autopkgtest [16:44:48]: git checkout: a93602a Add a debug-fail hook and implement it for autopkgtest-virt-ssh autopkgtest [16:44:48]: host juju-prod-ues-proposed-migration-machine-3; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.ulm83g0h/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --setup-commands /home/ubuntu/autopkgtest/setup-commands/setup-testbed --apt-pocket=proposed=src:python-boto --apt-upgrade python-boto --env=ADT_TEST_TRIGGERS=python-boto/2.44.0-1ubuntu1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --name adt-artful-amd64-python-boto-20170531-164447 --image 'ubuntu/ubuntu-artful-.*-amd64-server' --keyname testbed-juju-prod-ues-proposed-migration-machine-3 --net-id=net_ues_proposed_migration -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,localhost,localdomain,novalocal,internal,archive.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,ppa.launchpad.net'"'"'' --mirror=http://ftpmaster.internal/ubuntu autopkgtest [16:46:19]: @@@@@@@@@@@@@@@@@@@@ test bed setup Get:1 http://ftpmaster.internal/ubuntu artful-proposed InRelease [235 kB] Get:2 http://ftpmaster.internal/ubuntu artful-proposed/universe Sources [122 kB] Get:3 http://ftpmaster.internal/ubuntu artful-proposed/multiverse Sources [1,784 B] Get:4 http://ftpmaster.internal/ubuntu artful-proposed/main Sources [35.1 kB] Get:5 http://ftpmaster.internal/ubuntu artful-proposed/multiverse amd64 Packages [972 B] Get:6 http://ftpmaster.internal/ubuntu artful-proposed/universe amd64 Packages [116 kB] Get:7 http://ftpmaster.internal/ubuntu artful-proposed/main amd64 Packages [63.7 kB] Fetched 575 kB in 0s (1,354 kB/s) Reading package lists... Reading package lists... Building dependency tree... Reading state information... dbus is already the newest version (1.10.10-1ubuntu2). eatmydata is already the newest version (105-5). 0 upgraded, 0 newly installed, 0 to remove and 4 not upgraded. Reading package lists... Building dependency tree... Reading state information... haveged is already the newest version (1.9.1-5). 0 upgraded, 0 newly installed, 0 to remove and 4 not upgraded. Reading package lists... Building dependency tree... Reading state information... The following packages will be REMOVED: cloud-init* 0 upgraded, 0 newly installed, 1 to remove and 4 not upgraded. After this operation, 1,522 kB disk space will be freed. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 93134 files and directories currently installed.) Removing cloud-init (0.7.9-153-g16a7302f-0ubuntu1) ... Removing 'diversion of /etc/init/ureadahead.conf to /etc/init/ureadahead.conf.disabled by cloud-init' (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 92877 files and directories currently installed.) Purging configuration files for cloud-init (0.7.9-153-g16a7302f-0ubuntu1) ... dpkg: warning: while removing cloud-init, directory '/etc/cloud/cloud.cfg.d' not empty so not removed Reading package lists... Building dependency tree... Reading state information... linux-generic is already the newest version (4.10.0.21.23). 0 upgraded, 0 newly installed, 0 to remove and 4 not upgraded. Hit:1 http://ftpmaster.internal/ubuntu artful InRelease Hit:2 http://ftpmaster.internal/ubuntu artful-updates InRelease Hit:3 http://ftpmaster.internal/ubuntu artful-proposed InRelease Reading package lists... Reading package lists... Building dependency tree... Reading state information... Calculating upgrade... The following packages will be upgraded: libpolkit-agent-1-0 libpolkit-backend-1-0 libpolkit-gobject-1-0 policykit-1 4 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Need to get 140 kB of archives. After this operation, 19.5 kB of additional disk space will be used. Get:1 http://ftpmaster.internal/ubuntu artful/main amd64 policykit-1 amd64 0.105-18 [52.4 kB] Get:2 http://ftpmaster.internal/ubuntu artful/main amd64 libpolkit-backend-1-0 amd64 0.105-18 [35.8 kB] Get:3 http://ftpmaster.internal/ubuntu artful/main amd64 libpolkit-agent-1-0 amd64 0.105-18 [14.8 kB] Get:4 http://ftpmaster.internal/ubuntu artful/main amd64 libpolkit-gobject-1-0 amd64 0.105-18 [36.8 kB] Fetched 140 kB in 0s (4,960 kB/s) (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 92843 files and directories currently installed.) Preparing to unpack .../policykit-1_0.105-18_amd64.deb ... Created symlink /run/systemd/system/polkit.service → /dev/null. Unpacking policykit-1 (0.105-18) over (0.105-17) ... Preparing to unpack .../libpolkit-backend-1-0_0.105-18_amd64.deb ... Unpacking libpolkit-backend-1-0:amd64 (0.105-18) over (0.105-17) ... Preparing to unpack .../libpolkit-agent-1-0_0.105-18_amd64.deb ... Unpacking libpolkit-agent-1-0:amd64 (0.105-18) over (0.105-17) ... Preparing to unpack .../libpolkit-gobject-1-0_0.105-18_amd64.deb ... Unpacking libpolkit-gobject-1-0:amd64 (0.105-18) over (0.105-17) ... Processing triggers for libc-bin (2.24-9ubuntu2) ... Processing triggers for man-db (2.7.6.1-2) ... Processing triggers for dbus (1.10.10-1ubuntu2) ... Setting up libpolkit-gobject-1-0:amd64 (0.105-18) ... Setting up libpolkit-agent-1-0:amd64 (0.105-18) ... Setting up libpolkit-backend-1-0:amd64 (0.105-18) ... Setting up policykit-1 (0.105-18) ... Removed /run/systemd/system/polkit.service. polkit.service is a disabled or a static unit not running, not starting it. Processing triggers for libc-bin (2.24-9ubuntu2) ... autopkgtest [16:46:39]: rebooting testbed after setup commands that affected boot Exit request sent. autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... autopkgtest [16:46:58]: testbed running kernel: Linux 4.10.0-21-generic #23-Ubuntu SMP Fri Apr 28 16:14:22 UTC 2017 autopkgtest [16:46:58]: testbed dpkg architecture: amd64 autopkgtest [16:46:59]: @@@@@@@@@@@@@@@@@@@@ apt-source python-boto Get:1 http://ftpmaster.internal/ubuntu artful-proposed/universe python-boto 2.44.0-1ubuntu1 (dsc) [1,886 B] Get:2 http://ftpmaster.internal/ubuntu artful-proposed/universe python-boto 2.44.0-1ubuntu1 (tar) [1,454 kB] Get:3 http://ftpmaster.internal/ubuntu artful-proposed/universe python-boto 2.44.0-1ubuntu1 (diff) [6,506 B] autopkgtest [16:47:02]: testing package python-boto version 2.44.0-1ubuntu1 autopkgtest [16:47:02]: build not needed autopkgtest [16:47:03]: test unit: preparing testbed Reading package lists... Building dependency tree... Reading state information... Correcting dependencies...Starting pkgProblemResolver with broken count: 0 Starting 2 pkgProblemResolver with broken count: 0 Done Done Starting pkgProblemResolver with broken count: 0 Starting 2 pkgProblemResolver with broken count: 0 Done The following additional packages will be installed: libpython-stdlib libpython2.7-minimal libpython2.7-stdlib python python-boto python-chardet python-funcsigs python-httpretty python-minimal python-mock python-nose python-pbr python-pkg-resources python-requests python-six python-urllib3 python2.7 python2.7-minimal Suggested packages: python-doc python-tk python-funcsigs-doc python-mock-doc python-coverage python-nose-doc python-setuptools python-cryptography python-idna python-openssl python-socks python-ntlm python2.7-doc binfmt-support Recommended packages: python-cryptography python-idna python-ipaddress python-openssl The following NEW packages will be installed: libpython-stdlib libpython2.7-minimal libpython2.7-stdlib python python-boto python-chardet python-funcsigs python-httpretty python-minimal python-mock python-nose python-pbr python-pkg-resources python-requests python-six python-urllib3 python2.7 python2.7-minimal 0 upgraded, 18 newly installed, 0 to remove and 0 not upgraded. 