) Get:1 python3-wrapt_1.11.2-2build1_amd64.deb [30.6 kB] Fetched 30.6 kB in 0s (0 B/s) Get:1 libmagic1_5.38-4_amd64.deb [75.9 kB] Fetched 75.9 kB in 0s (0 B/s) Get:1 binutils-x86-64-linux-gnu_2.34-6ubuntu1.9_amd64.deb [1614 kB] Fetched 1614 kB in 0s (0 B/s) Get:1 python3-oslo.context_3.0.2-0ubuntu1_all.deb [13.0 kB] Fetched 13.0 kB in 0s (0 B/s) Get:1 file_5.38-4_amd64.deb [23.3 kB] Fetched 23.3 kB in 0s (0 B/s) Get:1 python3-requests_2.22.0-2ubuntu1.1_all.deb [47.2 kB] Fetched 47.2 kB in 0s (0 B/s) Get:1 python3-os-service-types_1.7.0-0ubuntu1_all.deb [13.1 kB] Fetched 13.1 kB in 0s (0 B/s) Get:1 python3-urllib3_1.25.8-2ubuntu0.3_all.deb [88.7 kB] Fetched 88.7 kB in 0s (0 B/s) Get:1 squashfs-tools_4.4-1ubuntu0.3_amd64.deb [117 kB] Fetched 117 kB in 0s (0 B/s) Get:1 python3-pyparsing_2.4.6-1_all.deb [61.3 kB] Fetched 61.3 kB in 0s (0 B/s) Get:1 python3-oslo.serialization_3.1.1-0ubuntu1_all.deb [16.2 kB] Fetched 16.2 kB in 0s (0 B/s) Get:1 libxml2_2.9.10+dfsg-5ubuntu0.20.04.7_amd64.deb [640 kB] Fetched 640 kB in 0s (0 B/s) Get:1 python3-oslo.i18n_4.0.1-0ubuntu1_all.deb [22.4 kB] Fetched 22.4 kB in 0s (0 B/s) Get:1 wget_1.20.3-1ubuntu2_amd64.deb [348 kB] Fetched 348 kB in 0s (0 B/s) Get:1 ieee-data_20180805.1_all.deb [1589 kB] Fetched 1589 kB in 0s (0 B/s) Get:1 python3-coverage_4.5.2+dfsg.1-4ubuntu1_amd64.deb [108 kB] Fetched 108 kB in 0s (0 B/s) Get:1 python3-keystoneauth1_4.0.0-0ubuntu1_all.deb [156 kB] Fetched 156 kB in 0s (0 B/s) Get:1 python3-netaddr_0.7.19-3ubuntu1_all.deb [236 kB] Fetched 236 kB in 0s (0 B/s) Get:1 docutils-common_0.16+dfsg-2_all.deb [116 kB] Fetched 116 kB in 0s (0 B/s) Get:1 python3-babel_2.6.0+dfsg.1-1ubuntu2.2_all.deb [83.5 kB] Fetched 83.5 kB in 0s (0 B/s) Get:1 python3-lxml_4.5.0-1ubuntu0.5_amd64.deb [1384 kB] Fetched 1384 kB in 0s (0 B/s) Get:1 python3-oauthlib_3.1.0-1ubuntu2_all.deb [84.8 kB] Fetched 84.8 kB in 0s (0 B/s) Get:1 python3-docutils_0.16+dfsg-2_all.deb [368 kB] Fetched 368 kB in 0s (0 B/s) Get:1 python3-debtcollector_2.0.0-0ubuntu1_all.deb [13.6 kB] Fetched 13.6 kB in 0s (0 B/s) Get:1 libctf0_2.34-6ubuntu1.9_amd64.deb [46.6 kB] Fetched 46.6 kB in 0s (0 B/s) Get:1 python3-pyinotify_0.9.6-1.2ubuntu1_all.deb [24.8 kB] Fetched 24.8 kB in 0s (0 B/s) Get:1 python3-roman_2.0.0-3build1_all.deb [8728 B] Fetched 8728 B in 0s (0 B/s) Get:1 python3-netifaces_0.10.4-1ubuntu4_amd64.deb [16.1 kB] Fetched 16.1 kB in 0s (0 B/s) Get:1 python3-certifi_2019.11.28-1_all.deb [149 kB] Fetched 149 kB in 0s (0 B/s) Get:1 libxslt1.1_1.1.34-4ubuntu0.20.04.1_amd64.deb [151 kB] Fetched 151 kB in 0s (0 B/s) Get:1 python3-jwt_1.7.1-2ubuntu2.1_all.deb [18.0 kB] Fetched 18.0 kB in 0s (0 B/s) Get:1 binutils-common_2.34-6ubuntu1.9_amd64.deb [208 kB] Fetched 208 kB in 0s (0 B/s) Get:1 python3-pbr_5.4.5-0ubuntu1_all.deb [64.0 kB] Fetched 64.0 kB in 0s (0 B/s) Get:1 python3-six_1.14.0-2_all.deb [12.1 kB] Fetched 12.1 kB in 0s (0 B/s) Get:1 python3-yaml_5.3.1-1ubuntu0.1_amd64.deb [136 kB] Fetched 136 kB in 0s (0 B/s)[15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/s/stevedore/python3-stevedore_1.32.0-0ubuntu2_all.deb HTTP/1.1" 200 18408 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-oslo.utils/python3-oslo.utils_4.1.1-0ubuntu1.1_all.deb HTTP/1.1" 200 60148 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-idna/python3-idna_2.8-1_all.deb HTTP/1.1" 200 34600 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-rfc3986/python3-rfc3986_1.3.2-0ubuntu2_all.deb HTTP/1.1" 200 21924 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/c/chardet/python3-chardet_3.0.4-4build1_all.deb HTTP/1.1" 200 80440 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-magic/python3-magic_0.4.15-3_all.deb HTTP/1.1" 200 9376 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-msgpack/python3-msgpack_0.6.2-1_amd64.deb HTTP/1.1" 200 73476 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:24 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/x/xml-core/xml-core_0.18%2bnmu1_all.deb HTTP/1.1" 200 21592 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:25 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-iso8601/python3-iso8601_0.1.12-1_all.deb HTTP/1.1" 200 10476 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:25 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-cryptography/python3-cryptography_2.8-3ubuntu0.3_amd64.deb HTTP/1.1" 200 210704 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:25 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-keystoneclient/python3-keystoneclient_4.0.0-0ubuntu1_all.deb HTTP/1.1" 200 177948 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:25 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/i/icu/libicu66_66.1-2ubuntu2.1_amd64.deb HTTP/1.1" 200 8515480 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:25 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-swiftclient/python3-swiftclient_3.9.0-0ubuntu1.2_all.deb HTTP/1.1" 200 66284 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:25 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/p/python-oslo.config/python3-oslo.config_8.0.2-0ubuntu1_all.deb HTTP/1.1" 200 84012 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:25 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/b/binutils/binutils_2.34-6ubuntu1.9_amd64.deb HTTP/1.1" 200 3380 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:25 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/f/fakeroot/fakeroot_1.24-1_amd64.deb HTTP/1.1" 200 62636 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:25 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/libp/libpsl/libpsl5_0.21.0-1ubuntu1_amd64.deb HTTP/1.1" 200 51516 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" [15/May/2024:15:35:25 +0000] "GET http://ftpmaster.internal/ubuntu/pool/main/s/simplejson/python3-simplejson_3.16.0-2ubuntu2_amd64.deb HTTP/1.1" 200 50780 "-" "Debian APT-HTTP/1.3 (2.4.12) non-interactive" Get:1 python3-stevedore_1.32.0-0ubuntu2_all.deb [18.4 kB] Fetched 18.4 kB in 0s (0 B/s) Get:1 python3-oslo.utils_4.1.1-0ubuntu1.1_all.deb [60.1 kB] Fetched 60.1 kB in 0s (0 B/s) Get:1 python3-idna_2.8-1_all.deb [34.6 kB] Fetched 34.6 kB in 0s (0 B/s) Get:1 python3-rfc3986_1.3.2-0ubuntu2_all.deb [21.9 kB] Fetched 21.9 kB in 0s (0 B/s) Get:1 python3-chardet_3.0.4-4build1_all.deb [80.4 kB] Fetched 80.4 kB in 0s (0 B/s) Get:1 python3-magic_0.4.15-3_all.deb [9376 B] Fetched 9376 B in 0s (0 B/s) Get:1 python3-msgpack_0.6.2-1_amd64.deb [73.5 kB] Fetched 73.5 kB in 0s (0 B/s) Get:1 xml-core_0.18+nmu1_all.deb [21.6 kB] Fetched 21.6 kB in 0s (0 B/s) Get:1 python3-iso8601_0.1.12-1_all.deb [10.5 kB] Fetched 10.5 kB in 0s (0 B/s) Get:1 python3-cryptography_2.8-3ubuntu0.3_amd64.deb [211 kB] Fetched 211 kB in 0s (0 B/s) Get:1 python3-keystoneclient_4.0.0-0ubuntu1_all.deb [178 kB] Fetched 178 kB in 0s (0 B/s) Get:1 libicu66_66.1-2ubuntu2.1_amd64.deb [8515 kB] Fetched 8515 kB in 0s (0 B/s) Get:1 python3-swiftclient_3.9.0-0ubuntu1.2_all.deb [66.3 kB] Fetched 66.3 kB in 0s (0 B/s) Get:1 python3-oslo.config_8.0.2-0ubuntu1_all.deb [84.0 kB] Fetched 84.0 kB in 0s (0 B/s) Get:1 binutils_2.34-6ubuntu1.9_amd64.deb [3380 B] Fetched 3380 B in 0s (0 B/s) Get:1 fakeroot_1.24-1_amd64.deb [62.6 kB] Fetched 62.6 kB in 0s (0 B/s) Get:1 libpsl5_0.21.0-1ubuntu1_amd64.deb [51.5 kB] Fetched 51.5 kB in 0s (0 B/s) Get:1 python3-simplejson_3.16.0-2ubuntu2_amd64.deb [50.8 kB] Fetched 50.8 kB in 0s (0 B/s) Pulling review-tools + snapcraftctl pull Running build phase... 'pylint3' is a virtual package, use non virtual packages for deterministic results. Skipping pull review-tools (already ran) Building review-tools + snapcraftctl build + python3 -m venv /build/review-tools/parts/review-tools/install + SNAPCRAFT_PYTHON_VENV_INTERP_PATH=/build/review-tools/parts/review-tools/install/bin/python3 + pip install -U pip setuptools wheel Collecting pip Downloading pip-24.0-py3-none-any.whl (2.1 MB) Collecting setuptools Downloading setuptools-69.5.1-py3-none-any.whl (894 kB) Collecting wheel Downloading wheel-0.43.0-py3-none-any.whl (65 kB) Installing collected packages: pip, setuptools, wheel Attempting uninstall: pip Found existing installation: pip 20.0.2 Uninstalling pip-20.0.2: Successfully uninstalled pip-20.0.2 Attempting uninstall: setuptools Found existing installation: setuptools 44.0.0 Uninstalling setuptools-44.0.0: Successfully uninstalled setuptools-44.0.0 Successfully installed pip-24.0 setuptools-69.5.1 wheel-0.43.0 [15/May/2024:15:35:55 +0000] "CONNECT pypi.org:443 HTTP/1.0" 200 204874 "-" "-" [15/May/2024:15:35:55 +0000] "CONNECT files.pythonhosted.org:443 HTTP/1.0" 200 3081811 "-" "-" + '[' -f setup.py -o -f pyproject.toml ']' + pip install -U . Processing /build/review-tools/parts/review-tools/build Preparing metadata (setup.py): started Preparing metadata (setup.py): finished with status 'done' Building wheels for collected packages: review-tools Building wheel for review-tools (setup.py): started Building wheel for review-tools (setup.py): finished with status 'done' Created wheel for review-tools: filename=review_tools-0.48+20240219.1-py3-none-any.whl size=244937 sha256=9fb5407cc928ed8020d9dc58bb27923f1786b08c9609f5b5e0cd0eaa93f9df9b Stored in directory: /tmp/pip-ephem-wheel-cache-dhyb6_il/wheels/d6/1b/19/c59302c0e3cac1d39fe9cbb03e7eaa17e993ceddd3418dca9e Successfully built review-tools Installing collected packages: review-tools Successfully installed review-tools-0.48+20240219.1 [15/May/2024:15:35:57 +0000] "CONNECT pypi.org:443 HTTP/1.0" 200 38683 "-" "-" + find /build/review-tools/parts/review-tools/install -type f -executable -print0 + xargs -0 sed -i '1 s|^#\!/build/review-tools/parts/review-tools/install/bin/python3.*$|#\!/usr/bin/env python3|' ++ determine_link_target +++ set +o +x +++ grep xtrace ++ opts_state='set -o xtrace' +++ dirname /build/review-tools/parts/review-tools/install/bin/python3 ++ interp_dir=/build/review-tools/parts/review-tools/install/bin +++ which python3 ++ python_path=/build/review-tools/parts/review-tools/install/bin/python3 +++ readlink -e /build/review-tools/parts/review-tools/install/bin/python3 ++ python_path=/usr/bin/python3.8 ++ for dir in "${SNAPCRAFT_PART_INSTALL}" "${SNAPCRAFT_STAGE}" ++ echo /usr/bin/python3.8 ++ grep -q /build/review-tools/parts/review-tools/install ++ for dir in "${SNAPCRAFT_PART_INSTALL}" "${SNAPCRAFT_STAGE}" ++ grep -q /build/review-tools/stage ++ echo /usr/bin/python3.8 ++ echo /usr/bin/python3.8 ++ eval 'set -o xtrace' +++ set -o xtrace + python_path=/usr/bin/python3.8 + ln -sf /usr/bin/python3.8 /build/review-tools/parts/review-tools/install/bin/python3 ++ git describe --tags ++ cut -c1-25 + snapcraftctl set-version 0.48+20240219-1530UTC-33-geb1c + cd /build/review-tools/parts/review-tools/build + ./override-build.sh ./tests/test-updates-available.sh = Test --seen-db updated = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-1.db' --store-db='./tests/test-store-1.db'... From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1 * libxcursor1: 3501-1 Revision r13 (amd64; channels: edge) * libtiff5: 3602-1 * libxcursor1: 3501-1 Revision r14 (i386; channels: edge) * libtiff5: 3602-1 * libxcursor1: 3501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-1.db' --store-db='./tests/test-store-1.db'... = Test rocks --seen-db updated = Emptying seen.db Running: rock-updates-available --seen-db='' --usn-db='./tests/test-usn-unittest-1.db' --store-db='./tests/test-rocks-store-unittest-1.db'... From: Snap Store To: rocks@canonical.com, athos.ribeiro@canonical.com, carl.csaposs@canonical.com, dragomir.penev@canonical.com, jose.masson@canonical.com, leon.mintz@canonical.com, paulo.machado@canonical.com, sergio.durigan@canonical.com, simon.aronsson@canonical.com, ubuntu-docker-images@lists.launchpad.net Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: apache2 contains outdated Ubuntu packages A scan of this rock shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each rock revision: Revision r852f7702e973 (amd64; channels: edge, beta) * libxcursor1: 3501-1 Simply rebuilding the rock will pull in the new security updates and resolve this. If your rock also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your rock and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ Running: rock-updates-available --seen-db='' --usn-db='./tests/test-usn-unittest-1.db' --store-db='./tests/test-rocks-store-unittest-1.db'... = Test multiple USNs with --seen-db updated = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-2.db' --store-db='./tests/test-store-1.db'... From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r13 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r14 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-2.db' --store-db='./tests/test-store-1.db'... = Test --seen-db updated. First email subject says 'contains' and second email subject says 'was built' = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-2.db' --store-db='./tests/test-store-unittest-3.db'... From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-3.db'... From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad was built with outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected build packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * snapcraft: 5501-1 Revision r12 (i386; channels: stable, candidate, beta) * snapcraft: 5501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-5501-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-3.db'... = Test --seen-db updated. First email subject says 'contains' and second email subject says 'contains and was built' = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-1.db' --store-db='./tests/test-store-unittest-3.db'... From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1 * libxcursor1: 3501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-3.db'... From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains and was built with outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3606-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3606-1 In addition, the following lists new USNs for affected build packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * snapcraft: 5501-1 Revision r12 (i386; channels: stable, candidate, beta) * snapcraft: 5501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3606-1/ * https://ubuntu.com/security/notices/USN-5501-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-3.db'... = Test --seen-db updated. First email subject says 'was built' and second email subject says 'contains' = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --store-db='./tests/test-store-unittest-3.db'... From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad was built with outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected build packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * snapcraft: 5501-1 Revision r12 (i386; channels: stable, candidate, beta) * snapcraft: 5501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-5501-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-2.db' --store-db='./tests/test-store-unittest-3.db'... From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-2.db' --store-db='./tests/test-store-unittest-3.db'... = Test --seen-db updated. First email subject says 'contains and was built' and second email subject says 'contains' = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-3.db'... From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains and was built with outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 In addition, the following lists new USNs for affected build packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * snapcraft: 5501-1 Revision r12 (i386; channels: stable, candidate, beta) * snapcraft: 5501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ * https://ubuntu.com/security/notices/USN-5501-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-budgie-1.db' --store-db='./tests/test-store-unittest-3.db'... From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libcurl3-gnutls: 3598-1 * libicu55: 3610-1 * libwayland-client0: 3622-1 * libwayland-cursor0: 3622-1 * libwayland-server0: 3622-1 Revision r12 (i386; channels: stable, candidate, beta) * libcurl3-gnutls: 3598-1 * libicu55: 3610-1 * libwayland-client0: 3622-1 * libwayland-cursor0: 3622-1 * libwayland-server0: 3622-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3598-1/ * https://ubuntu.com/security/notices/USN-3610-1/ * https://ubuntu.com/security/notices/USN-3622-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-budgie-1.db' --store-db='./tests/test-store-unittest-3.db'... = Test previous USNs not reported with --seen-db updated = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-2.db' --store-db='./tests/test-store-2.db'... From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r21 (amd64; channels: stable, candidate, beta) * libtiff5: 3606-1 Revision r22 (i386; channels: stable, candidate, beta) * libtiff5: 3606-1 Revision r23 (amd64; channels: edge) * libtiff5: 3606-1 Revision r24 (i386; channels: edge) * libtiff5: 3606-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3606-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-2.db' --store-db='./tests/test-store-2.db'... = Test up to date with --seen-db updated = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-2.db' --store-db='./tests/test-store-3.db'... Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-2.db' --store-db='./tests/test-store-3.db'... = Test real world = Emptying seen.db == one USN affects snap == Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-1.db' --store-db='./tests/test-store-1.db'... From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1 * libxcursor1: 3501-1 Revision r13 (amd64; channels: edge) * libtiff5: 3602-1 * libxcursor1: 3501-1 Revision r14 (i386; channels: edge) * libtiff5: 3602-1 * libxcursor1: 3501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-1.db' --store-db='./tests/test-store-1.db'... == two USNs affect snap == Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-2.db' --store-db='./tests/test-store-1.db'... From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3606-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3606-1 Revision r13 (amd64; channels: edge) * libtiff5: 3606-1 Revision r14 (i386; channels: edge) * libtiff5: 3606-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3606-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-2.db' --store-db='./tests/test-store-1.db'... == no USNs affect snap (snap updated) == Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-2.db' --store-db='./tests/test-store-3.db'... Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-2.db' --store-db='./tests/test-store-3.db'... == two USNs affect snap (snap reverted) == Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-2.db' --store-db='./tests/test-store-1.db'... From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r13 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r14 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-2.db' --store-db='./tests/test-store-1.db'... == no USNs affect snap (snap updated again) == Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-2.db' --store-db='./tests/test-store-3.db'... Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-2.db' --store-db='./tests/test-store-3.db'... = Test --seen-db for ubuntu-budgie-welcome = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-budgie-1.db' --store-db='./tests/test-store-budgie.db'... From: Snap Store To: packaging@ubuntubudgie.org Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: ubuntu-budgie-welcome contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: candidate, beta) * curl: 3598-1 * libcurl3-gnutls: 3598-1 * libicu55: 3610-1 * libssl1.0.0: 3611-1, 3628-1 * libtiff5: 3602-1, 3606-1 * libwayland-client0: 3622-1 * libwayland-cursor0: 3622-1 * libwayland-server0: 3622-1 Revision r12 (i386; channels: candidate, beta) * curl: 3598-1 * libcurl3-gnutls: 3598-1 * libicu55: 3610-1 * libssl1.0.0: 3611-1, 3628-1 * libtiff5: 3602-1, 3606-1 * libwayland-client0: 3622-1 * libwayland-cursor0: 3622-1 * libwayland-server0: 3622-1 Revision r43 (i386; channels: stable, stable/ubuntu-18.04) * libssl1.0.0: 3628-1 Revision r44 (amd64; channels: stable, stable/ubuntu-18.04) * libssl1.0.0: 3628-1 Revision r45 (amd64; channels: edge) * libssl1.0.0: 3628-1 Revision r46 (i386; channels: edge) * libssl1.0.0: 3628-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3598-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ * https://ubuntu.com/security/notices/USN-3610-1/ * https://ubuntu.com/security/notices/USN-3611-1/ * https://ubuntu.com/security/notices/USN-3622-1/ * https://ubuntu.com/security/notices/USN-3628-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-budgie-2.db' --store-db='./tests/test-store-budgie.db'... From: Snap Store To: packaging@ubuntubudgie.org Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: ubuntu-budgie-welcome contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: candidate, beta) * gir1.2-javascriptcoregtk-4.0: 3635-1 * gir1.2-webkit2-4.0: 3635-1 * libjavascriptcoregtk-4.0-18: 3635-1 * libwebkit2gtk-4.0-37: 3635-1 Revision r12 (i386; channels: candidate, beta) * gir1.2-javascriptcoregtk-4.0: 3635-1 * gir1.2-webkit2-4.0: 3635-1 * libjavascriptcoregtk-4.0-18: 3635-1 * libwebkit2gtk-4.0-37: 3635-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3635-1/ = Test --seen-db updated for test-xenial and test-bionic = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-os-release.db' --store-db='./tests/test-store-os-release.db'... From: Snap Store To: foo@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: test-xenial contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r12 (i386; channels: stable, beta) * python-requests: 3790-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3790-1/ From: Snap Store To: foo@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: test-bionic contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r12 (i386; channels: stable, beta) * python-requests: 3790-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3790-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-os-release.db' --store-db='./tests/test-store-os-release.db'... = Test --seen-db updated for linux-generic-bbb = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-kernel.db' --store-db='./tests/test-store-kernel.db'... From: Snap Store To: foo@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: linux-generic-bbb built from outdated Ubuntu kernel A scan of this snap shows that it was built using sources based on a kernel from the Ubuntu archive that has since received security updates. The following lists new USNs for the Ubuntu kernel that the snap is based on in each snap revision: Revision r12 (armhf; channels: stable, beta) * linux-image-generic: 3848-1, 3879-1 Updating the snap's git tree, adjusting the version in the snapcraft.yaml to match that of the Ubuntu kernel this snap is based on and rebuilding the snap should pull in the new security updates and resolve this. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3848-1/ * https://ubuntu.com/security/notices/USN-3879-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-kernel.db' --store-db='./tests/test-store-kernel.db'... = Test --seen-db updated for linux-generic-bbb, kernel and snapcraft USNs = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --store-db='./tests/test-store-kernel.db'... From: Snap Store To: foo@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: linux-generic-bbb built from outdated Ubuntu kernel and with outdated Ubuntu packages A scan of this snap shows that it was built using sources based on a kernel from the Ubuntu archive that has since received security updates. The following lists new USNs for the Ubuntu kernel that the snap is based on in each snap revision: Revision r12 (armhf; channels: stable, beta) * linux-image-generic: 3848-1, 3879-1 In addition, the following lists new USNs for affected build packages in each snap revision: Revision r12 (armhf; channels: stable, beta) * snapcraft: 5501-1 Updating the snap's git tree, adjusting the version in the snapcraft.yaml to match that of the Ubuntu kernel this snap is based on and rebuilding the snap should pull in the new security updates and resolve this. