>>> nebula: Building community/nebula 1.9.1-r2 (using abuild 3.13.0-r3) started Wed, 03 Jul 2024 16:45:13 +0000 >>> nebula: Checking sanity of /home/buildozer/aports/community/nebula/APKBUILD... >>> WARNING: nebula: Go packages require network connection to build. Maybe add 'net' to options >>> nebula: Analyzing dependencies... >>> nebula: Installing for build: build-base go (1/2) Installing go (1.22.5-r0) (2/2) Installing .makedepends-nebula (20240703.164514) Executing busybox-1.36.1-r31.trigger OK: 449 MiB in 112 packages >>> nebula: Cleaning up srcdir >>> nebula: Cleaning up pkgdir >>> nebula: Cleaning up tmpdir >>> nebula: Fetching https://distfiles.alpinelinux.org/distfiles/edge/nebula-1.9.1.tar.gz >>> nebula: Fetching https://distfiles.alpinelinux.org/distfiles/edge/nebula-1.9.1.tar.gz >>> nebula: Checking sha512sums... nebula-1.9.1.tar.gz: OK unset-CGO_ENABLED.patch: OK nebula.initd: OK >>> nebula: Unpacking /var/cache/distfiles/nebula-1.9.1.tar.gz... >>> nebula: unset-CGO_ENABLED.patch patching file Makefile go build -buildmode=pie -modcacherw -trimpath -buildvcs=false -ldflags "-X main.Build=1.9.1" -o ./nebula "./cmd/nebula" go: downloading github.com/sirupsen/logrus v1.9.3 go: downloading dario.cat/mergo v1.0.0 go: downloading gopkg.in/yaml.v2 v2.4.0 go: downloading github.com/nbrownus/go-metrics-prometheus v0.0.0-20210712211119-974a6260965f go: downloading github.com/miekg/dns v1.1.59 go: downloading golang.org/x/net v0.25.0 go: downloading github.com/rcrowley/go-metrics v0.0.0-20201227073835-cf1acfcdf475 go: downloading github.com/cyberdelia/go-metrics-graphite v0.0.0-20161219230853-39f87cc3b432 go: downloading github.com/gogo/protobuf v1.3.2 go: downloading github.com/flynn/noise v1.1.0 go: downloading google.golang.org/protobuf v1.34.1 go: downloading github.com/prometheus/client_golang v1.19.0 go: downloading golang.org/x/crypto v0.23.0 go: downloading github.com/anmitsu/go-shlex v0.0.0-20200514113438-38f4b401e2be go: downloading github.com/armon/go-radix v1.0.0 go: downloading golang.org/x/sys v0.20.0 go: downloading github.com/vishvananda/netlink v1.2.1-beta.2 go: downloading github.com/vishvananda/netns v0.0.4 go: downloading github.com/prometheus/common v0.48.0 go: downloading github.com/prometheus/client_model v0.5.0 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.2.0 go: downloading github.com/prometheus/procfs v0.12.0 go: downloading golang.org/x/term v0.20.0 go build -buildmode=pie -modcacherw -trimpath -buildvcs=false -ldflags "-X main.Build=1.9.1" -o ./nebula-cert ./cmd/nebula-cert go: downloading github.com/skip2/go-qrcode v0.0.0-20200617195104-da1b6568686e fatal: not a git repository (or any of the parent directories): .git fatal: not a git repository (or any of the parent directories): .git fatal: not a git repository (or any of the parent directories): .git fatal: not a git repository (or any of the parent directories): .git fatal: not a git repository (or any of the parent directories): .git fatal: not a git repository (or any of the parent directories): .git fatal: not a git repository (or any of the parent directories): .git fatal: not a git repository (or any of the parent directories): .git fatal: not a git repository (or any of the parent directories): .git fatal: not a