1 not fully installed or removed. Need to get 5,346 kB of archives. After this operation, 25.3 MB of additional disk space will be used. Get:1 http://ftpmaster.internal/ubuntu artful/main amd64 libpython2.7-minimal amd64 2.7.13-2 [338 kB] Get:2 http://ftpmaster.internal/ubuntu artful/main amd64 python2.7-minimal amd64 2.7.13-2 [1,327 kB] Get:3 http://ftpmaster.internal/ubuntu artful/main amd64 python-minimal amd64 2.7.13-2 [28.2 kB] Get:4 http://ftpmaster.internal/ubuntu artful/main amd64 libpython2.7-stdlib amd64 2.7.13-2 [1,898 kB] Get:5 http://ftpmaster.internal/ubuntu artful/main amd64 python2.7 amd64 2.7.13-2 [229 kB] Get:6 http://ftpmaster.internal/ubuntu artful/main amd64 libpython-stdlib amd64 2.7.13-2 [7,774 B] Get:7 http://ftpmaster.internal/ubuntu artful/main amd64 python amd64 2.7.13-2 [139 kB] Get:8 http://ftpmaster.internal/ubuntu artful/main amd64 python-six all 1.10.0-4 [10.8 kB] Get:9 http://ftpmaster.internal/ubuntu artful/main amd64 python-urllib3 all 1.19.1-1 [65.9 kB] Get:10 http://ftpmaster.internal/ubuntu artful/main amd64 python-pkg-resources all 33.1.1-1 [127 kB] Get:11 http://ftpmaster.internal/ubuntu artful/main amd64 python-chardet all 2.3.0-2 [96.3 kB] Get:12 http://ftpmaster.internal/ubuntu artful/main amd64 python-requests all 2.12.4-1 [84.2 kB] Get:13 http://ftpmaster.internal/ubuntu artful-proposed/universe amd64 python-boto all 2.44.0-1ubuntu1 [740 kB] Get:14 http://ftpmaster.internal/ubuntu artful/universe amd64 python-nose all 1.3.7-2 [116 kB] Get:15 http://ftpmaster.internal/ubuntu artful/main amd64 python-funcsigs all 1.0.2-3 [13.1 kB] Get:16 http://ftpmaster.internal/ubuntu artful/main amd64 python-pbr all 2.0.0-0ubuntu1 [58.9 kB] Get:17 http://ftpmaster.internal/ubuntu artful/main amd64 python-mock all 2.0.0-3 [47.4 kB] Get:18 http://ftpmaster.internal/ubuntu artful/universe amd64 python-httpretty all 0.8.14-1 [19.5 kB] Fetched 5,346 kB in 0s (14.7 MB/s) Selecting previously unselected package libpython2.7-minimal:amd64. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 92847 files and directories currently installed.) Preparing to unpack .../0-libpython2.7-minimal_2.7.13-2_amd64.deb ... Unpacking libpython2.7-minimal:amd64 (2.7.13-2) ... Selecting previously unselected package python2.7-minimal. Preparing to unpack .../1-python2.7-minimal_2.7.13-2_amd64.deb ... Unpacking python2.7-minimal (2.7.13-2) ... Selecting previously unselected package python-minimal. Preparing to unpack .../2-python-minimal_2.7.13-2_amd64.deb ... Unpacking python-minimal (2.7.13-2) ... Selecting previously unselected package libpython2.7-stdlib:amd64. Preparing to unpack .../3-libpython2.7-stdlib_2.7.13-2_amd64.deb ... Unpacking libpython2.7-stdlib:amd64 (2.7.13-2) ... Selecting previously unselected package python2.7. Preparing to unpack .../4-python2.7_2.7.13-2_amd64.deb ... Unpacking python2.7 (2.7.13-2) ... Selecting previously unselected package libpython-stdlib:amd64. Preparing to unpack .../5-libpython-stdlib_2.7.13-2_amd64.deb ... Unpacking libpython-stdlib:amd64 (2.7.13-2) ... Setting up libpython2.7-minimal:amd64 (2.7.13-2) ... Setting up python2.7-minimal (2.7.13-2) ... Setting up python-minimal (2.7.13-2) ... Selecting previously unselected package python. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 93592 files and directories currently installed.) Preparing to unpack .../00-python_2.7.13-2_amd64.deb ... Unpacking python (2.7.13-2) ... Selecting previously unselected package python-six. Preparing to unpack .../01-python-six_1.10.0-4_all.deb ... Unpacking python-six (1.10.0-4) ... Selecting previously unselected package python-urllib3. Preparing to unpack .../02-python-urllib3_1.19.1-1_all.deb ... Unpacking python-urllib3 (1.19.1-1) ... Selecting previously unselected package python-pkg-resources. Preparing to unpack .../03-python-pkg-resources_33.1.1-1_all.deb ... Unpacking python-pkg-resources (33.1.1-1) ... Selecting previously unselected package python-chardet. Preparing to unpack .../04-python-chardet_2.3.0-2_all.deb ... Unpacking python-chardet (2.3.0-2) ... Selecting previously unselected package python-requests. Preparing to unpack .../05-python-requests_2.12.4-1_all.deb ... Unpacking python-requests (2.12.4-1) ... Selecting previously unselected package python-boto. Preparing to unpack .../06-python-boto_2.44.0-1ubuntu1_all.deb ... Unpacking python-boto (2.44.0-1ubuntu1) ... Selecting previously unselected package python-nose. Preparing to unpack .../07-python-nose_1.3.7-2_all.deb ... Unpacking python-nose (1.3.7-2) ... Selecting previously unselected package python-funcsigs. Preparing to unpack .../08-python-funcsigs_1.0.2-3_all.deb ... Unpacking