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3848-1/ * https://ubuntu.com/security/notices/USN-3879-1/ * https://ubuntu.com/security/notices/USN-5501-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --store-db='./tests/test-store-kernel.db'... = Test --seen-db updated for linux-generic-bbb. First for kernel USNs and then for snapcraft USN = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-kernel.db' --store-db='./tests/test-store-kernel.db'... From: Snap Store To: foo@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: linux-generic-bbb built from outdated Ubuntu kernel A scan of this snap shows that it was built using sources based on a kernel from the Ubuntu archive that has since received security updates. The following lists new USNs for the Ubuntu kernel that the snap is based on in each snap revision: Revision r12 (armhf; channels: stable, beta) * linux-image-generic: 3848-1, 3879-1 Updating the snap's git tree, adjusting the version in the snapcraft.yaml to match that of the Ubuntu kernel this snap is based on and rebuilding the snap should pull in the new security updates and resolve this. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3848-1/ * https://ubuntu.com/security/notices/USN-3879-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --store-db='./tests/test-store-kernel.db'... From: Snap Store To: foo@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: linux-generic-bbb was built with outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected build packages in each snap revision: Revision r12 (armhf; channels: stable, beta) * snapcraft: 5501-1 Updating the snap's git tree, adjusting the version in the snapcraft.yaml to match that of the Ubuntu kernel this snap is based on and rebuilding the snap should pull in the new security updates and resolve this. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-5501-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --store-db='./tests/test-store-kernel.db'... = Test --seen-db updated for linux-generic-bbb. First for snapcraft USN and then for kernel USNs = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --store-db='./tests/test-store-kernel.db'... From: Snap Store To: foo@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: linux-generic-bbb was built with outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected build packages in each snap revision: Revision r12 (armhf; channels: stable, beta) * snapcraft: 5501-1 Updating the snap's git tree, adjusting the version in the snapcraft.yaml to match that of the Ubuntu kernel this snap is based on and rebuilding the snap should pull in the new security updates and resolve this. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-5501-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-kernel.db' --store-db='./tests/test-store-kernel.db'... From: Snap Store To: foo@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: linux-generic-bbb built from outdated Ubuntu kernel A scan of this snap shows that it was built using sources based on a kernel from the Ubuntu archive that has since received security updates. The following lists new USNs for the Ubuntu kernel that the snap is based on in each snap revision: Revision r12 (armhf; channels: stable, beta) * linux-image-generic: 3848-1, 3879-1 Updating the snap's git tree, adjusting the version in the snapcraft.yaml to match that of the Ubuntu kernel this snap is based on and rebuilding the snap should pull in the new security updates and resolve this. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3848-1/ * https://ubuntu.com/security/notices/USN-3879-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-kernel.db' --store-db='./tests/test-store-kernel.db'... = Test --seen-db updated for linux-generic-bbb. First for both kernel and snapcraft USNs and then for kernel USN only = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-kernel-and-build-pkgs-1.db' --store-db='./tests/test-store-kernel.db'... From: Snap Store To: foo@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: linux-generic-bbb built from outdated Ubuntu kernel and with outdated Ubuntu packages A scan of this snap shows that it was built using sources based on a kernel from the Ubuntu archive that has since received security updates. The following lists new USNs for the Ubuntu kernel that the snap is based on in each snap revision: Revision r12 (armhf; channels: stable, beta) * linux-image-generic: 3879-1 In addition, the following lists new USNs for affected build packages in each snap revision: Revision r12 (armhf; channels: stable, beta) * snapcraft: 5501-1 Updating the snap's git tree, adjusting the version in the snapcraft.yaml to match that of the Ubuntu kernel this snap is based on and rebuilding the snap should pull in the new security updates and resolve this. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3879-1/ * https://ubuntu.com/security/notices/USN-5501-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-kernel.db' --store-db='./tests/test-store-kernel.db'... From: Snap Store To: foo@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: linux-generic-bbb built from outdated Ubuntu kernel A scan of this snap shows that it was built using sources based on a kernel from the Ubuntu archive that has since received security updates. The following lists new USNs for the Ubuntu kernel that the snap is based on in each snap revision: Revision r12 (armhf; channels: stable, beta) * linux-image-generic: 3848-1 Updating the snap's git tree, adjusting the version in the snapcraft.yaml to match that of the Ubuntu kernel this snap is based on and rebuilding the snap should pull in the new security updates and resolve this. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3848-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-kernel.db' --store-db='./tests/test-store-kernel.db'... = Test --seen-db updated for linux-generic-bbb. First for kernel USN only and then for both kernel and snapcraft USNs = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-kernel-reduced.db' --store-db='./tests/test-store-kernel.db'... From: Snap Store To: foo@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: linux-generic-bbb built from outdated Ubuntu kernel A scan of this snap shows that it was built using sources based on a kernel from the Ubuntu archive that has since received security updates. The following lists new USNs for the Ubuntu kernel that the snap is based on in each snap revision: Revision r12 (armhf; channels: stable, beta) * linux-image-generic: 3879-1 Updating the snap's git tree, adjusting the version in the snapcraft.yaml to match that of the Ubuntu kernel this snap is based on and rebuilding the snap should pull in the new security updates and resolve this. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3879-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --store-db='./tests/test-store-kernel.db'... From: Snap Store To: foo@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: linux-generic-bbb built from outdated Ubuntu kernel and with outdated Ubuntu packages A scan of this snap shows that it was built using sources based on a kernel from the Ubuntu archive that has since received security updates. The following lists new USNs for the Ubuntu kernel that the snap is based on in each snap revision: Revision r12 (armhf; channels: stable, beta) * linux-image-generic: 3848-1 In addition, the following lists new USNs for affected build packages in each snap revision: Revision r12 (armhf; channels: stable, beta) * snapcraft: 5501-1 Updating the snap's git tree, adjusting the version in the snapcraft.yaml to match that of the Ubuntu kernel this snap is based on and rebuilding the snap should pull in the new security updates and resolve this. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3848-1/ * https://ubuntu.com/security/notices/USN-5501-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --store-db='./tests/test-store-kernel.db'... = Test --seen-db updated for build-pkgs only = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --store-db='./tests/test-store-kernel.db'... From: Snap Store To: foo@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: linux-generic-bbb was built with outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected build packages in each snap revision: Revision r12 (armhf; channels: stable, beta) * snapcraft: 5501-1 Updating the snap's git tree, adjusting the version in the snapcraft.yaml to match that of the Ubuntu kernel this snap is based on and rebuilding the snap should pull in the new security updates and resolve this. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-5501-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --store-db='./tests/test-store-kernel.db'... = Test --seen-db updated for build-pkgs and staged packages = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-kernel.db'... From: Snap Store To: foo@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: linux-generic-bbb was built with outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected build packages in each snap revision: Revision r12 (armhf; channels: stable, beta) * snapcraft: 5501-1 Updating the snap's git tree, adjusting the version in the snapcraft.yaml to match that of the Ubuntu kernel this snap is based on and rebuilding the snap should pull in the new security updates and resolve this. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-5501-1/ Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-kernel.db'... = Test unkown release and missing usn release = Emptying seen.db Running: snap-updates-available --seen-db='' --usn-db='./tests/test-usn-os-release-dne.db' --store-db='./tests/test-store-os-release-dne.db'... Emptying seen.db Running: snap-updates-available --usn-db='./tests/test-usn-budgie-2.db' --snap='./tests/test-snapcraft-manifest_0_amd64.snap' { "libssl1.0.0": [ "3611-1", "3628-1" ], "openssl": [ "3611-1", "3628-1" ] } Running: snap-updates-available --usn-db='./tests/test-usn-core-with-dpkg-list.db' --snap='./tests/test-core_16-2.37.2_amd64.snap' { "libc-bin": [ "3323-1", "3534-1" ], "libc6": [ "3323-1", "3534-1" ], "multiarch-support": [ "3323-1", "3534-1" ] } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-core-with-dpkg-list.db' --snap='./tests/test-core_16-2.37.2_amd64.snap' { "libc-bin": { "3323-1": [ "CVE-2017-1000366" ], "3534-1": [ "CVE-2017-1000408", "CVE-2017-1000409", "CVE-2017-15670", "CVE-2017-15804", "CVE-2017-16997", "CVE-2017-17426", "CVE-2018-1000001" ] }, "libc6": { "3323-1": [ "CVE-2017-1000366" ], "3534-1": [ "CVE-2017-1000408", "CVE-2017-1000409", "CVE-2017-15670", "CVE-2017-15804", "CVE-2017-16997", "CVE-2017-17426", "CVE-2018-1000001" ] }, "multiarch-support": { "3323-1": [ "CVE-2017-1000366" ], "3534-1": [ "CVE-2017-1000408", "CVE-2017-1000409", "CVE-2017-15670", "CVE-2017-15804", "CVE-2017-16997", "CVE-2017-17426", "CVE-2018-1000001" ] } } Running: snap-updates-available --usn-db='./tests/test-usn-core-with-dpkg-list.db' --snap='./tests/test-core-with-primed-staged_16-2.37.2_amd64.snap' ERROR: Could not find './test-core-with-primed-staged_16-2.37.2_amd64.snap' Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-core-with-dpkg-list.db' --snap='./tests/test-core-with-primed-staged_16-2.37.2_amd64.snap' { "libc-bin": { "3323-1": [ "CVE-2017-1000366" ], "3534-1": [ "CVE-2017-1000408", "CVE-2017-1000409", "CVE-2017-15670", "CVE-2017-15804", "CVE-2017-16997", "CVE-2017-17426", "CVE-2018-1000001" ] }, "libc6": { "3323-1": [ "CVE-2017-1000366" ], "3534-1": [ "CVE-2017-1000408", "CVE-2017-1000409", "CVE-2017-15670", "CVE-2017-15804", "CVE-2017-16997", "CVE-2017-17426", "CVE-2018-1000001" ] }, "multiarch-support": { "3323-1": [ "CVE-2017-1000366" ], "3534-1": [ "CVE-2017-1000408", "CVE-2017-1000409", "CVE-2017-15670", "CVE-2017-15804", "CVE-2017-16997", "CVE-2017-17426", "CVE-2018-1000001" ] } } Running: snap-updates-available --usn-db='./tests/test-usn-core-with-dpkg-list.db' --snap='./tests/test-dpkg-list-app_1.0_amd64.snap' { "libc-bin": [ "3323-1", "3534-1" ], "libc6": [ "3323-1", "3534-1" ], "multiarch-support": [ "3323-1", "3534-1" ] } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-core-with-dpkg-list.db' --snap='./tests/test-dpkg-list-app_1.0_amd64.snap' { "libc-bin": { "3323-1": [ "CVE-2017-1000366" ], "3534-1": [ "CVE-2017-1000408", "CVE-2017-1000409", "CVE-2017-15670", "CVE-2017-15804", "CVE-2017-16997", "CVE-2017-17426", "CVE-2018-1000001" ] }, "libc6": { "3323-1": [ "CVE-2017-1000366" ], "3534-1": [ "CVE-2017-1000408", "CVE-2017-1000409", "CVE-2017-15670", "CVE-2017-15804", "CVE-2017-16997", "CVE-2017-17426", "CVE-2018-1000001" ] }, "multiarch-support": { "3323-1": [ "CVE-2017-1000366" ], "3534-1": [ "CVE-2017-1000408", "CVE-2017-1000409", "CVE-2017-15670", "CVE-2017-15804", "CVE-2017-16997", "CVE-2017-17426", "CVE-2018-1000001" ] } } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel.db' --snap='./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap' { "linux-image-gke": { "4489-1": [ "CVE-2020-14386" ] } } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --snap='./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap' { "linux-image-gke": { "4489-1": [ "CVE-2020-14386" ] }, "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --snap='./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap' { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs.db' --snap='./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap' { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel.db' --snap='./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap' { "linux-image-generic": { "3848-1": [ "CVE-2017-18174", "CVE-2018-12896", "CVE-2018-18690", "CVE-2018-18710" ], "3879-1": [ "CVE-2018-10883", "CVE-2018-16862", "CVE-2018-19407", "CVE-2018-19824", "CVE-2018-20169" ] } } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --snap='./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap' { "linux-image-generic": { "3848-1": [ "CVE-2017-18174", "CVE-2018-12896", "CVE-2018-18690", "CVE-2018-18710" ], "3879-1": [ "CVE-2018-10883", "CVE-2018-16862", "CVE-2018-19407", "CVE-2018-19824", "CVE-2018-20169" ] }, "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --snap='./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap' { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs.db' --snap='./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap' { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel.db' --snap='./tests/pc-kernel_4.15.0-44.46_i386.snap' { "linux-image-generic": { "3871-2": [ "https://launchpad.net/bugs/1813663", "https://launchpad.net/bugs/1813727" ], "4489-1": [ "CVE-2020-14386" ] } } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --snap='./tests/pc-kernel_4.15.0-44.46_i386.snap' { "linux-image-generic": { "3871-2": [ "https://launchpad.net/bugs/1813663", "https://launchpad.net/bugs/1813727" ], "4489-1": [ "CVE-2020-14386" ] }, "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --snap='./tests/pc-kernel_4.15.0-44.46_i386.snap' { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs.db' --snap='./tests/pc-kernel_4.15.0-44.46_i386.snap' { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel.db' --snap='./tests/pc-kernel_4.4.0-141.167_amd64.snap' { "linux-image-generic": { "3879-1": [ "CVE-2018-10883", "CVE-2018-16862", "CVE-2018-19407", "CVE-2018-19824", "CVE-2018-20169" ] } } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --snap='./tests/pc-kernel_4.4.0-141.167_amd64.snap' { "linux-image-generic": { "3879-1": [ "CVE-2018-10883", "CVE-2018-16862", "CVE-2018-19407", "CVE-2018-19824", "CVE-2018-20169" ] }, "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --snap='./tests/pc-kernel_4.4.0-141.167_amd64.snap' { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs.db' --snap='./tests/pc-kernel_4.4.0-141.167_amd64.snap' { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-1.db' --store-db='./tests/test-store-unittest-bad-1.db' WARN: 1ad: required field 'revisions' not found ERROR: Errors encountered when scanning store entries From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r13 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r14 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-1.db' From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains and was built with outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r13 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r14 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r15 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r16 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r17 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 In addition, the following lists new USNs for affected build packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * snapcraft: 5501-1 Revision r12 (i386; channels: stable, candidate, beta) * snapcraft: 5501-1 Revision r13 (amd64; channels: edge) * snapcraft: 5501-1 Revision r14 (i386; channels: edge) * snapcraft: 5501-1 Revision r15 (amd64; channels: edge) * snapcraft: 5501-1 Revision r16 (i386; channels: edge) * snapcraft: 5501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ * https://ubuntu.com/security/notices/USN-5501-1/ Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-2.db' From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r13 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r14 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r15 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r16 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --store-db='./tests/test-store-unittest-1.db' From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad was built with outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected build packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * snapcraft: 5501-1 Revision r12 (i386; channels: stable, candidate, beta) * snapcraft: 5501-1 Revision r13 (amd64; channels: edge) * snapcraft: 5501-1 Revision r14 (i386; channels: edge) * snapcraft: 5501-1 Revision r15 (amd64; channels: edge) * snapcraft: 5501-1 Revision r16 (i386; channels: edge) * snapcraft: 5501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-5501-1/ Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-3.db' From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains and was built with outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 In addition, the following lists new USNs for affected build packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * snapcraft: 5501-1 Revision r12 (i386; channels: stable, candidate, beta) * snapcraft: 5501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ * https://ubuntu.com/security/notices/USN-5501-1/ Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-invalid-snapcraft-version.db' WARN: Invalid Snapcraft version: '4.4.3' not a valid Debian version Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-kernel-invalid-snapcraft-version.db' WARN: Invalid Snapcraft version: '2.3' not a valid Debian version Running: snap-updates-available --usn-db='./tests/test-usn-unittest-lp1841848.db' --snap='./tests/test-check-notices_0.1_amd64.snap' Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-lp1841848.db' --snap='./tests/test-check-notices_0.1_amd64.snap' Running: snap-updates-available --usn-db='./tests/test-usn-unittest-lp1841848.db' --snap='./tests/test-check-notices-needed_0.1_amd64.snap' { "libreoffice-style-tango": [ "4102-1" ], "uno-libs3": [ "4102-1" ] } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-lp1841848.db' --snap='./tests/test-check-notices-needed_0.1_amd64.snap' { "libreoffice-style-tango": { "4102-1": [ "CVE-2019-9850", "CVE-2019-9851", "CVE-2019-9852" ] }, "uno-libs3": { "4102-1": [ "CVE-2019-9850", "CVE-2019-9851", "CVE-2019-9852" ] } } Running: snap-updates-available --usn-db='./tests/test-usn-unittest-lp1841848.db' --snap='./tests/test-check-notices-primed-stage-packages_0.1_amd64.snap' Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-lp1841848.db' --snap='./tests/test-check-notices-primed-stage-packages_0.1_amd64.snap' Running: snap-updates-available --usn-db='./tests/test-usn-unittest-lp1841848.db' --snap='./tests/test-check-notices-primed-stage-packages-needed_0.1_amd64.snap' { "libreoffice-style-tango": [ "4102-1" ], "uno-libs3": [ "4102-1" ] } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-lp1841848.db' --snap='./tests/test-check-notices-primed-stage-packages-needed_0.1_amd64.snap' { "libreoffice-style-tango": { "4102-1": [ "CVE-2019-9850", "CVE-2019-9851", "CVE-2019-9852" ] }, "uno-libs3": { "4102-1": [ "CVE-2019-9850", "CVE-2019-9851", "CVE-2019-9852" ] } } Running: snap-updates-available --usn-db='./tests/test-usn-unittest-lp1841848.db' --snap='./tests/test-check-notices-primed-stage-packages-needed_0.2_amd64.snap' { "uno-libs3": [ "4102-1" ] } Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-lp1841848.db' --snap='./tests/test-check-notices-primed-stage-packages-needed_0.2_amd64.snap' { "uno-libs3": { "4102-1": [ "CVE-2019-9850", "CVE-2019-9851", "CVE-2019-9852" ] } } Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-lp1841848.db' --store-db='./tests/test-store-unittest-lp1841848.db' Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-lp1841848.db' --store-db='./tests/test-store-unittest-lp1841848-needed.db' From: Snap Store To: test.me@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: test-snap contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r1 (amd64; channels: stable, edge) * libreoffice-style-tango: 4102-1 * uno-libs3: 4102-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-4102-1/ Running: ./bin/snap-updates-available --usn-dn='./tests/test-usn-unittest-esm-apps.db' --snap='./tests/test-check-notices-esm-apps_0.1_amd64.snap' { "libopenexr24": [ "5620-1" ] } Running: ./bin/snap-updates-available --usn-dn='./tests/test-usn-unittest-esm-apps.db' --snap='./tests/test-check-notices-esm-apps_0.1_amd64.snap' --ignore-pockets=esm-apps Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-esm-apps.db' --store-db='./tests/test-store-unittest-esm-apps.db' From: Snap Store To: test.me@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: test-snap contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r1 (amd64; channels: stable, edge) * libopenexr24: 5620-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-5620-1/ Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-esm-apps.db' --store-db='./tests/test-store-unittest-esm-apps.db' --ignore-pockets=esm-apps Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-1.db' --store-db='./tests/test-store-collaborators.db' From: Snap Store To: olivier.tilloy@canonical.com, test.collaborator@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ Running: snap-check-notices --no-fetch ./tests/test-snapcraft-manifest_0_amd64.snap { "test-snapcraft-manifest": { "0": { "libssl1.0.0": [ "3611-1", "3628-1" ], "openssl": [ "3611-1", "3628-1" ] } } } Running: snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest_0_amd64.snap { "test-snapcraft-manifest": { "0": { "libssl1.0.0": { "3611-1": [ "CVE-2018-0739" ], "3628-1": [ "CVE-2018-0737" ] }, "openssl": { "3611-1": [ "CVE-2018-0739" ], "3628-1": [ "CVE-2018-0737" ] } } } } Running: USNDB='./tests/test-usn-budgie-3.db' snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest-snapcraft-version_0_amd64.snap { "test-snapcraft-manifest-snapcraft-version": { "0": { "libssl1.0.0": { "3611-1": [ "CVE-2018-0739" ] }, "openssl": { "3611-1": [ "CVE-2018-0739" ] }, "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest-snapcraft-version-needed_0_amd64.snap { "test-snapcraft-manifest-snapcraft-version-needed": { "0": { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest-package-in-installed-snaps_0_amd64.snap { "test-snapcraft-manifest-package-in-installed-snaps": { "0": { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest-snapcraft-updated_0_amd64.snap { "test-snapcraft-manifest-snapcraft-updated": { "0": {} } } Running: snap-check-notices --no-fetch ./tests/test-core_16-2.37.2_amd64.snap { "test-core": { "16-2.37.2": { "libc-bin": [ "3323-1", "3534-1" ], "libc6": [ "3323-1", "3534-1" ], "multiarch-support": [ "3323-1", "3534-1" ] } } } Running: snap-check-notices --no-fetch --with-cves ./tests/test-core_16-2.37.2_amd64.snap { "test-core": { "16-2.37.2": { "libc-bin": { "3323-1": [ "CVE-2017-1000366" ], "3534-1": [ "CVE-2017-1000408", "CVE-2017-1000409", "CVE-2017-15670", "CVE-2017-15804", "CVE-2017-16997", "CVE-2017-17426", "CVE-2018-1000001" ] }, "libc6": { "3323-1": [ "CVE-2017-1000366" ], "3534-1": [ "CVE-2017-1000408", "CVE-2017-1000409", "CVE-2017-15670", "CVE-2017-15804", "CVE-2017-16997", "CVE-2017-17426", "CVE-2018-1000001" ] }, "multiarch-support": { "3323-1": [ "CVE-2017-1000366" ], "3534-1": [ "CVE-2017-1000408", "CVE-2017-1000409", "CVE-2017-15670", "CVE-2017-15804", "CVE-2017-16997", "CVE-2017-17426", "CVE-2018-1000001" ] } } } } Running: snap-check-notices --no-fetch ./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap { "gke-kernel": { "4.15.0-1027.28~16.04.1": { "linux-image-gke": [ "4489-1" ] } } } Running: snap-check-notices --no-fetch --with-cves ./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap { "gke-kernel": { "4.15.0-1027.28~16.04.1": { "linux-image-gke": { "4489-1": [ "CVE-2020-14386" ] } } } } Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch ./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap { "gke-kernel": { "4.15.0-1027.28~16.04.1": { "linux-image-gke": [ "4489-1" ], "snapcraft": [ "5501-1" ] } } } Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap { "gke-kernel": { "4.15.0-1027.28~16.04.1": { "linux-image-gke": { "4489-1": [ "CVE-2020-14386" ] }, "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch ./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap { "gke-kernel": { "4.15.0-1027.28~16.04.1": { "snapcraft": [ "5501-1" ] } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap { "gke-kernel": { "4.15.0-1027.28~16.04.1": { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch ./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap { "gke-kernel": { "4.15.0-1027.28~16.04.1": { "snapcraft": [ "5501-1" ] } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch --with-cves ./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap { "gke-kernel": { "4.15.0-1027.28~16.04.1": { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: snap-check-notices --no-fetch ./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap { "linux-generic-bbb": { "4.4.0-140-1": { "linux-image-generic": [ "3848-1", "3879-1" ] } } } Running: snap-check-notices --no-fetch --with-cves ./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap { "linux-generic-bbb": { "4.4.0-140-1": { "linux-image-generic": { "3848-1": [ "CVE-2017-18174", "CVE-2018-12896", "CVE-2018-18690", "CVE-2018-18710" ], "3879-1": [ "CVE-2018-10883", "CVE-2018-16862", "CVE-2018-19407", "CVE-2018-19824", "CVE-2018-20169" ] } } } } Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch ./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap { "linux-generic-bbb": { "4.4.0-140-1": { "linux-image-generic": [ "3848-1", "3879-1" ], "snapcraft": [ "5501-1" ] } } } Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap { "linux-generic-bbb": { "4.4.0-140-1": { "linux-image-generic": { "3848-1": [ "CVE-2017-18174", "CVE-2018-12896", "CVE-2018-18690", "CVE-2018-18710" ], "3879-1": [ "CVE-2018-10883", "CVE-2018-16862", "CVE-2018-19407", "CVE-2018-19824", "CVE-2018-20169" ] }, "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch ./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap { "linux-generic-bbb": { "4.4.0-140-1": { "snapcraft": [ "5501-1" ] } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap { "linux-generic-bbb": { "4.4.0-140-1": { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch ./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap { "linux-generic-bbb": { "4.4.0-140-1": { "snapcraft": [ "5501-1" ] } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch --with-cves ./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap { "linux-generic-bbb": { "4.4.0-140-1": { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: snap-check-notices --no-fetch ./tests/pc-kernel_4.15.0-44.46_i386.snap { "pc-kernel": { "4.15.0-44.46": { "linux-image-generic": [ "3871-2", "4489-1" ] } } } Running: snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.15.0-44.46_i386.snap { "pc-kernel": { "4.15.0-44.46": { "linux-image-generic": { "3871-2": [ "https://launchpad.net/bugs/1813663", "https://launchpad.net/bugs/1813727" ], "4489-1": [ "CVE-2020-14386" ] } } } } Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch ./tests/pc-kernel_4.15.0-44.46_i386.snap { "pc-kernel": { "4.15.0-44.46": { "linux-image-generic": [ "3871-2", "4489-1" ], "snapcraft": [ "5501-1" ] } } } Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.15.0-44.46_i386.snap { "pc-kernel": { "4.15.0-44.46": { "linux-image-generic": { "3871-2": [ "https://launchpad.net/bugs/1813663", "https://launchpad.net/bugs/1813727" ], "4489-1": [ "CVE-2020-14386" ] }, "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch ./tests/pc-kernel_4.15.0-44.46_i386.snap { "pc-kernel": { "4.15.0-44.46": { "snapcraft": [ "5501-1" ] } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.15.0-44.46_i386.snap { "pc-kernel": { "4.15.0-44.46": { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch ./tests/pc-kernel_4.15.0-44.46_i386.snap { "pc-kernel": { "4.15.0-44.46": { "snapcraft": [ "5501-1" ] } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.15.0-44.46_i386.snap { "pc-kernel": { "4.15.0-44.46": { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: snap-check-notices --no-fetch ./tests/pc-kernel_4.4.0-141.167_amd64.snap { "pc-kernel": { "4.4.0-141.167": { "linux-image-generic": [ "3879-1" ] } } } Running: snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.4.0-141.167_amd64.snap { "pc-kernel": { "4.4.0-141.167": { "linux-image-generic": { "3879-1": [ "CVE-2018-10883", "CVE-2018-16862", "CVE-2018-19407", "CVE-2018-19824", "CVE-2018-20169" ] } } } } Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch ./tests/pc-kernel_4.4.0-141.167_amd64.snap { "pc-kernel": { "4.4.0-141.167": { "linux-image-generic": [ "3879-1" ], "snapcraft": [ "5501-1" ] } } } Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.4.0-141.167_amd64.snap { "pc-kernel": { "4.4.0-141.167": { "linux-image-generic": { "3879-1": [ "CVE-2018-10883", "CVE-2018-16862", "CVE-2018-19407", "CVE-2018-19824", "CVE-2018-20169" ] }, "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch ./tests/pc-kernel_4.4.0-141.167_amd64.snap { "pc-kernel": { "4.4.0-141.167": { "snapcraft": [ "5501-1" ] } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.4.0-141.167_amd64.snap { "pc-kernel": { "4.4.0-141.167": { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch ./tests/pc-kernel_4.4.0-141.167_amd64.snap { "pc-kernel": { "4.4.0-141.167": { "snapcraft": [ "5501-1" ] } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.4.0-141.167_amd64.snap { "pc-kernel": { "4.4.0-141.167": { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: snap-check-notices --no-fetch ./tests/gke-kernel_4.15.0-1069.72_amd64.snap { "gke-kernel": { "4.15.0-1069.72": {} } } Running: snap-check-notices --no-fetch --with-cves ./tests/gke-kernel_4.15.0-1069.72_amd64.snap { "gke-kernel": { "4.15.0-1069.72": {} } } Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch ./tests/gke-kernel_4.15.0-1069.72_amd64.snap { "gke-kernel": { "4.15.0-1069.72": { "snapcraft": [ "5501-1" ] } } } Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/gke-kernel_4.15.0-1069.72_amd64.snap { "gke-kernel": { "4.15.0-1069.72": { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch ./tests/gke-kernel_4.15.0-1069.72_amd64.snap { "gke-kernel": { "4.15.0-1069.72": { "snapcraft": [ "5501-1" ] } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/gke-kernel_4.15.0-1069.72_amd64.snap { "gke-kernel": { "4.15.0-1069.72": { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch ./tests/gke-kernel_4.15.0-1069.72_amd64.snap { "gke-kernel": { "4.15.0-1069.72": { "snapcraft": [ "5501-1" ] } } } Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch --with-cves ./tests/gke-kernel_4.15.0-1069.72_amd64.snap { "gke-kernel": { "4.15.0-1069.72": { "snapcraft": { "5501-1": [ "CVE-2020-9999" ] } } } } Running: snap-check-notices --no-fetch ./tests/test-check-notices_0.1_amd64.snap { "test-check-notices": { "0.1": {} } } Running: snap-check-notices --no-fetch --with-cves ./tests/test-check-notices_0.1_amd64.snap { "test-check-notices": { "0.1": {} } } Running: snap-check-notices --no-fetch ./tests/test-check-notices-needed_0.1_amd64.snap { "test-check-notices-needed": { "0.1": { "libreoffice-style-tango": [ "4102-1" ], "uno-libs3": [ "4102-1" ] } } } Running: snap-check-notices --no-fetch --with-cves ./tests/test-check-notices-needed_0.1_amd64.snap { "test-check-notices-needed": { "0.1": { "libreoffice-style-tango": { "4102-1": [ "CVE-2019-9850", "CVE-2019-9851", "CVE-2019-9852" ] }, "uno-libs3": { "4102-1": [ "CVE-2019-9850", "CVE-2019-9851", "CVE-2019-9852" ] } } } } Running: snap-check-notices --no-fetch ./tests/test-check-notices-primed-stage-packages_0.1_amd64.snap { "test-check-notices-primed-stage-packages": { "0.1": {} } } Running: snap-check-notices --no-fetch --with-cves ./tests/test-check-notices-primed-stage-packages_0.1_amd64.snap { "test-check-notices-primed-stage-packages": { "0.1": {} } } Running: snap-check-notices --no-fetch ./tests/test-check-notices-primed-stage-packages-needed_0.1_amd64.snap { "test-check-notices-primed-stage-packages-needed": { "0.1": { "libreoffice-style-tango": [ "4102-1" ], "uno-libs3": [ "4102-1" ] } } } Running: snap-check-notices --no-fetch --with-cves ./tests/test-check-notices-primed-stage-packages-needed_0.1_amd64.snap { "test-check-notices-primed-stage-packages-needed": { "0.1": { "libreoffice-style-tango": { "4102-1": [ "CVE-2019-9850", "CVE-2019-9851", "CVE-2019-9852" ] }, "uno-libs3": { "4102-1": [ "CVE-2019-9850", "CVE-2019-9851", "CVE-2019-9852" ] } } } } Running: snap-check-notices --no-fetch ./tests/test-check-notices-primed-stage-packages-needed_0.2_amd64.snap { "test-check-notices-primed-stage-packages-needed": { "0.2": { "uno-libs3": [ "4102-1" ] } } } Running: snap-check-notices --no-fetch --with-cves ./tests/test-check-notices-primed-stage-packages-needed_0.2_amd64.snap { "test-check-notices-primed-stage-packages-needed": { "0.2": { "uno-libs3": { "4102-1": [ "CVE-2019-9850", "CVE-2019-9851", "CVE-2019-9852" ] } } } } Running: snap-check-notices --no-fetch ./tests/test-check-notices-esm-apps_0.1_amd64.snap { "test-check-notices-esm-apps": { "0.1": { "libopenexr24": [ "5620-1" ] } } } Running: snap-check-notices --no-fetch --ignore-pockets=esm-apps ./tests/test-check-notices-esm-apps_0.1_amd64.snap { "test-check-notices-esm-apps": { "0.1": {} } } Running: ./bin/rock-updates-available --usn-db='./tests/test-usn-unittest-1.db' --store-db='./tests/test-rocks-store-unittest-1.db' From: Snap Store To: rocks@canonical.com, athos.ribeiro@canonical.com, carl.csaposs@canonical.com, dragomir.penev@canonical.com, jose.masson@canonical.com, leon.mintz@canonical.com, paulo.machado@canonical.com, sergio.durigan@canonical.com, simon.aronsson@canonical.com, ubuntu-docker-images@lists.launchpad.net Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: apache2 contains outdated Ubuntu packages A scan of this rock shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each rock revision: Revision r852f7702e973 (amd64; channels: edge, beta) * libxcursor1: 3501-1 Simply rebuilding the rock will pull in the new security updates and resolve this. If your rock also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your rock and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ Running: ./bin/rock-check-notices --no-fetch ./tests/test-rock-redis_5.0-20.04.tar { "test-rock-redis": { "5.0-20.04": { "libxcursor1": [ "3501-1" ] } } } Checking for differences in output... Done python3 -m coverage run -m unittest discover -s ./reviewtools/tests -p 'test_*' .......From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r13 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r14 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r15 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r16 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r17 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ From: Snap Store To: olivier.tilloy@canonical.com, testme@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r13 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r14 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r15 