also run ci action to build demos on main branch #275
Merged
Garnix CI / check vm_grocy_https [x86_64-linux]
succeeded
Aug 15, 2024 in 8s
Run results
Build succeeded
Details
Last 100 lines of logs:
�[2mserver # [ 10.508843] dhcpcd[667]: eth0: adding default route via fe80::2�[0m
�[2mserver # [ 10.629810] shb-certs-cert-selfsigned-n-start[915]: Generating a signed certificate...�[0m
�[2mserver # [ 10.631243] shb-certs-cert-selfsigned-n-start[915]: X.509 Certificate Information:�[0m
�[2mserver # [ 10.631938] shb-certs-cert-selfsigned-n-start[915]: Version: 3�[0m
�[2mserver # [ 10.633202] shb-certs-cert-selfsigned-n-start[915]: Serial Number (hex): 0b450136303c3565fb52f9538af5ce6d8f83bc6d�[0m
�[2mserver # [ 10.634112] shb-certs-cert-selfsigned-n-start[915]: Validity:�[0m
�[2mserver # [ 10.634690] shb-certs-cert-selfsigned-n-start[915]: Not Before: Thu Aug 15 00:41:02 UTC 2024�[0m
�[2mserver # [ 10.635516] shb-certs-cert-selfsigned-n-start[915]: Not After: Sat Sep 14 00:41:02 UTC 2024�[0m
�[2mserver # [ 10.636325] shb-certs-cert-selfsigned-n-start[915]: Subject: CN=*.example.com,O=An example company�[0m
�[2mserver # [ 10.637139] shb-certs-cert-selfsigned-n-start[915]: Subject Public Key Algorithm: RSA�[0m
�[2mserver # [ 10.639040] shb-certs-cert-selfsigned-n-start[915]: Algorithm Security Level: High (3072 bits)�[0m
�[2mserver # [ 10.639818] shb-certs-cert-selfsigned-n-start[915]: Modulus (bits 3072):�[0m
�[2mserver # [ 10.641306] shb-certs-cert-selfsigned-n-start[915]: 00:d3:ff:e2:f2:d8:35:cc:99:ba:c0:dd:3b:2d:89:07�[0m
�[2mserver # [ 10.642202] shb-certs-cert-selfsigned-n-start[915]: 5e:94:97:8a:0e:de:d5:e2:19:ca:aa:33:69:56:a2:b2�[0m
�[2mserver # [ 10.643110] shb-certs-cert-selfsigned-n-start[915]: c7:a1:74:f3:1e:7f:b9:a1:ab:f0:bb:ed:8c:6c:97:d8�[0m
�[2mserver # [ 10.643988] shb-certs-cert-selfsigned-n-start[915]: a2:58:89:a8:7b:48:a3:2a:56:4b:53:98:e3:88:65:b4�[0m
�[2mserver # [ 10.644872] shb-certs-cert-selfsigned-n-start[915]: 2b:e9:4a:1f:03:e7:8c:99:bf:65:69:57:5a:b8:7c:84�[0m
�[2mserver # [ 10.645758] shb-certs-cert-selfsigned-n-start[915]: b6:1b:0f:f3:6a:03:aa:c2:6f:f1:41:7a:b0:c0:58:32�[0m
�[2mserver # [ 10.646649] shb-certs-cert-selfsigned-n-start[915]: 45:7b:67:31:bd:d6:24:01:02:9e:22:d3:22:29:de:51�[0m
�[2mserver # [ 10.648511] shb-certs-cert-selfsigned-n-start[915]: e3:6e:6c:51:92:df:65:15:23:b3:a9:e3:7f:f9:24:89�[0m
�[2mserver # [ 10.649406] shb-certs-cert-selfsigned-n-start[915]: 71:3a:99:76:5a:13:58:b0:1d:20:e2:a1:c5:36:f7:9c�[0m
�[2mserver # [ 10.650288] shb-certs-cert-selfsigned-n-start[915]: 29:39:2b:07:7b:12:34:69:54:f7:a9:a5:af:21:78:86�[0m
�[2mserver # [ 10.651173] shb-certs-cert-selfsigned-n-start[915]: e6:8c:67:ed:e4:68:2b:b1:20:07:f8:94:f8:83:12:39�[0m
�[2mserver # [ 10.652062] shb-certs-cert-selfsigned-n-start[915]: ed:24:73:16:9d:96:1c:20:a3:57:16:50:47:a1:1b:81�[0m
�[2mserver # [ 10.652926] shb-certs-cert-selfsigned-n-start[915]: 2b:cd:88:a6:91:30:99:93:e4:30:1b:2e:e1:a1:bb:7d�[0m
�[2mserver # [ 10.653809] shb-certs-cert-selfsigned-n-start[915]: 52:fa:92:25:fb:46:2f:fd:3a:49:41:ba:7e:04:15:00�[0m
�[2mserver # [ 10.654699] shb-certs-cert-selfsigned-n-start[915]: 7d:ed:4b:99:a2:56:7b:d6:fd:e0:36:4c:a3:f6:eb:b6�[0m
