GLOB sdist-make: /home/lucasmoura/projects/ubuntu-advantage-client/setup.py behave-gcpgeneric-16.04 recreate: /home/lucasmoura/projects/ubuntu-advantage-client/.tox/behave-gcpgeneric-16.04 behave-gcpgeneric-16.04 installdeps: -rrequirements.txt, -rtest-requirements.txt, -rintegration-requirements.txt behave-gcpgeneric-16.04 inst: /home/lucasmoura/projects/ubuntu-advantage-client/.tox/.tmp/package/7/ubuntu-advantage-tools-20.3.zip behave-gcpgeneric-16.04 installed: adal==1.2.7,appdirs==1.4.4,applicationinsights==0.11.10,argcomplete==1.12.3,attrs==20.3.0,azure-cli-core==2.22.1,azure-cli-telemetry==1.0.6,azure-common==1.1.27,azure-core==1.13.0,azure-mgmt-compute==14.0.0,azure-mgmt-core==1.2.2,azure-mgmt-network==13.0.0,azure-mgmt-resource==12.1.0,backcall==0.2.0,bcrypt==3.2.0,behave==1.2.6,boto3==1.17.60,botocore==1.20.60,cachetools==4.2.2,certifi==2020.12.5,cffi==1.14.5,chardet==4.0.0,cliff==3.7.0,cmd2==1.5.0,colorama==0.4.4,configparser==4.0.2,coverage==5.5,cryptography==3.3.2,debtcollector==2.2.0,decorator==5.0.7,dogpile.cache==1.1.2,flake8==3.9.1,google-api-core==1.26.3,google-api-python-client==2.3.0,google-auth==1.30.0,google-auth-httplib2==0.1.0,googleapis-common-protos==1.53.0,httplib2==0.19.1,humanfriendly==9.1,idna==2.10,iniconfig==1.1.1,ipdb==0.13.7,ipython==7.22.0,ipython-genutils==0.2.0,iso8601==0.1.14,isodate==0.6.0,jedi==0.18.0,jmespath==0.10.0,jsonpatch==1.32,jsonpointer==2.1,keystoneauth1==4.3.1,knack==0.8.1,mccabe==0.6.1,mock==4.0.3,msal==1.11.0,msgpack==1.0.2,msrest==0.6.21,msrestazure==0.6.4,munch==2.5.0,netaddr==0.8.0,netifaces==0.10.9,oauthlib==3.1.0,oci==2.38.0,openstacksdk==0.56.0,os-service-types==1.7.0,osc-lib==2.3.1,oslo.config==8.6.0,oslo.i18n==5.0.1,oslo.serialization==4.1.0,oslo.utils==4.8.0,packaging==20.9,paramiko==2.7.2,parse==1.19.0,parse-type==0.5.2,parso==0.8.2,pbr==5.6.0,pexpect==4.8.0,pickleshare==0.7.5,pkginfo==1.7.0,pluggy==0.13.1,portalocker==1.7.1,prettytable==2.1.0,prompt-toolkit==3.0.18,protobuf==3.15.8,psutil==5.8.0,ptyprocess==0.7.0,py==1.10.0,pyasn1==0.4.8,pyasn1-modules==0.2.8,pycloudlib @ git+https://github.com/canonical/pycloudlib.git@cab5db70bdd5588aabcf7217e655ff90d2dee487,pycodestyle==2.7.0,pycparser==2.20,pyflakes==2.3.1,Pygments==2.8.1,PyHamcrest==2.0.2,PyJWT==1.7.1,PyNaCl==1.4.0,pyOpenSSL==19.1.0,pyparsing==2.4.7,pyperclip==1.8.2,pytest==6.2.3,pytest-cov==2.11.1,python-cinderclient==7.4.0,python-dateutil==2.8.1,python-keystoneclient==4.2.0,python-novaclient==17.4.0,python-openstackclient==5.5.0,python-simplestreams @ git+https://git.launchpad.net/simplestreams@21c5bba2a5413c51e6b9131fc450e96f6b46090d,pytz==2021.1,PyYAML==5.4.1,requests==2.25.1,requests-oauthlib==1.3.0,requestsexceptions==1.4.0,rfc3986==1.4.0,rsa==4.7.2,s3transfer==0.4.2,simplejson==3.17.2,six==1.15.0,stevedore==3.3.0,tabulate==0.8.9,toml==0.10.2,traitlets==5.0.5,ubuntu-advantage-tools @ file:///home/lucasmoura/projects/ubuntu-advantage-client/.tox/.tmp/package/7/ubuntu-advantage-tools-20.3.zip,uritemplate==3.0.1,urllib3==1.26.4,wcwidth==0.2.5,wrapt==1.12.1 behave-gcpgeneric-16.04 run-test-pre: PYTHONHASHSEED='4257708905' behave-gcpgeneric-16.04 run-test: commands[0] | behave -v --tags=uses.config.machine_type.gcp.generic --tags=series.xenial,series.all '--tags=~upgrade' Loading config defaults from "./tox.ini" Using defaults: color True show_snippets True show_skipped False dry_run False show_source True show_timings True stdout_capture False stderr_capture False log_capture False logging_format %(levelname)s:%(name)s:%(message)s logging_level info steps_catalog False summary True junit True stage None userdata {} default_format pretty default_tags scenario_outline_annotation_schema {name} -- @{row.id} {examples.name} more_formatters {} Using default path "./features" Trying base directory: /home/lucasmoura/projects/ubuntu-advantage-client/features --- Ignoring aws_access_key_id because machine_type is gcp.generic --- Ignoring aws_secret_access_key because machine_type is gcp.generic --- Ignoring az_client_id because machine_type is gcp.generic --- Ignoring az_client_secret because machine_type is gcp.generic --- Ignoring az_tenant_id because machine_type is gcp.generic --- Ignoring az_subscription_id because machine_type is gcp.generic --- job suffix: None Config options: build_pr = False image_clean = True destroy_instances = True aws_access_key_id = None aws_secret_access_key = None az_client_id = None az_client_secret = None az_tenant_id = None az_subscription_id = None gcp_credentials_path = test-ubuntu-advantage-tools-fb2dd1b5527a.json gcp_project = test-ubuntu-advantage-tools contract_token = contract_token_staging = machine_type = gcp.generic private_key_file = None private_key_name = uaclient-integration reuse_image = None debs_path = None artifact_dir = None ppa = ppa:ua-client/staging ppa_keyid = 6C0BC933 @uses.config.contract_token Feature: Command behaviour when attaching a machine to an Ubuntu Advantage # features/attach_validtoken.feature:2 subscription using a valid token @series.all @uses.config.machine_type.gcp.generic Scenario Outline: Attach command in a ubuntu lxd container -- @1.1 ubuntu release livepatch status # features/attach_validtoken.feature:215 Given a `trusty` machine with ubuntu-advantage-tools installed # features/steps/steps.py:27 When I attach `contract_token` with sudo # None Then stdout matches regexp # None """ UA Infra: ESM enabled """ And stdout matches regexp # None """ This machine is now attached to """ And stdout matches regexp # None """ SERVICE ENTITLED STATUS DESCRIPTION esm-infra +yes +enabled +UA Infra: Extended Security Maintenance \(ESM\) fips +yes +n/a +NIST-certified FIPS modules fips-updates +yes +n/a +Uncertified security updates to FIPS modules livepatch +yes +disabled +Canonical Livepatch service """ And stderr matches regexp # None """ Enabling default service esm-infra """ @series.all @uses.config.machine_type.gcp.generic Scenario Outline: Attach command in a ubuntu lxd container -- @1.2 ubuntu release livepatch status # features/attach_validtoken.feature:216 Given a `xenial` machine with ubuntu-advantage-tools installed # features/steps/steps.py:27 When I attach `contract_token` with sudo # features/steps/steps.py:216 Then stdout matches regexp # features/steps/steps.py:300 """ UA Infra: ESM enabled """ And stdout matches regexp # features/steps/steps.py:300 """ This machine is now attached to """ And stdout matches regexp # features/steps/steps.py:300 """ SERVICE ENTITLED STATUS DESCRIPTION esm-infra +yes +enabled +UA Infra: Extended Security Maintenance \(ESM\) fips +yes +n/a +NIST-certified FIPS modules fips-updates +yes +n/a +Uncertified security updates to FIPS modules livepatch +yes +n/a +Canonical Livepatch service """ And stderr matches regexp # features/steps/steps.py:312 """ Enabling default service esm-infra """ @series.all @uses.config.machine_type.gcp.generic Scenario Outline: Attach command in a ubuntu lxd container -- @1.3 ubuntu release livepatch status # features/attach_validtoken.feature:217 Given a `bionic` machine with ubuntu-advantage-tools installed # features/steps/steps.py:27 When I attach `contract_token` with sudo # None Then stdout matches regexp # None """ UA Infra: ESM enabled """ And stdout matches regexp # None """ This machine is now attached to """ And stdout matches regexp # None """ SERVICE ENTITLED STATUS DESCRIPTION esm-infra +yes +enabled +UA Infra: Extended Security Maintenance \(ESM\) fips +yes +n/a +NIST-certified FIPS modules fips-updates +yes +n/a +Uncertified security updates to FIPS modules livepatch +yes +n/a +Canonical Livepatch service """ And stderr matches regexp # None """ Enabling default service esm-infra """ @series.all @uses.config.machine_type.gcp.generic Scenario Outline: Attach command in a ubuntu lxd container -- @1.4 ubuntu release livepatch status # features/attach_validtoken.feature:218 Given a `focal` machine with ubuntu-advantage-tools installed # features/steps/steps.py:27 When I attach `contract_token` with sudo # None Then stdout matches regexp # None """ UA Infra: ESM enabled """ And stdout matches regexp # None """ This machine is now attached to """ And stdout matches regexp # None """ SERVICE ENTITLED STATUS DESCRIPTION esm-infra +yes +enabled +UA Infra: Extended Security Maintenance \(ESM\) fips +yes +n/a +NIST-certified FIPS modules fips-updates +yes +n/a +Uncertified security updates to FIPS modules livepatch +yes +n/a +Canonical Livepatch service """ And stderr matches regexp # None """ Enabling default service esm-infra """ @series.bionic @series.xenial @uses.config.machine_type.gcp.generic Scenario Outline: Attached enable of fips services in an ubuntu gcp vm -- @1.1 fips # features/attach_validtoken.feature:407 Given a `xenial` machine with ubuntu-advantage-tools installed # features/steps/steps.py:27 When I attach `contract_token_staging` with sudo # features/steps/steps.py:216 Then I verify that running `ua enable fips --assume-yes` `with sudo` exits `1` # features/steps/steps.py:355 And stdout matches regexp # features/steps/steps.py:300 """ Ubuntu Xenial does not provide a GCP optimized FIPS kernel """ @series.bionic @series.xenial @uses.config.machine_type.gcp.generic Scenario Outline: Attached enable of fips services in an ubuntu gcp vm -- @1.2 fips # features/attach_validtoken.feature:408 Given a `xenial` machine with ubuntu-advantage-tools installed # features/steps/steps.py:27 When I attach `contract_token_staging` with sudo # features/steps/steps.py:216 Then I verify that running `ua enable fips-updates --assume-yes` `with sudo` exits `1` # features/steps/steps.py:355 And stdout matches regexp # features/steps/steps.py:300 """ Ubuntu Xenial does not provide a GCP optimized FIPS kernel """ @series.bionic @series.xenial @uses.config.machine_type.gcp.generic Scenario Outline: Attached enable of fips services in an ubuntu gcp vm -- @1.3 fips # features/attach_validtoken.feature:409 Given a `bionic` machine with ubuntu-advantage-tools installed # features/steps/steps.py:27 When I attach `contract_token_staging` with sudo # None Then I verify that running `ua enable fips --assume-yes` `with sudo` exits `1` # None And stdout matches regexp # None """ Ubuntu Bionic does not provide a GCP optimized FIPS kernel """ @series.bionic @series.xenial @uses.config.machine_type.gcp.generic Scenario Outline: Attached enable of fips services in an ubuntu gcp vm -- @1.4 fips # features/attach_validtoken.feature:410 Given a `bionic` machine with ubuntu-advantage-tools installed # features/steps/steps.py:27 When I attach `contract_token_staging` with sudo # None Then I verify that running `ua enable fips-updates --assume-yes` `with sudo` exits `1` # None And stdout matches regexp # None """ Ubuntu Bionic does not provide a GCP optimized FIPS kernel """ 1 feature passed, 0 failed, 8 skipped 3 scenarios passed, 0 failed, 167 skipped 14 steps passed, 0 failed, 2018 skipped, 0 undefined Took 6m35.248s ___________________________________ summary ____________________________________ behave-gcpgeneric-16.04: commands succeeded congratulations :)