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r16 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r17 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad was built with outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected build packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * snapcraft: 5501-1 Revision r12 (i386; channels: stable, candidate, beta) * snapcraft: 5501-1 Revision r13 (amd64; channels: edge) * snapcraft: 5501-1 Revision r14 (i386; channels: edge) * snapcraft: 5501-1 Revision r15 (amd64; channels: edge) * snapcraft: 5501-1 Revision r16 (i386; channels: edge) * snapcraft: 5501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-5501-1/ From: Snap Store To: olivier.tilloy@canonical.com, testme@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r13 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r14 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r15 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r16 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r17 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains and was built with outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r13 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r14 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r15 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r16 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r17 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 In addition, the following lists new USNs for affected build packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * snapcraft: 5501-1 Revision r12 (i386; channels: stable, candidate, beta) * snapcraft: 5501-1 Revision r13 (amd64; channels: edge) * snapcraft: 5501-1 Revision r14 (i386; channels: edge) * snapcraft: 5501-1 Revision r15 (amd64; channels: edge) * snapcraft: 5501-1 Revision r16 (i386; channels: edge) * snapcraft: 5501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ * https://ubuntu.com/security/notices/USN-5501-1/ From: Snap Store To: olivier.tilloy@canonical.com, testme@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages ....................................WARN: Invalid Snapcraft version: '4.4.3' not a valid Debian version ..WARN: Invalid Snapcraft version: '2.3' not a valid Debian version ......A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r13 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r14 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r15 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r16 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r17 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ From: Snap Store To: rocks@canonical.com, athos.ribeiro@canonical.com, carl.csaposs@canonical.com, dragomir.penev@canonical.com, jose.masson@canonical.com, leon.mintz@canonical.com, paulo.machado@canonical.com, sergio.durigan@canonical.com, simon.aronsson@canonical.com, ubuntu-docker-images@lists.launchpad.net Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: apache2 contains outdated Ubuntu packages A scan of this rock shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each rock revision: Revision r852f7702e973 (amd64; channels: edge, beta) * libxcursor1: 3501-1 Revision r852f7702e974 (amd64; channels: edge, beta) * libxcursor1: 3501-1 Simply rebuilding the rock will pull in the new security updates and resolve this. If your rock also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your rock and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r13 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r14 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r15 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r16 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r17 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ From: Snap Store To: test.me@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: test-snap contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r1 (amd64; channels: stable, edge) * libopenexr24: 5620-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-5620-1/ From: Snap Store To: foo@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: linux-generic-bbb built from outdated Ubuntu kernel A scan of this snap shows that it was built using sources based on a kernel from the Ubuntu archive that has since received security updates. The following lists new USNs for the Ubuntu kernel that the snap is based on in each snap revision: Revision r12 (armhf; channels: stable, beta) * linux-image-generic: 3848-1, 3879-1 Updating the snap's git tree, adjusting the version in the snapcraft.yaml to match that of the Ubuntu kernel this snap is based on and rebuilding the snap should pull in the new security updates and resolve this. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3848-1/ * https://ubuntu.com/security/notices/USN-3879-1/ From: Snap Store To: foo@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: linux-generic-bbb was built with outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected build packages in each snap revision: Revision r12 (armhf; channels: stable, beta) * snapcraft: 5501-1 Updating the snap's git tree, adjusting the version in the snapcraft.yaml to match that of the Ubuntu kernel this snap is based on and rebuilding the snap should pull in the new security updates and resolve this. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-5501-1/ From: Snap Store To: foo@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: linux-generic-bbb built from outdated Ubuntu kernel and with outdated Ubuntu packages A scan of this snap shows that it was built using sources based on a kernel from the Ubuntu archive that has since received security updates. The following lists new USNs for the Ubuntu kernel that the snap is based on in each snap revision: Revision r12 (armhf; channels: stable, beta) * linux-image-generic: 3848-1, 3879-1 In addition, the following lists new USNs for affected build packages in each snap revision: Revision r12 (armhf; channels: stable, beta) * snapcraft: 5501-1 Updating the snap's git tree, adjusting the version in the snapcraft.yaml to match that of the Ubuntu kernel this snap is based on and rebuilding the snap should pull in the new security updates and resolve this. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3848-1/ * https://ubuntu.com/security/notices/USN-3879-1/ * https://ubuntu.com/security/notices/USN-5501-1/ From: Snap Store To: test.me@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: test-snap contains outdated Ubuntu packages .......WARN: 1ad: required field 'revisions' not found WARN: apache2: required field 'revisions' not found ............................A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r1 (amd64; channels: stable, edge) * libreoffice-style-tango: 4102-1 * uno-libs3: 4102-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-4102-1/ From: Snap Store To: test.me@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: test-snap contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r1 (amd64; channels: stable, edge) * libreoffice-style-tango: 4102-1 * uno-libs3: 4102-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-4102-1/ From: Snap Store To: test.me@example.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: test-snap contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r1 (amd64; channels: stable, edge) * libreoffice-style-tango: 4102-1 * uno-libs3: 4102-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-4102-1/ From: Snap Store To: olivier.tilloy@canonical.com Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: 0ad contains outdated Ubuntu packages A scan of this snap shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each snap revision: Revision r11 (amd64; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r12 (i386; channels: stable, candidate, beta) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r13 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r14 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r15 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r16 (i386; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Revision r17 (amd64; channels: edge) * libtiff5: 3602-1, 3606-1 * libxcursor1: 3501-1 Simply rebuilding the snap will pull in the new security updates and resolve this. If your snap also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your snap and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ * https://ubuntu.com/security/notices/USN-3602-1/ * https://ubuntu.com/security/notices/USN-3606-1/ From: Snap Store To: rocks@canonical.com, athos.ribeiro@canonical.com, carl.csaposs@canonical.com, dragomir.penev@canonical.com, jose.masson@canonical.com, leon.mintz@canonical.com, paulo.machado@canonical.com, sergio.durigan@canonical.com, simon.aronsson@canonical.com, ubuntu-docker-images@lists.launchpad.net Bcc: alex.murray@canonical.com, emilia.torino@canonical.com, evan.caville@canonical.com Subject: apache2 contains outdated Ubuntu packages A scan of this rock shows that it was built with packages from the Ubuntu archive that have since received security updates. The following lists new USNs for affected binary packages in each rock revision: Revision r852f7702e973 (amd64; channels: edge, beta) * libxcursor1: 3501-1 Revision r852f7702e974 (amd64; channels: edge, beta) * libxcursor1: 3501-1 Simply rebuilding the rock will pull in the new security updates and resolve this. If your rock also contains vendored code, now might be a good time to review it for any needed updates. Thank you for your rock and for attending to this matter. References: * https://ubuntu.com/security/notices/USN-3501-1/ = test output = == Mock filename == foo.origin_0.1_all.snap == Mock meta/snap.yaml == {'apps': {'bar': {'command': 'bin/bar'}}, 'architectures': ['all'], 'description': 'Test description', 'name': 'foo', 'summary': 'Test summary', 'version': '0.1'} { "runtime-errors": { "error": { "msg": { "manual_review": true, "text": "Unsupported package format (not tar)" } }, "info": {}, "warn": {} } } { "runtime-errors": { "error": { "msg": { "manual_review": true, "text": "Bad path /tmp/test-rock-tar-invalid while extracting archive at ./tests/test-rock-invalid-1.tar" } }, "info": {}, "warn": {} } } { "runtime-errors": { "error": { "msg": { "manual_review": true, "text": "Bad path .. while extracting archive at ./tests/test-rock-invalid-2.tar" } }, "info": {}, "warn": {} } } checking compare(1:0, 2:0) == -1 checking compare(2:0, 1:0) == 1 checking compare(1-1, 2-1) == -1 checking compare(2-1, 1-1) == 1 checking compare(1-1, 1-2) == -1 checking compare(1-2, 1-1) == 1 checking compare(0, 0) == 0 checking compare(0-00, 00-0) == 0 checking compare(1:2-3, 1:2-3) == 0 checking compare(0:0, 1:0) == -1 checking compare(1:0, 0:0) == 1 checking compare(a-0, b-0) == -1 checking compare(b-0, a-0) == 1 checking compare(0-a, 0-b) == -1 checking compare(0-b, 0-a) == 1 checking compare(0, 0:0) == 0 checking compare(0:0, 0:0) == 0 checking compare(0:0-, 0:0-) == 0 checking compare(0:0-0, 0:0-0) == 0 checking compare(0:0.0-0.0, 0:0.0-0.0) == 0 checking compare(0:0-0-0, 0:0-0-0) == 0 checking compare(0:0:0-0, 0:0:0-0) == 0 checking compare(0:0:0:0-0, 0:0:0:0-0) == 0 checking compare(0:0:0-0-0, 0:0:0-0-0) == 0 checking compare(0:0-0:0-0, 0:0-0:0-0) == 0 checking compare(0:09azAZ.-+~:, 0:09azAZ.-+~:) == 0 checking compare(0:0-azAZ09.+~, 0:0-azAZ09.