python-funcsigs (1.0.2-3) ... Selecting previously unselected package python-pbr. Preparing to unpack .../09-python-pbr_2.0.0-0ubuntu1_all.deb ... Unpacking python-pbr (2.0.0-0ubuntu1) ... Selecting previously unselected package python-mock. Preparing to unpack .../10-python-mock_2.0.0-3_all.deb ... Unpacking python-mock (2.0.0-3) ... Selecting previously unselected package python-httpretty. Preparing to unpack .../11-python-httpretty_0.8.14-1_all.deb ... Unpacking python-httpretty (0.8.14-1) ... Processing triggers for mime-support (3.60ubuntu1) ... Processing triggers for man-db (2.7.6.1-2) ... Setting up libpython2.7-stdlib:amd64 (2.7.13-2) ... Setting up python2.7 (2.7.13-2) ... Setting up libpython-stdlib:amd64 (2.7.13-2) ... Setting up python (2.7.13-2) ... Setting up python-pkg-resources (33.1.1-1) ... Setting up python-six (1.10.0-4) ... Setting up python-pbr (2.0.0-0ubuntu1) ... update-alternatives: using /usr/bin/python2-pbr to provide /usr/bin/pbr (pbr) in auto mode Setting up python-funcsigs (1.0.2-3) ... Setting up python-nose (1.3.7-2) ... Setting up python-urllib3 (1.19.1-1) ... Setting up python-chardet (2.3.0-2) ... Setting up python-httpretty (0.8.14-1) ... Setting up python-mock (2.0.0-3) ... Setting up python-requests (2.12.4-1) ... Setting up python-boto (2.44.0-1ubuntu1) ... Setting up autopkgtest-satdep (0) ... (Reading database ... 94476 files and directories currently installed.) Removing autopkgtest-satdep (0) ... autopkgtest [16:47:21]: test unit: [----------------------- ++ home_orig=/home/ubuntu +++ mktemp -d ++ home_temp=/tmp/tmp.qdjY9PrZ4a ++ mkdir -p /tmp/tmp.qdjY9PrZ4a/.ssh ++ touch /tmp/tmp.qdjY9PrZ4a/.ssh/known_hosts ++ export HOME=/tmp/tmp.qdjY9PrZ4a ++ HOME=/tmp/tmp.qdjY9PrZ4a ++ set -eu ++ cp -r tests /tmp/autopkgtest.JJMfC2/autopkgtest_tmp/ ++ cd /tmp/autopkgtest.JJMfC2/autopkgtest_tmp +++ pyversions -i ++ for python in $(pyversions -i) ++ python2.7 tests/test.py unit ..................................EE...EEEEEFFEEE.E.EEEEEE.EEEE.EE.........EEEEE....EEEEEEEEEEEEEEEEEEEEEEE..ES.EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE.EEEEEEEEEEEEE..ES..EEEEEEEEEEEEEEEEEEEEEEEE...EEEEEE............S...S............................................................................................................................EEEEEEE.EEEEEEEEEEEEEEEEEE........................................EEEEEE...EEEEEEEEEEEEEEEEEEEEEEEEEEE.E.EE.EE.EEEEEEEEEEE..E..EEEEEEEEE.E..E...........E..EEEE...................................EE............EEEEEEEEE.........................S..............................EEEEEEEEEEEEEEE.EEEEEEEEEEEEEEEEEEEEEEEE.EEESEEEEEEEE...........................................EEEEEEEEEEEEEEEEEEE.EEEEEEEEEEFFFFE..EE.EEEEEEEEE...FFE...........E....EEEEEE.E..............EEEEEEEEEEEEEEEEE.E.......................EEEEEEE.EEEEEEEEEEEEEE.E.EE.......EEEE.........................................................SSEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE.EEEEEEEEEEEEEE....................................... ====================================================================== ERROR: test_upload_function_binary (tests.unit.awslambda.test_awslambda.TestAWSLambda) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/awslambda/test_awslambda.py", line 48, in test_upload_function_binary runtime='nodejs' File "/usr/lib/python2.7/dist-packages/boto/awslambda/layer1.py", line 501, in upload_function params=query_params) File "/usr/lib/python2.7/dist-packages/boto/awslambda/layer1.py", line 517, in make_request raise error_class(response.status, response.reason, body) JSONResponseError: JSONResponseError: 403 Forbidden {u'message': u'The security token included in the request is invalid.'} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: PUT boto: DEBUG: Path: https://lambda.us-east-1.amazonaws.com/2014-11-13/functions/my-function boto: DEBUG: Data: This is my file boto: DEBUG: Headers: {'Content-Length': '15'} boto: DEBUG: Host: lambda.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Handler': 'myhandler', 'Role': 'myrole', 'Mode': 'event', 'Runtime': 'nodejs'} boto: DEBUG: establishing HTTPS connection: host=lambda.