�[2mserver # [ 10.655585] shb-certs-cert-selfsigned-n-start[915]: e2:ac:03:f9:9f:32:fa:79:23:1d:2e:db:2d:d2:ed:d1�[0m
�[2mserver # [ 10.657470] shb-certs-cert-selfsigned-n-start[915]: 79:f7:9e:18:a1:b0:29:c6:72:67:f4:a4:13:e2:bd:1d�[0m
�[2mserver # [ 10.658357] shb-certs-cert-selfsigned-n-start[915]: 56:f7:10:b0:47:b0:66:66:0d:f8:72:41:f5:99:7a:b3�[0m
�[2mserver # [ 10.659269] shb-certs-cert-selfsigned-n-start[915]: ad:89:7f:fd:4f:97:09:72:a0:08:ce:14:08:d6:60:25�[0m
�[2mserver # [ 10.660161] shb-certs-cert-selfsigned-n-start[915]: 59:c4:98:d2:52:ce:da:7e:c7:91:ef:18:5a:18:44:f7�[0m
�[2mserver # [ 10.661056] shb-certs-cert-selfsigned-n-start[915]: e1:98:48:b0:5c:84:40:0e:34:54:01:e6:97:d6:39:c8�[0m
�[2mserver # [ 10.661928] shb-certs-cert-selfsigned-n-start[915]: 60:00:cf:31:b2:91:0a:d1:aa:a6:bd:06:b8:56:fe:b9�[0m
�[2mserver # [ 10.662817] shb-certs-cert-selfsigned-n-start[915]: f0:e5:a2:91:db:b3:3d:d4:49:dc:ec:f1:a6:34:98:08�[0m
�[2mserver # [ 10.663702] shb-certs-cert-selfsigned-n-start[915]: 48:19:34:93:c7:aa:92:c4:6b:a8:9f:38:66:f7:cc:ef�[0m
�[2mserver # [ 10.664590] shb-certs-cert-selfsigned-n-start[915]: d7�[0m
�[2mserver # [ 10.665196] shb-certs-cert-selfsigned-n-start[915]: Exponent (bits 24):�[0m
�[2mserver # [ 10.665855] shb-certs-cert-selfsigned-n-start[915]: 01:00:01�[0m
�[2mserver # [ 10.667260] shb-certs-cert-selfsigned-n-start[915]: Extensions:�[0m
�[2mserver # [ 10.667843] shb-certs-cert-selfsigned-n-start[915]: Basic Constraints (critical):�[0m
�[2mserver # [ 10.668593] shb-certs-cert-selfsigned-n-start[915]: Certificate Authority (CA): FALSE�[0m
�[2mserver # [ 10.669405] shb-certs-cert-selfsigned-n-start[915]: Subject Alternative Name (not critical):�[0m
�[2mserver # [ 10.670210] shb-certs-cert-selfsigned-n-start[915]: DNSname: *.example.com�[0m
�[2mserver # [ 10.670928] shb-certs-cert-selfsigned-n-start[915]: Key Usage (critical):�[0m
�[2mserver # [ 10.672275] shb-certs-cert-selfsigned-n-start[915]: Digital signature.�[0m
�[2mserver # [ 10.672994] shb-certs-cert-selfsigned-n-start[915]: Key encipherment.�[0m
�[2mserver # [ 10.673727] shb-certs-cert-selfsigned-n-start[915]: Subject Key Identifier (not critical):�[0m
�[2mserver # [ 10.674534] shb-certs-cert-selfsigned-n-start[915]: 561fde641fcd66dae54bae6a936faebd2bf35287�[0m
�[2mserver # [ 10.675390] shb-certs-cert-selfsigned-n-start[915]: Authority Key Identifier (not critical):�[0m
�[2mserver # [ 10.676315] shb-certs-cert-selfsigned-n-start[915]: 7d0c8731cec3582d321c9283f1d3be19af588288�[0m
�[2mserver # [ 10.677360] shb-certs-cert-selfsigned-n-start[915]: Other Information:�[0m
�[2mserver # [ 10.678069] shb-certs-cert-selfsigned-n-start[915]: Public Key ID:�[0m
�[2mserver # [ 10.678755] shb-certs-cert-selfsigned-n-start[915]: sha1:561fde641fcd66dae54bae6a936faebd2bf35287�[0m
�[2mserver # [ 10.679874] shb-certs-cert-selfsigned-n-start[915]: sha256:ed603d3fcd4f49c087afb3f2930e1817e818669d3d3af537f5cff3f9de7bd6f9�[0m
�[2mserver # [ 10.680892] shb-certs-cert-selfsigned-n-start[915]: Public Key PIN:�[0m
�[2mserver # [ 10.681683] shb-certs-cert-selfsigned-n-start[915]: pin-sha256:7WA9P81PScCHr7Pykw4YF+gYZp09OvU39c/z+d571vk=�[0m
�[2mserver # [ 10.682908] shb-certs-cert-selfsigned-n-start[915]: Signing certificate...�[0m