+~) == 0 checking compare(1.2-3, 1.2-3build1) == -1 checking compare(1.2-3build1, 1.2-3) == 1 checking compare(1.2-3build1, 1.2-3build1) == 0 checking compare(1.2-3, 1.2-3+foo) == -1 checking compare(1.2-3+foo, 1.2-3) == 1 checking compare(1.2-3+foo, 1.2-3+foo) == 0 checking compare(1.2-3, 1.2-3~foo) == 1 checking compare(1.2-3~foo, 1.2-3) == -1 checking compare(1.2-3~foo, 1.2-3~foo) == 0 checking compare(1:9.10.3.dfsg.P4-8ubuntu1.6, 1:9.10.3.dfsg.P4-8ubuntu1.10) == -1 checking compare(1:9.10.3.dfsg.P4-8ubuntu1.10, 1:9.10.3.dfsg.P4-8ubuntu1.6) == 1 checking compare(1:9.10.3.dfsg.P4-8ubuntu1.10, 1:9.10.3.dfsg.P4-8ubuntu1.10) == 0 checking compare(1:0.30.0~git20131003.d20b8d+really20110821-0.2ubuntu12.2, 1:0.30.0~git20131003.d20b8d+really20110821-0.2ubuntu12.3) == -1 checking compare(1:0.30.0~git20131003.d20b8d+really20110821-0.2ubuntu12.3, 1:0.30.0~git20131003.d20b8d+really20110821-0.2ubuntu12.2) == 1 checking compare(1:0.30.0~git20131003.d20b8d+really20110821-0.2ubuntu12.2, 1:0.30.0~git20131003.d20b8d+really20110821-0.2ubuntu12.2) == 0 checking DebVersion('') checking DebVersion('0:') checking DebVersion('0:0 0-1') checking DebVersion('-1:0-1') ...E.........................................................................................................................................................................................................................................................................................................................................E..............................................................squash fstime for test_1.0_all.snap: 1715787889 unsquashfs -lln test_1.0_all.snap: Parallel unsquashfs: Using 4 processors 2 inodes (2 blocks) to write drwxrwxr-x 0/0 27 2024-05-15 15:44 squashfs-root drwxr-xr-x 0/0 48 2024-05-15 15:44 squashfs-root/meta -rw-r--r-- 0/0 2870 2024-05-15 15:44 squashfs-root/meta/icon.png -rw-r--r-- 0/0 99 2024-05-15 15:44 squashfs-root/meta/snap.yaml squash fstime for repack.snap: 1715787889 unsquashfs -lln repack.snap: Parallel unsquashfs: Using 4 processors 2 inodes (2 blocks) to write drwxrwxr-x 0/0 27 2024-05-15 15:44 squashfs-root drwxr-xr-x 0/0 48 2024-05-15 15:44 squashfs-root/meta -rw-r--r-- 0/0 2870 2024-05-15 15:44 squashfs-root/meta/icon.png -rw-r--r-- 0/0 99 2024-05-15 15:44 squashfs-root/meta/snap.yaml diff -au /root/snap/snapcraft/common/review-tools-57hkvi8h/test_1.0_all.snap.lln /root/snap/snapcraft/common/review-tools-57hkvi8h/repack.snap.lln: orig size: 4096 resq_size: 4096 ....squash fstime for test_1.0_all.snap: 1715787891 unsquashfs -lln test_1.0_all.snap: Parallel unsquashfs: Using 4 processors 2 inodes (2 blocks) to write drwxrwxr-x 0/0 27 2024-05-15 15:44 squashfs-root drwxr-xr-x 0/0 48 2024-05-15 15:44 squashfs-root/meta -rw-r--r-- 0/0 2870 2024-05-15 15:44 squashfs-root/meta/icon.png -rw-r--r-- 0/0 99 2024-05-15 15:44 squashfs-root/meta/snap.yaml squash fstime for repack.snap: 1715787891 unsquashfs -lln repack.snap: Parallel unsquashfs: Using 4 processors 2 inodes (2 blocks) to write drwxrwxr-x 0/0 27 2024-05-15 15:44 squashfs-root drwxr-xr-x 0/0 48 2024-05-15 15:44 squashfs-root/meta -rw-r--r-- 0/0 2870 2024-05-15 15:44 squashfs-root/meta/icon.png -rw-r--r-- 0/0 99 2024-05-15 15:44 squashfs-root/meta/snap.yaml diff -au /root/snap/snapcraft/common/review-tools-oble2tdz/test_1.0_all.snap.lln /root/snap/snapcraft/common/review-tools-oble2tdz/repack.snap.lln: orig size: 4096 resq_size: 4096 .............................................WARN: 'libtiff5:111' not properly formatted. Skipping WARN: 'libtiff5:111' not properly formatted. Skipping WARN: 'libtiff5:111' not properly formatted. Skipping WARN: 'libtiff5:111' not properly formatted. Skipping WARN: 'libtiff5:111' not properly formatted. Skipping WARN: 'libtiff5:111' not properly formatted. Skipping .....WARN: 'libxcursor1=999:1.1.14-1' not properly formatted. Skipping ......WARN: 'foo' not properly formatted. Skipping .WARN: 'foo' not properly formatted. Skipping .WARN: 'foo' not properly formatted. Skipping ....WARN: 'foo' not properly formatted. Skipping ......WARN: 'foo' not properly formatted. Skipping ....................WARN: 'core18' not properly formatted. Skipping .....................WARN: Invalid Snapcraft version: '''4.2''' not a valid Debian version WARN: Invalid Snapcraft version: $(awk '/^version:/{print }' /snap/snapcraft/current/meta/snap.yaml) not a valid Debian version ......WARN: Invalid Snapcraft version: '''4.2''' not a valid Debian version WARN: Invalid Snapcraft version: $(awk '/^version:/{print }' /snap/snapcraft/current/meta/snap.yaml not a valid Debian version . checking DebVersion('999999999999999999999999:0-1') checking DebVersion('a:0-0') checking DebVersion('A:0-0') checking DebVersion('0:0!-0') checking DebVersion('0:0#-0') checking DebVersion('0:0@-0') checking DebVersion('0:0$-0') checking DebVersion('0:0%-0') checking DebVersion('0:0&-0') checking DebVersion('0:0/-0') checking DebVersion('0:0|-0') checking DebVersion('0:0\-0') checking DebVersion('0:0<-0') checking DebVersion('0:0>-0') checking DebVersion('0:0(-0') checking DebVersion('0:0)-0') checking DebVersion('0:0[-0') checking DebVersion('0:0]-0') checking DebVersion('0:0{-0') checking DebVersion('0:0}-0') checking DebVersion('0:0;-0') checking DebVersion('0:0,-0') checking DebVersion('0:0_-0') checking DebVersion('0:0=-0') checking DebVersion('0:0*-0') checking DebVersion('0:0^-0') checking DebVersion('0:0'-0') checking DebVersion('0:0"-0') checking DebVersion('0:0-!') checking DebVersion('0:0-#') checking DebVersion('0:0-@') checking DebVersion('0:0-$') checking DebVersion('0:0-%') checking DebVersion('0:0-&') checking DebVersion('0:0-/') checking DebVersion('0:0-|') checking DebVersion('0:0-\') checking DebVersion('0:0-<') checking DebVersion('0:0->') checking DebVersion('0:0-(') checking DebVersion('0:0-)') checking DebVersion('0:0-[') checking DebVersion('0:0-]') checking DebVersion('0:0-{') checking DebVersion('0:0-}') checking DebVersion('0:0-;') checking DebVersion('0:0-,') checking DebVersion('0:0-_') checking DebVersion('0:0-=') checking DebVersion('0:0-*') checking DebVersion('0:0-^') checking DebVersion('0:0-'') checking DebVersion('0:0-"') checking DebVersion('1-2-') None SKIPPING: execstack failed (LP: #1850861) SKIPPING: execstack failed (LP: #1850861) SKIPPING: execstack failed (LP: #1850861) SKIPPING: execstack failed (LP: #1850861) SKIPPING: execstack failed (LP: #1850861) SKIPPING: execstack failed (LP: #1850861) {'revisions': {'12': {'channels': ['stable', 'candidate', 'beta'], 'architectures': ['i386'], 'secnot-report': {'staged': {'libxcursor1': ['3501-1'], 'libtiff5': ['3602-1', '3606-1']}}}, '11': {'channels': ['stable', 'candidate', 'beta'], 'architectures': ['amd64'], 'secnot-report': {'staged': {'libxcursor1': ['3501-1'], 'libtiff5': ['3602-1', '3606-1']}}}, '13': {'channels': ['edge'], 'architectures': ['amd64'], 'secnot-report': {'staged': {'libxcursor1': ['3501-1'], 'libtiff5': ['3602-1', '3606-1']}}}, '14': {'channels': ['edge'], 'architectures': ['i386'], 'secnot-report': {'staged': {'libxcursor1': ['3501-1'], 'libtiff5': ['3602-1', '3606-1']}}}, '15': {'channels': ['edge'], 'architectures': ['amd64'], 'secnot-report': {'staged': {'libxcursor1': ['3501-1'], 'libtiff5': ['3602-1', '3606-1']}}}, '16': {'channels': ['edge'], 'architectures': ['i386'], 'secnot-report': {'staged': {'libxcursor1': ['3501-1'], 'libtiff5': ['3602-1', '3606-1']}}}, '17': {'channels': ['edge'], 'architectures': ['amd64'], 'secnot-report': {'staged': {'libxcursor1': ['3501-1'], 'libtiff5': ['3602-1', '3606-1']}}}, '18': {'channels': ['stable', 'candidate', 'beta'], 'architectures': ['i386'], 'secnot-report': {}}}, 'name': '0ad', 'publisher': 'olivier.tilloy@canonical.com', 'collaborators': [], 'snap_type': 'app', 'uploaders': [], 'additional': []} {'revisions': {'852f7702e973': {'channels': ['edge', 'beta'], 'architectures': ['amd64'], 'secnot-report': {'staged': {'libxcursor1': ['3501-1']}}}, '852f7702e975': {'channels': ['edge', 'beta'], 'architectures': ['amd64'], 'secnot-report': {}}}, 'name': 'apache2', 'publisher': 'rocks@canonical.com', 'collaborators': [], 'rock_type': 'oci', 'uploaders': [], 'additional': ['athos.ribeiro@canonical.com', 'carl.csaposs@canonical.com', 'dragomir.penev@canonical.com', 'jose.masson@canonical.com', 'leon.mintz@canonical.com', 'paulo.machado@canonical.com', 'sergio.durigan@canonical.com', 'simon.aronsson@canonical.com', 'ubuntu-docker-images@lists.launchpad.net']} {'xenial': {'libtiff-doc': {'3606-1': {'version': 4.0.6-1ubuntu0.4, 'pocket': 'security', 'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784']}, '3602-1': {'version': 4.0.6-1ubuntu0.3, 'pocket': 'security', 'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784']}}, 'libtiffxx5': {'3606-1': {'version': 4.0.6-1ubuntu0.4, 'pocket': 'security', 'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784']}, '3602-1': {'version': 4.0.6-1ubuntu0.3, 'pocket': 'security', 'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784']}}, 'libtiff5': {'3606-1': {'version': 4.0.6-1ubuntu0.4, 'pocket': 'security', 'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784']}, '3602-1': {'version': 4.0.6-1ubuntu0.3, 'pocket': 'security', 'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784']}}, 'libtiff5-dev': {'3606-1': {'version': 4.0.6-1ubuntu0.4, 'pocket': 'security', 'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784']}, '3602-1': {'version': 4.0.6-1ubuntu0.3, 'pocket': 'security', 'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784']}}, 'libtiff-opengl': {'3606-1': {'version': 4.0.6-1ubuntu0.4, 'pocket': 'security', 'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784']}, '3602-1': {'version': 4.0.6-1ubuntu0.3, 'pocket': 'security', 'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784']}}, 'libtiff-tools': {'3606-1': {'version': 4.0.6-1ubuntu0.4, 'pocket': 'security', 'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784']}, '3602-1': {'version': 4.0.6-1ubuntu0.3, 'pocket': 'security', 'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784']}}, 'libxcursor1-dbg': {'3501-1': {'version': 1:1.1.14-1ubuntu0.16.04.1, 'pocket': 'security', 'cves': ['CVE-2017-16612']}}, 'libxcursor-dev': {'3501-1': {'version': 1:1.1.14-1ubuntu0.16.04.1, 'pocket': 'security', 'cves': ['CVE-2017-16612']}}, 'libxcursor1-udeb': {'3501-1': {'version': 1:1.1.14-1ubuntu0.16.04.1, 'pocket': 'security', 'cves': ['CVE-2017-16612']}}, 'libxcursor1': {'3501-1': {'version': 1:1.1.14-1ubuntu0.16.04.1, 'pocket': 'security', 'cves': ['CVE-2017-16612']}}}, 'focal': {'libxcursor1-dbg': {'3501-1': {'version': 1:1.1.14-1ubuntu0.16.04.1, 'pocket': 'security', 'cves': ['CVE-2017-16612']}}, 'libxcursor-dev': {'3501-1': {'version': 1:1.1.14-1ubuntu0.16.04.1, 'pocket': 'security', 'cves': ['CVE-2017-16612']}}, 'libxcursor1-udeb': {'3501-1': {'version': 1:1.1.14-1ubuntu0.16.04.1, 'pocket': 'security', 'cves': ['CVE-2017-16612']}}, 'libxcursor1': {'3501-1': {'version': 1:1.1.14-1ubuntu0.16.04.1, 'pocket': 'security', 'cves': ['CVE-2017-16612']}}}} {'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784'], 'version': '4.0.6-1ubuntu0.3'} {'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784'], 'pocket': 'security', 'version': 4.0.6-1ubuntu0.3} {'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784'], 'version': '4.0.6-1ubuntu0.4'} {'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784'], 'pocket': 'security', 'version': 4.0.6-1ubuntu0.4} {'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784'], 'version': '4.0.6-1ubuntu0.3'} {'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784'], 'pocket': 'security', 'version': 4.0.6-1ubuntu0.3} {'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784'], 'version': '4.0.6-1ubuntu0.4'} {'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784'], 'pocket': 'security', 'version': 4.0.6-1ubuntu0.4} {'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784'], 'version': '4.0.6-1ubuntu0.3'} {'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784'], 'pocket': 'security', 'version': 4.0.6-1ubuntu0.3} {'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784'], 'version': '4.0.6-1ubuntu0.4'} {'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784'], 'pocket': 'security', 'version': 4.0.6-1ubuntu0.4} {'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784'], 'version': '4.0.6-1ubuntu0.3'} {'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784'], 'pocket': 'security', 'version': 4.0.6-1ubuntu0.3} {'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784'], 'version': '4.0.6-1ubuntu0.4'} {'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784'], 'pocket': 'security', 'version': 4.0.6-1ubuntu0.4} {'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784'], 'version': '4.0.6-1ubuntu0.3'} {'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592'........, 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784'], 'pocket': 'security', 'version': 