git repository (or any of the parent directories): .git fatal: not a git repository (or any of the parent directories): .git fatal: not a git repository (or any of the parent directories): .git go test -v ./... fatal: not a git repository (or any of the parent directories): .git fatal: not a git repository (or any of the parent directories): .git fatal: not a git repository (or any of the parent directories): .git go: downloading github.com/stretchr/testify v1.9.0 go: downloading github.com/kardianos/service v1.2.2 go: downloading golang.org/x/sync v0.7.0 go: downloading gvisor.dev/gvisor v0.0.0-20240423190808-9d7a357edefe go: downloading github.com/davecgh/go-spew v1.1.1 go: downloading github.com/pmezard/go-difflib v1.0.0 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading github.com/google/btree v1.1.2 go: downloading golang.org/x/time v0.5.0 ? github.com/slackhq/nebula/cmd/nebula [no test files] ? github.com/slackhq/nebula/cmd/nebula-service [no test files] ? github.com/slackhq/nebula/e2e [no test files] ? github.com/slackhq/nebula/e2e/router [no test files] === RUN TestNewAllowListFromConfig --- PASS: TestNewAllowListFromConfig (0.00s) === RUN TestAllowList_Allow --- PASS: TestAllowList_Allow (0.00s) === RUN TestLocalAllowList_AllowName --- PASS: TestLocalAllowList_AllowName (0.00s) === RUN TestBits --- PASS: TestBits (0.00s) === RUN TestBitsDupeCounter --- PASS: TestBitsDupeCounter (0.00s) === RUN TestBitsOutOfWindowCounter --- PASS: TestBitsOutOfWindowCounter (0.00s) === RUN TestBitsLostCounter --- PASS: TestBitsLostCounter (0.00s) === RUN TestCalculatedRemoteApply --- PASS: TestCalculatedRemoteApply (0.00s) === RUN Test_NewConnectionManagerTest --- PASS: Test_NewConnectionManagerTest (0.00s) === RUN Test_NewConnectionManagerTest2 --- PASS: Test_NewConnectionManagerTest2 (0.00s) === RUN Test_NewConnectionManagerTest_DisconnectInvalid --- PASS: Test_NewConnectionManagerTest_DisconnectInvalid (0.00s) === RUN TestControl_GetHostInfoByVpnIp --- PASS: TestControl_GetHostInfoByVpnIp (0.00s) === RUN TestParsequery --- PASS: TestParsequery (0.00s) === RUN Test_getDnsServerAddr --- PASS: Test_getDnsServerAddr (0.00s) === RUN TestNewFirewall --- PASS: TestNewFirewall (0.00s) === RUN TestFirewall_AddRule --- PASS: TestFirewall_AddRule (0.00s) === RUN TestFirewall_Drop --- PASS: TestFirewall_Drop (0.00s) === RUN TestFirewall_Drop2 --- PASS: TestFirewall_Drop2 (0.00s) === RUN TestFirewall_Drop3 --- PASS: TestFirewall_Drop3 (0.00s) === RUN TestFirewall_DropConntrackReload --- PASS: TestFirewall_DropConntrackReload (0.00s) === RUN Test_parsePort --- PASS: Test_parsePort (0.00s) === RUN TestNewFirewallFromConfig --- PASS: TestNewFirewallFromConfig (0.00s) === RUN TestAddFirewallRulesFromConfig --- PASS: TestAddFirewallRulesFromConfig (0.00s) === RUN TestFirewall_convertRule --- PASS: TestFirewall_convertRule (0.00s) === RUN Test_NewHandshakeManagerVpnIp --- PASS: Test_NewHandshakeManagerVpnIp (0.00s) === RUN TestHostMap_MakePrimary --- PASS: TestHostMap_MakePrimary (0.00s) === RUN TestHostMap_DeleteHostInfo --- PASS: TestHostMap_DeleteHostInfo (0.00s) === RUN TestHostMap_reload --- PASS: TestHostMap_reload (0.00s) === RUN TestOldIPv4Only --- PASS: TestOldIPv4Only (0.00s) === RUN TestNewLhQuery --- PASS: TestNewLhQuery (0.00s) === RUN Test_lhStaticMapping --- PASS: Test_lhStaticMapping (0.00s) === RUN TestReloadLighthouseInterval --- PASS: TestReloadLighthouseInterval (0.00s) === RUN TestLighthouse_Memory --- PASS: TestLighthouse_Memory (0.00s) === RUN TestLighthouse_reload --- PASS: TestLighthouse_reload (0.00s) === RUN Test_ipMaskContains --- PASS: Test_ipMaskContains (0.00s) === RUN Test_newPacket --- PASS: Test_newPacket (0.00s) === RUN TestNewPunchyFromConfig --- PASS: TestNewPunchyFromConfig (0.00s) === RUN TestPunchy_reload --- PASS: TestPunchy_reload (0.00s) === RUN TestRemoteList_Rebuild --- PASS: TestRemoteList_Rebuild (0.00s) === RUN TestNewTimerWheel --- PASS: TestNewTimerWheel (0.00s) === RUN TestTimerWheel_findWheel --- PASS: TestTimerWheel_findWheel (0.00s) === RUN TestTimerWheel_Add --- PASS: TestTimerWheel_Add (0.01s) === RUN TestTimerWheel_Purge --- PASS: TestTimerWheel_Purge (0.00s) PASS ok github.com/slackhq/nebula 0.035s ? github.com/slackhq/nebula/examples/go_service [no test files] ? github.com/slackhq/nebula/firewall [no test files] ? github.com/slackhq/nebula/sshd [no test files] ? github.com/slackhq/nebula/test [no test files] ? github.com/slackhq/nebula/udp [no test files] === RUN TestMarshalingNebulaCertificate --- PASS: TestMarshalingNebulaCertificate (0.00s) === RUN TestNebulaCertificate_Sign --- PASS: TestNebulaCertificate_Sign (0.00s) === RUN TestNebulaCertificate_SignP256 --- PASS: TestNebulaCertificate_SignP256 (0.00s) === RUN TestNebulaCertificate_Expired --- PASS: TestNebulaCertificate_Expired (0.00s) === RUN TestNebulaCertificate_MarshalJSON --- PASS: TestNebulaCertificate_MarshalJSON (0.00s) === RUN TestNebulaCertificate_Verify --- PASS: TestNebulaCertificate_Verify (0.00s) === RUN TestNebulaCertificate_VerifyP256 --- PASS: TestNebulaCertificate_VerifyP256 (0.00s) === RUN TestNebulaCertificate_Verify_IPs --- PASS: TestNebulaCertificate_Verify_IPs (0.00s) === RUN TestNebulaCertificate_Verify_Subnets --- PASS: TestNebulaCertificate_Verify_Subnets (0.00s) === RUN TestNebulaCertificate_VerifyPrivateKey --- PASS: TestNebulaCertificate_VerifyPrivateKey (0.00s) === RUN TestNebulaCertificate_VerifyPrivateKeyP256 --- PASS: TestNebulaCertificate_VerifyPrivateKeyP256 (0.00s) === RUN TestNewCAPoolFromBytes --- PASS: TestNewCAPoolFromBytes (0.00s) === RUN TestUnmrshalCertPEM --- PASS: TestUnmrshalCertPEM (0.00s) === RUN TestUnmarshalSigningPrivateKey --- PASS: TestUnmarshalSigningPrivateKey (0.00s) === RUN TestDecryptAndUnmarshalSigningPrivateKey --- PASS: TestDecryptAndUnmarshalSigningPrivateKey (2.90s) === RUN TestEncryptAndMarshalSigningPrivateKey --- PASS: TestEncryptAndMarshalSigningPrivateKey (0.16s) === RUN TestUnmarshalPrivateKey --- PASS: TestUnmarshalPrivateKey (0.00s) === RUN TestUnmarshalEd25519PublicKey --- PASS: TestUnmarshalEd25519PublicKey (0.00s) === RUN TestUnmarshalX25519PublicKey --- PASS: TestUnmarshalX25519PublicKey (0.00s) === RUN TestMarshalingNebulaCertificateConsistency --- PASS: TestMarshalingNebulaCertificateConsistency (0.00s) === RUN TestNebulaCertificate_Copy --- PASS: TestNebulaCertificate_Copy (0.00s) === RUN TestUnmarshalNebulaCertificate --- PASS: TestUnmarshalNebulaCertificate (0.00s) === RUN TestNewArgon2Parameters --- PASS: TestNewArgon2Parameters (0.00s) PASS