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT lambda.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=lambda.us-east-1.amazonaws.com, certificate hosts=['prod-04-2014-elb-1276263184.us-east-1.elb.amazonaws.com', 'lambda.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: PUT /2014-11-13/functions/my-function Handler=myhandler&Mode=event&Role=myrole&Runtime=nodejs host:lambda.us-east-1.amazonaws.com x-amz-date:20170531T164724Z host;x-amz-date 30f4725b8bf4ada057ab4cb1a13f48c5d5beb891a080d989b9d63104dfbc58fd boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164724Z 20170531/us-east-1/lambda/aws4_request 690361ed416fbe202814b135abfa38cb9d0ed515bbc13daa7f8c7dc320481a09 boto: DEBUG: Signature: 0e28f1c7c93f3feec01c8138147ce3cbdf128bdc09c024eaa588495a9f775bf6 boto: DEBUG: Final headers: {'Content-Length': '15', 'Host': 'lambda.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/lambda/aws4_request,SignedHeaders=host;x-amz-date,Signature=0e28f1c7c93f3feec01c8138147ce3cbdf128bdc09c024eaa588495a9f775bf6', 'X-Amz-Date': '20170531T164724Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd268f10c-4620-11e7-aef7-114d73ba2f08'), ('content-length', '68'), ('connection', 'keep-alive'), ('date', 'Wed, 31 May 2017 16:47:23 GMT'), ('content-type', 'application/json'), ('x-amzn-errortype', 'UnrecognizedClientException')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_upload_function_file (tests.unit.awslambda.test_awslambda.TestAWSLambda) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/awslambda/test_awslambda.py", line 80, in test_upload_function_file runtime='nodejs' File "/usr/lib/python2.7/dist-packages/boto/awslambda/layer1.py", line 501, in upload_function params=query_params) File "/usr/lib/python2.7/dist-packages/boto/awslambda/layer1.py", line 517, in make_request raise error_class(response.status, response.reason, body) JSONResponseError: JSONResponseError: 403 Forbidden {u'message': u'The security token included in the request is invalid.'} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: PUT boto: DEBUG: Path: https://lambda.us-east-1.amazonaws.com/2014-11-13/functions/my-function boto: DEBUG: Data: boto: DEBUG: Headers: {'Content-Length': '15'} boto: DEBUG: Host: lambda.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Handler': 'myhandler', 'Role': 'myrole', 'Mode': 'event', 'Runtime': 'nodejs'} boto: DEBUG: establishing HTTPS connection: host=lambda.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT lambda.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=lambda.us-east-1.amazonaws.com, certificate hosts=['prod-04-2014-elb-1276263184.us-east-1.elb.amazonaws.com', 'lambda.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: PUT /2014-11-13/functions/my-function Handler=myhandler&Mode=event&Role=myrole&Runtime=nodejs host:lambda.us-east-1.amazonaws.com x-amz-date:20170531T164724Z host;x-amz-date 30f4725b8bf4ada057ab4cb1a13f48c5d5beb891a080d989b9d63104dfbc58fd boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164724Z 20170531/us-east-1/lambda/aws4_request 690361ed416fbe202814b135abfa38cb9d0ed515bbc13daa7f8c7dc320481a09 boto: DEBUG: Signature: 0e28f1c7c93f3feec01c8138147ce3cbdf128bdc09c024eaa588495a9f775bf6 boto: DEBUG: Final headers: {'Content-Length': '15', 'Host': 'lambda.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/lambda/aws4_request,SignedHeaders=host;x-amz-date,Signature=0e28f1c7c93f3feec01c8138147ce3cbdf128bdc09c024eaa588495a9f775bf6', 'X-Amz-Date': '20170531T164724Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd2a22a17-4620-11e7-805b-edb87b6d4da6'), ('content-length', '68'), ('connection', 'keep-alive'), ('date', 'Wed, 31 May 2017 16:47:24 GMT'), ('content-type', 'application/json'), ('x-amzn-errortype', 'UnrecognizedClientException')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_application_version (tests.unit.beanstalk.test_layer1.TestCreateApplicationVersion) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/beanstalk/test_layer1.py", line 71, in test_create_application_version auto_create_application=True) File "/usr/lib/python2.7/dist-packages/boto/beanstalk/layer1.py", line 156, in create_application_version return self._get_response('CreateApplicationVersion', params) File "/usr/lib/python2.7/dist-packages/boto/beanstalk/layer1.py", line 71, in _get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d2debd8c-4620-11e7-b2f3-e1db3e14d06c"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://elasticbeanstalk.