�[2mserver # [ 10.691478] systemd[1]: shb-certs-cert-selfsigned-n.service: Deactivated successfully.�[0m
�[2mserver # [ 10.696084] systemd[1]: Finished shb-certs-cert-selfsigned-n.service.�[0m
�[2mserver # [ 10.702541] systemd[1]: Starting Nginx Web Server...�[0m
�[2mserver # [ 10.790453] nginx-pre-start[920]: nginx: the configuration file /nix/store/la9v3nrwi5sl2y4w17815xh2vyy6rzf1-nginx.conf syntax is ok�[0m
�[2mserver # [ 10.792693] nginx-pre-start[920]: nginx: configuration file /nix/store/la9v3nrwi5sl2y4w17815xh2vyy6rzf1-nginx.conf test is successful�[0m
�[2mserver # [ 10.802400] systemd[1]: Started Nginx Web Server.�[0m
�[2mserver # [ 10.806958] systemd[1]: Reached target Multi-User System.�[0m
�[2mserver # [ 10.807962] systemd[1]: Startup finished in 3.377s (kernel) + 7.429s (userspace) = 10.806s.�[0m
(finished: waiting for unit phpfpm-grocy.service, in 12.27 seconds)
server: �[1m�[32mwaiting for unit nginx.service�[0m
(finished: waiting for unit nginx.service, in 0.04 seconds)
server: �[1m�[32mwaiting for UNIX-domain stream on '/run/phpfpm/grocy.sock'�[0m
(finished: waiting for UNIX-domain stream on '/run/phpfpm/grocy.sock', in 0.03 seconds)
server: �[1m�[32mmust succeed: mkdir -p /tmp/shared/tmp1wba53gd�[0m
(finished: must succeed: mkdir -p /tmp/shared/tmp1wba53gd, in 0.02 seconds)
server: �[1m�[32mmust succeed: cp -r /etc/ssl/certs/ca-certificates.crt /tmp/shared/tmp1wba53gd/ca-certificates.crt�[0m
(finished: must succeed: cp -r /etc/ssl/certs/ca-certificates.crt /tmp/shared/tmp1wba53gd/ca-certificates.crt, in 0.02 seconds)
client: �[1m�[32mmust succeed: rm -r /etc/ssl/certs�[0m
client: �[1m�[32mwaiting for the VM to finish booting�[0m
client: Guest shell says: b'Spawning backdoor root shell...\n'
client: connected to guest root shell
client: (connecting took 0.00 seconds)
(finished: waiting for the VM to finish booting, in 0.00 seconds)
(finished: must succeed: rm -r /etc/ssl/certs, in 0.02 seconds)
client: �[1m�[32mmust succeed: mkdir -p /tmp/shared/tmphc1qxv_h�[0m
(finished: must succeed: mkdir -p /tmp/shared/tmphc1qxv_h, in 0.02 seconds)
client: �[1m�[32mmust succeed: mkdir -p /etc/ssl/certs�[0m
(finished: must succeed: mkdir -p /etc/ssl/certs, in 0.01 seconds)
client: �[1m�[32mmust succeed: cp -r /tmp/shared/tmphc1qxv_h/ca-certificates.crt /etc/ssl/certs/ca-certificates.crt�[0m
(finished: must succeed: cp -r /tmp/shared/tmphc1qxv_h/ca-certificates.crt /etc/ssl/certs/ca-certificates.crt, in 0.02 seconds)
�[1m�[32msubtest: access�[0m
curl --show-error --location --cookie-jar cookie.txt --cookie cookie.txt --connect-to g.example.com:443:server:443 --connect-to g.example.com:80:server:80 --connect-to auth.example.com:443:server:443 --silent --output /dev/null --write-out '{"code":%{response_code}}' https://g.example.com
(finished: subtest: access, in 2.10 seconds)
(finished: run the VM test script, in 14.89 seconds)
test script finished in 14.94s
�[1m�[32mcleanup�[0m
kill machine (pid 7)
qemu-kvm: terminating on signal 15 from pid 4 (/nix/store/7hnr99nxrd2aw6lghybqdmkckq60j6l9-python3-3.11.9/bin/python3.11)
kill machine (pid 26)
qemu-kvm: terminating on signal 15 from pid 4 (/nix/store/7hnr99nxrd2aw6lghybqdmkckq60j6l9-python3-3.11.9/bin/python3.11)
(finished: cleanup, in 0.02 seconds)
kill vlan (pid 5)
Loading