ok github.com/slackhq/nebula/cert 3.110s === RUN TestCIDRTree_List --- PASS: TestCIDRTree_List (0.00s) === RUN TestCIDRTree_Contains --- PASS: TestCIDRTree_Contains (0.00s) === RUN TestCIDRTree_MostSpecificContains --- PASS: TestCIDRTree_MostSpecificContains (0.00s) === RUN TestTree4_GetCIDR --- PASS: TestTree4_GetCIDR (0.00s) === RUN TestCIDR6Tree_MostSpecificContains --- PASS: TestCIDR6Tree_MostSpecificContains (0.00s) === RUN TestCIDR6Tree_MostSpecificContainsIpV6 --- PASS: TestCIDR6Tree_MostSpecificContainsIpV6 (0.00s) PASS ok github.com/slackhq/nebula/cidr 0.003s === RUN Test_caSummary --- PASS: Test_caSummary (0.00s) === RUN Test_caHelp --- PASS: Test_caHelp (0.00s) === RUN Test_ca --- PASS: Test_ca (1.97s) === RUN Test_keygenSummary --- PASS: Test_keygenSummary (0.00s) === RUN Test_keygenHelp --- PASS: Test_keygenHelp (0.00s) === RUN Test_keygen --- PASS: Test_keygen (0.00s) === RUN Test_help --- PASS: Test_help (0.00s) === RUN Test_handleError --- PASS: Test_handleError (0.00s) === RUN Test_printSummary --- PASS: Test_printSummary (0.00s) === RUN Test_printHelp --- PASS: Test_printHelp (0.00s) === RUN Test_printCert --- PASS: Test_printCert (0.00s) === RUN Test_signSummary --- PASS: Test_signSummary (0.00s) === RUN Test_signHelp --- PASS: Test_signHelp (0.00s) === RUN Test_signCert --- PASS: Test_signCert (0.28s) === RUN Test_verifySummary --- PASS: Test_verifySummary (0.00s) === RUN Test_verifyHelp --- PASS: Test_verifyHelp (0.00s) === RUN Test_verify --- PASS: Test_verify (0.00s) PASS ok github.com/slackhq/nebula/cmd/nebula-cert 2.285s === RUN TestConfig_Load --- PASS: TestConfig_Load (0.00s) === RUN TestConfig_Get --- PASS: TestConfig_Get (0.00s) === RUN TestConfig_GetStringSlice --- PASS: TestConfig_GetStringSlice (0.00s) === RUN TestConfig_GetBool --- PASS: TestConfig_GetBool (0.00s) === RUN TestConfig_HasChanged --- PASS: TestConfig_HasChanged (0.00s) === RUN TestConfig_ReloadConfig --- PASS: TestConfig_ReloadConfig (0.00s) === RUN TestConfig_MergoMerge config_test.go:205: Merged Config: map[interface {}]interface {}{"firewall":map[interface {}]interface {}{"inbound":[]interface {}{map[interface {}]interface {}{"host":"any", "port":"any", "proto":"icmp"}, map[interface {}]interface {}{"groups":[]interface {}{"server"}, "port":443, "proto":"tcp"}, map[interface {}]interface {}{"groups":[]interface {}{"webapp"}, "port":443, "proto":"tcp"}}, "outbound":[]interface {}{map[interface {}]interface {}{"host":"any", "port":"any", "proto":"any"}}}, "listen":map[interface {}]interface {}{"host":"0.0.0.0", "port":4242}} config_test.go:208: Merged Config as YAML: firewall: inbound: - host: any port: any proto: icmp - groups: - server port: 443 proto: tcp - groups: - webapp port: 443 proto: tcp outbound: - host: any port: any proto: any listen: host: 0.0.0.0 port: 4242 --- PASS: TestConfig_MergoMerge (0.00s) PASS ok github.com/slackhq/nebula/config 0.004s === RUN TestEncode --- PASS: TestEncode (0.00s) === RUN TestParse --- PASS: TestParse (0.00s) === RUN TestTypeName --- PASS: TestTypeName (0.00s) === RUN TestSubTypeName --- PASS: TestSubTypeName (0.00s) === RUN TestTypeMap --- PASS: TestTypeMap (0.00s) === RUN TestHeader_String --- PASS: TestHeader_String (0.00s) === RUN TestHeader_MarshalJSON --- PASS: TestHeader_MarshalJSON (0.00s) PASS ok github.com/slackhq/nebula/header 0.004s === RUN Test_CreateRejectPacket --- PASS: Test_CreateRejectPacket (0.00s) === RUN TestVpnIp_String --- PASS: TestVpnIp_String (0.00s) PASS ok github.com/slackhq/nebula/iputil 0.003s === RUN TestEncryptLockNeeded --- PASS: TestEncryptLockNeeded (0.00s) PASS ok github.com/slackhq/nebula/noiseutil 0.003s === RUN Test_parseRoutes --- PASS: Test_parseRoutes (0.00s) === RUN Test_parseUnsafeRoutes --- PASS: Test_parseUnsafeRoutes (0.00s) === RUN Test_makeRouteTree --- PASS: Test_makeRouteTree (0.00s) === RUN TestTunAdvMSS === RUN TestTunAdvMSS/default === RUN TestTunAdvMSS/default-min === RUN TestTunAdvMSS/default-low === RUN TestTunAdvMSS/route === RUN TestTunAdvMSS/route-min === RUN TestTunAdvMSS/route-high --- PASS: TestTunAdvMSS (0.00s) --- PASS: TestTunAdvMSS/default (0.00s) --- PASS: TestTunAdvMSS/default-min (0.00s) --- PASS: TestTunAdvMSS/default-low (0.00s) --- PASS: TestTunAdvMSS/route (0.00s) --- PASS: TestTunAdvMSS/route-min (0.00s) --- PASS: TestTunAdvMSS/route-high (0.00s) PASS ok github.com/slackhq/nebula/overlay 0.003s === RUN TestService time="2024-07-03T16:46:01Z" level=info msg="Firewall rule added" firewallRule="map[caName: caSha: direction:outgoing endPort:0 groups:[] host:any ip: localIp: proto:0 startPort:0]" time="2024-07-03T16:46:01Z" level=info msg="Firewall rule added" firewallRule="map[caName: caSha: direction:incoming endPort:0 groups:[] host:any ip: localIp: proto:0 startPort:0]" time="2024-07-03T16:46:01Z" level=info msg="Firewall started" firewallHashes="SHA:498215dec4e5687a2353f51c10838c113bd1af35ef72b8e8c9f536986ada5417,FNV:2782948616" time="2024-07-03T16:46:01Z" level=info msg="listening \"0.0.0.0\" 4243" time="2024-07-03T16:46:01Z" level=info msg="Main HostMap created" network=10.0.0.1/24 preferredRanges="[]" time="2024-07-03T16:46:01Z" level=info msg="punchy disabled" time="2024-07-03T16:46:01Z" level=info msg="Loaded send_recv_error config" sendRecvError=always time="2024-07-03T16:46:01Z" level=info msg="Nebula interface is active" boringcrypto=false build=custom-app interface=faketun0 network=10.0.0.1/24 udpAddr="0.0.0.0:4243" time="2024-07-03T16:46:01Z" level=info msg="Firewall rule added" firewallRule="map[caName: caSha: direction:outgoing endPort:0 groups:[] host:any ip: localIp: proto:0 startPort:0]" time="2024-07-03T16:46:01Z" level=info msg="Firewall rule added" firewallRule="map[caName: caSha: direction:incoming endPort:0 groups:[] host:any ip: localIp: proto:0 startPort:0]" time="2024-07-03T16:46:01Z" level=info msg="Firewall started" firewallHashes="SHA:498215dec4e5687a2353f51c10838c113bd1af35ef72b8e8c9f536986ada5417,FNV:2782948616" time="2024-07-03T16:46:01Z" level=info msg="listening \"0.0.0.0\" 0" time="2024-07-03T16:46:01Z" level=info msg="Main HostMap created" network=10.0.0.2/24 preferredRanges="[]" time="2024-07-03T16:46:01Z" level=info msg="punchy disabled" time="2024-07-03T16:46:01Z" level=info msg="Loaded send_recv_error config" sendRecvError=always time="2024-07-03T16:46:01Z" level=info msg="Nebula interface is active" boringcrypto=false build=custom-app interface=faketun0 network=10.0.0.2/24 udpAddr="0.0.0.0:34352" time="2024-07-03T16:46:01Z" level=info msg="DNS results changed for