4.0.6-1ubuntu0.3} {'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784'], 'version': '4.0.6-1ubuntu0.4'} {'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784'], 'pocket': 'security', 'version': 4.0.6-1ubuntu0.4} {'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784'], 'version': '4.0.6-1ubuntu0.3'} {'cves': ['CVE-2016-10266', 'CVE-2016-10267', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10371', 'CVE-2017-10688', 'CVE-2017-11335', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-13727', 'CVE-2017-18013', 'CVE-2017-7592', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7595', 'CVE-2017-7596', 'CVE-2017-7597', 'CVE-2017-7598', 'CVE-2017-7599', 'CVE-2017-7600', 'CVE-2017-7601', 'CVE-2017-7602', 'CVE-2017-9403', 'CVE-2017-9404', 'CVE-2017-9815', 'CVE-2017-9936', 'CVE-2018-5784'], 'pocket': 'security', 'version': 4.0.6-1ubuntu0.3} {'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784'], 'version': '4.0.6-1ubuntu0.4'} {'cves': ['CVE-2016-3186', 'CVE-2016-5102', 'CVE-2016-5318', 'CVE-2017-11613', 'CVE-2017-12944', 'CVE-2017-17095', 'CVE-2017-18013', 'CVE-2017-5563', 'CVE-2017-9117', 'CVE-2017-9147', 'CVE-2017-9935', 'CVE-2018-5784'], 'pocket': 'security', 'version': 4.0.6-1ubuntu0.4} {'cves': ['CVE-2017-16612'], 'version': '1:1.1.14-1ubuntu0.16.04.1'} {'cves': ['CVE-2017-16612'], 'pocket': 'security', 'version': 1:1.1.14-1ubuntu0.16.04.1} {'cves': ['CVE-2017-16612'], 'version': '1:1.1.14-1ubuntu0.16.04.1'} {'cves': ['CVE-2017-16612'], 'pocket': 'security', 'version': 1:1.1.14-1ubuntu0.16.04.1} {'cves': ['CVE-2017-16612'], 'version': '1:1.1.14-1ubuntu0.16.04.1'} {'cves': ['CVE-2017-16612'], 'pocket': 'security', 'version': 1:1.1.14-1ubuntu0.16.04.1} {'cves': ['CVE-2017-16612'], 'version': '1:1.1.14-1ubuntu0.16.04.1'} {'cves': ['CVE-2017-16612'], 'pocket': 'security', 'version': 1:1.1.14-1ubuntu0.16.04.1} {'cves': ['CVE-2017-16612'], 'version': '1:1.1.14-1ubuntu0.16.04.1'} {'cves': ['CVE-2017-16612'], 'pocket': 'security', 'version': 1:1.1.14-1ubuntu0.16.04.1} {'cves': ['CVE-2017-16612'], 'version': '1:1.1.14-1ubuntu0.16.04.1'} {'cves': ['CVE-2017-16612'], 'pocket': 'security', 'version': 1:1.1.14-1ubuntu0.16.04.1} {'cves': ['CVE-2017-16612'], 'version': '1:1.1.14-1ubuntu0.16.04.1'} {'cves': ['CVE-2017-16612'], 'pocket': 'security', 'version': 1:1.1.14-1ubuntu0.16.04.1} {'cves': ['CVE-2017-16612'], 'version': '1:1.1.14-1ubuntu0.16.04.1'} {'cves': ['CVE-2017-16612'], 'pocket': 'security', 'version': 1:1.1.14-1ubuntu0.16.04.1} {'focal': {'libopenexr-dev': {'5620-1': {'version': 2.3.0-6ubuntu0.5+esm1, 'pocket': 'esm-apps', 'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941']}}, 'openexr': {'5620-1': {'version': 2.3.0-6ubuntu0.5+esm1, 'pocket': 'esm-apps', 'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941']}}, 'libopenexr24': {'5620-1': {'version': 2.3.0-6ubuntu0.5+esm1, 'pocket': 'esm-apps', 'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941']}}, 'openexr-doc': {'5620-1': {'version': 2.3.0-6ubuntu0.5+esm1, 'pocket': 'esm-apps', 'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941']}}}, 'jammy': {'libopenexr-dev': {'5620-1': {'version': 2.5.7-1ubuntu0.1~esm1, 'pocket': 'esm-apps', 'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941']}}, 'openexr': {'5620-1': {'version': 2.5.7-1ubuntu0.1~esm1, 'pocket': 'esm-apps', 'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941']}}, 'libopenexr25': {'5620-1': {'version': 2.5.7-1ubuntu0.1~esm1, 'pocket': 'esm-apps', 'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941']}}, 'openexr-doc': {'5620-1': {'version': 2.5.7-1ubuntu0.1~esm1, 'pocket': 'esm-apps', 'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941']}}}} {'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941'], 'pocket': 'esm-apps', 'version': '2.3.0-6ubuntu0.5+esm1'} {'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941'], 'pocket': 'esm-apps', 'version': 2.3.0-6ubuntu0.5+esm1} {'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941'], 'pocket': 'esm-apps', 'version': '2.3.0-6ubuntu0.5+esm1'} {'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941'], 'pocket': 'esm-apps', 'version': 2.3.0-6ubuntu0.5+esm1} {'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941'], 'pocket': 'esm-apps', 'version': '2.3.0-6ubuntu0.5+esm1'} {'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941'], 'pocket': 'esm-apps', 'version': 2.3.0-6ubuntu0.5+esm1} {'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', ...... ====================================================================== ERROR: test_num_avail_review_classes (test_modules.TestModules) Verify have all the review classes ---------------------------------------------------------------------- Traceback (most recent call last): File "/build/review-tools/parts/review-tools/build/reviewtools/tests/test_modules.py", line 29, in test_num_avail_review_classes review = modules.find_main_class(module_name) File "/build/review-tools/parts/review-tools/build/reviewtools/modules.py", line 64, in find_main_class spec.loader.exec_module(module) File "", line 848, in exec_module File "", line 219, in _call_with_frames_removed File "/build/review-tools/parts/review-tools/build/reviewtools/sr_lint.py", line 34, in import jsonschema ModuleNotFoundError: No module named 'jsonschema' ====================================================================== ERROR: test_sr_lint (unittest.loader._FailedTest) ---------------------------------------------------------------------- ImportError: Failed to import test module: test_sr_lint Traceback (most recent call last): File "/usr/lib/python3.8/unittest/loader.py", line 436, in _find_test_path module = self._get_module_from_name(name) File "/usr/lib/python3.8/unittest/loader.py", line 377, in _get_module_from_name __import__(name) File "/build/review-tools/parts/review-tools/build/reviewtools/tests/test_sr_lint.py", line 25, in from reviewtools.sr_lint import SnapReviewLint File "/build/review-tools/parts/review-tools/build/reviewtools/sr_lint.py", line 34, in import jsonschema ModuleNotFoundError: No module named 'jsonschema' ---------------------------------------------------------------------- Ran 616 tests in 589.824s FAILED (errors=2) 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941'], 'pocket': 'esm-apps', 'version': '2.3.0-6ubuntu0.5+esm1'} {'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941'], 'pocket': 'esm-apps', 'version': 2.3.0-6ubuntu0.5+esm1} {'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941'], 'pocket': 'esm-apps', 'version': '2.5.7-1ubuntu0.1~esm1'} {'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941'], 'pocket': 'esm-apps', 'version': 2.5.7-1ubuntu0.1~esm1} {'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941'], 'pocket': 'esm-apps', 'version': '2.5.7-1ubuntu0.1~esm1'} {'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941'], 'pocket': 'esm-apps', 'version': 2.5.7-1ubuntu0.1~esm1} {'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941'], 'pocket': 'esm-apps', 'version': '2.5.7-1ubuntu0.1~esm1'} {'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941'], 'pocket': 'esm-apps', 'version': 2.5.7-1ubuntu0.1~esm1} {'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941'], 'pocket': 'esm-apps', 'version': '2.5.7-1ubuntu0.1~esm1'} {'cves': ['CVE-2021-20296', 'CVE-2021-23215', 'CVE-2021-26260', 'CVE-2021-3598', 'CVE-2021-3605', 'CVE-2021-3933', 'CVE-2021-3941'], 'pocket': 'esm-apps', 'version': 2.5.7-1ubuntu0.1~esm1} {'xenial': {'uno-libs3': {'4102-1': {'version': 5.1.6~rc2-0ubuntu1~xenial9, 'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852']}}, 'libreoffice-style-tango': {'4102-1': {'version': 1:5.1.6~rc2-0ubuntu1~xenial9, 'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852']}}}, 'bionic': {'uno-libs3': {'4102-1': {'version': 6.0.7-0ubuntu0.18.04.9, 'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852']}}, 'libreoffice-style-tango': {'4102-1': {'version': 1:6.0.7-0ubuntu0.18.04.9, 'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852']}}}} {'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852'], 'version': '5.1.6~rc2-0ubuntu1~xenial9'} {'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852'], 'version': 5.1.6~rc2-0ubuntu1~xenial9} {'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852'], 'version': '1:5.1.6~rc2-0ubuntu1~xenial9'} {'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852'], 'version': 1:5.1.6~rc2-0ubuntu1~xenial9} {'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852'], 'version': '6.0.7-0ubuntu0.18.04.9'} {'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852'], 'version': 6.0.7-0ubuntu0.18.04.9} {'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852'], 'version': '1:6.0.7-0ubuntu0.18.04.9'} {'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852'], 'version': 1:6.0.7-0ubuntu0.18.04.9} {'xenial': {'uno-libs3': {'4102-1': {'version': 5.1.6~rc2-0ubuntu1~xenial9, 'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852']}}, 'libreoffice-style-tango': {'4102-1': {'version': 1:5.1.6~rc2-0ubuntu1~xenial9, 'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852']}}}, 'bionic': {'uno-libs3': {'4102-1': {'version': 6.0.7-0ubuntu0.18.04.9, 'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852']}}, 'libreoffice-style-tango': {'4102-1': {'version': 1:6.0.7-0ubuntu0.18.04.9, 'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852']}}}} {'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852'], 'version': '5.1.6~rc2-0ubuntu1~xenial9'} {'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852'], 'version': 5.1.6~rc2-0ubuntu1~xenial9} {'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852'], 'version': '1:5.1.6~rc2-0ubuntu1~xenial9'} {'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852'], 'version': 1:5.1.6~rc2-0ubuntu1~xenial9} {'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852'], 'version': '6.0.7-0ubuntu0.18.04.9'} {'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852'], 'version': 6.0.7-0ubuntu0.18.04.9} {'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852'], 'version': '1:6.0.7-0ubuntu0.18.04.9'} {'cves': ['CVE-2019-9850', 'CVE-2019-9851', 'CVE-2019-9852'], 'version': 1:6.0.7-0ubuntu0.18.04.9} {'xenial': {'bsdutils': {'999999-1': {'version': 1:2.27.1-6ubuntu3, 'cves': ['CVE-2019-999999']}}}} {'cves': ['CVE-2019-999999'], 'version': '1:2.27.1-6ubuntu3'} {'cves': ['CVE-2019-999999'], 'version': 1:2.27.1-6ubuntu3} {'xenial': {}} {'xenial': {}} make: *** [Makefile:82: coverage] Error 1 Failed to run 'override-build': Exit code was 2. Build failed Traceback (most recent call last): File "/usr/lib/python3/dist-packages/lpbuildd/target/build_snap.py", line 308, in run self.build() File "/usr/lib/python3/dist-packages/lpbuildd/target/build_snap.py", line 292, in build self.run_build_command(["snapcraft"], cwd=output_path, env=env) File "/usr/lib/python3/dist-packages/lpbuildd/target/operation.py", line 62, in run_build_command return self.backend.run(args, cwd=cwd, env=full_env, **kwargs) File "/usr/lib/python3/dist-packages/lpbuildd/target/lxd.py", line 718, in run subprocess.check_call(cmd, **kwargs) File "/usr/lib/python3.8/subprocess.py", line 364, in check_call raise CalledProcessError(retcode, cmd) subprocess.CalledProcessError: Command '['lxc', 'exec', 'lp-focal-amd64', '--env', 'LANG=C.UTF-8', '--env', 'SHELL=/bin/sh', '--env', 'http_proxy=http://10.10.10.1:8222/', '--env', 'https_proxy=http://10.10.10.1:8222/', '--env', 'GIT_PROXY_COMMAND=/usr/local/bin/lpbuildd-git-proxy', '--env', 'SNAPPY_STORE_NO_CDN=1', '--env', 'SNAPCRAFT_BUILD_INFO=1', '--env', 'SNAPCRAFT_IMAGE_INFO={"build-request-id": "lp-89029789", "build-request-timestamp": "2024-05-15T15:30:10Z", "build_url": "https://launchpad.net/~myapps-reviewers/+snap/review-tools/+build/2484118"}', '--env', 'SNAPCRAFT_BUILD_ENVIRONMENT=host', '--env', 'SNAPCRAFT_BUILD_FOR=amd64', '--', '/bin/sh', '-c', 'cd /build/review-tools && linux64 snapcraft']' returned non-zero exit status 2. Revoking proxy token... RUN: /usr/share/launchpad-buildd/bin/in-target scan-for-processes --backend=lxd --series=focal --arch=amd64 SNAPBUILD-2484118 Scanning for processes to kill in build SNAPBUILD-2484118