host list" newSet="map[[::ffff:127.0.0.1]:4243:{}]" origSet="&map[]" time="2024-07-03T16:46:01Z" level=info msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=2660465969 localIndex=2660465969 remoteIndex=0 udpAddrs="[127.0.0.1:4243]" vpnIp=10.0.0.1 time="2024-07-03T16:46:01Z" level=info msg="Handshake message received" certName=a fingerprint=eb19eed306544d433d194f0bd47ba3133bf5dba68233dcff5ce72b2c4fbb6893 handshake="map[stage:1 style:ix_psk0]" initiatorIndex=2660465969 issuer=f1e8133101d4de97080e59e23f4b0046be1e2d14306a05e7cf72de5a77c42508 remoteIndex=0 responderIndex=0 udpAddr="127.0.0.1:34352" vpnIp=10.0.0.2 time="2024-07-03T16:46:01Z" level=info msg="Handshake message sent" certName=a fingerprint=eb19eed306544d433d194f0bd47ba3133bf5dba68233dcff5ce72b2c4fbb6893 handshake="map[stage:2 style:ix_psk0]" initiatorIndex=2660465969 issuer=f1e8133101d4de97080e59e23f4b0046be1e2d14306a05e7cf72de5a77c42508 remoteIndex=0 responderIndex=225354719 udpAddr="127.0.0.1:34352" vpnIp=10.0.0.2 time="2024-07-03T16:46:01Z" level=info msg="Handshake message received" certName=a durationNs=1663178 fingerprint=ab394232fc6b292aec16739fb29b97744666a0b18df289c0bff2ee6eb208d63e handshake="map[stage:2 style:ix_psk0]" initiatorIndex=2660465969 issuer=f1e8133101d4de97080e59e23f4b0046be1e2d14306a05e7cf72de5a77c42508 remoteIndex=2660465969 responderIndex=225354719 sentCachedPackets=2 udpAddr="127.0.0.1:4243" vpnIp=10.0.0.1 service_test.go:119: accepted connection service_test.go:125: server: wrote message service_test.go:136: server: read message --- PASS: TestService (0.01s) PASS ok github.com/slackhq/nebula/service 0.016s === RUN TestContextualError_Log --- PASS: TestContextualError_Log (0.00s) === RUN TestLogWithContextIfNeeded --- PASS: TestLogWithContextIfNeeded (0.00s) === RUN TestContextualizeIfNeeded --- PASS: TestContextualizeIfNeeded (0.00s) PASS ok github.com/slackhq/nebula/util 0.004s >>> nebula: Entering fakeroot... >>> nebula-openrc*: Running split function openrc... >>> nebula-openrc*: Preparing subpackage nebula-openrc... >>> nebula-openrc*: Running postcheck for nebula-openrc >>> nebula*: Running postcheck for nebula >>> nebula*: Preparing package nebula... >>> nebula*: Stripping binaries >>> nebula*: Script found. /bin/sh added as a dependency for nebula-1.9.1-r2.apk >>> nebula*: Adding .pre-install >>> nebula-openrc*: Scanning shared objects >>> nebula*: Scanning shared objects >>> nebula-openrc*: Tracing dependencies... >>> nebula-openrc*: Package size: 16.0 KB >>> nebula-openrc*: Compressing data... >>> nebula-openrc*: Create checksum... >>> nebula-openrc*: Create nebula-openrc-1.9.1-r2.apk >>> nebula*: Tracing dependencies... /bin/sh so:libc.musl-ppc64le.so.1 >>> nebula*: Package size: 17.2 MB >>> nebula*: Compressing data... >>> nebula*: Create checksum... >>> nebula*: Create nebula-1.9.1-r2.apk >>> nebula: Build complete at Wed, 03 Jul 2024 16:46:02 +0000 elapsed time 0h 0m 49s >>> nebula: Cleaning up srcdir >>> nebula: Cleaning up pkgdir >>> nebula: Uninstalling dependencies... (1/2) Purging .makedepends-nebula (20240703.164514) (2/2) Purging go (1.22.5-r0) Executing busybox-1.36.1-r31.trigger OK: 265 MiB in 110 packages >>> nebula: Updating the community/ppc64le repository index... >>> nebula: Signing the index...