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: elasticbeanstalk.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'ApplicationName': 'application1', 'SourceBundle.S3Key': 'mykey', 'VersionLabel': 'version1', 'Version': '2010-12-01', 'ContentType': 'JSON', 'AutoCreateApplication': 'true', 'Action': 'CreateApplicationVersion', 'SourceBundle.S3Bucket': 'mybucket'} boto: DEBUG: establishing HTTPS connection: host=elasticbeanstalk.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT elasticbeanstalk.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=elasticbeanstalk.us-east-1.amazonaws.com, certificate hosts=['elasticbeanstalk.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateApplicationVersion&ApplicationName=application1&AutoCreateApplication=true&ContentType=JSON&SourceBundle.S3Bucket=mybucket&SourceBundle.S3Key=mykey&Version=2010-12-01&VersionLabel=version1 host:elasticbeanstalk.us-east-1.amazonaws.com x-amz-date:20170531T164724Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164724Z 20170531/us-east-1/elasticbeanstalk/aws4_request cfa52df237ec2ad4edac8b30ee59820ca7ab1a11bcd7c4a806d0494ce095e0ac boto: DEBUG: Signature: db4486e9562b8fedda203763cf2938c54f085cd0c5021933026cc90fad7447ed boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'elasticbeanstalk.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/elasticbeanstalk/aws4_request,SignedHeaders=host;x-amz-date,Signature=db4486e9562b8fedda203763cf2938c54f085cd0c5021933026cc90fad7447ed', 'X-Amz-Date': '20170531T164724Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('date', 'Wed, 31 May 2017 16:47:24 GMT'), ('x-amzn-requestid', 'd2debd8c-4620-11e7-b2f3-e1db3e14d06c'), ('content-length', '175'), ('content-type', 'application/json'), ('connection', 'keep-alive')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d2debd8c-4620-11e7-b2f3-e1db3e14d06c"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_environment (tests.unit.beanstalk.test_layer1.TestCreateEnvironment) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/beanstalk/test_layer1.py", line 104, in test_create_environment 'VALUE1')]) File "/usr/lib/python2.7/dist-packages/boto/beanstalk/layer1.py", line 357, in create_environment return self._get_response('CreateEnvironment', params) File "/usr/lib/python2.7/dist-packages/boto/beanstalk/layer1.py", line 71, in _get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d316e406-4620-11e7-b42c-b1d698dd98ed"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://elasticbeanstalk.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: elasticbeanstalk.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'ApplicationName': 'application1', 'EnvironmentName': 'environment1', 'VersionLabel': 'version1', 'OptionSettings.member.1.Value': 'mykeypair', 'ContentType': 'JSON', 'OptionSettings.member.2.OptionName': 'ENVVAR', 'OptionSettings.member.1.OptionName': 'Ec2KeyName', 'OptionSettings.member.1.Namespace': 'aws:autoscaling:launchconfiguration', 'TemplateName': '32bit Amazon Linux running Tomcat 7', 'Version': '2010-12-01', 'Action': 'CreateEnvironment', 'OptionSettings.member.2.Namespace': 'aws:elasticbeanstalk:application:environment', 'OptionSettings.member.2.Value': 'VALUE1'} boto: DEBUG: establishing HTTPS connection: host=elasticbeanstalk.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT elasticbeanstalk.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=elasticbeanstalk.us-east-1.amazonaws.com, certificate hosts=['elasticbeanstalk.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateEnvironment&ApplicationName=application1&ContentType=JSON&EnvironmentName=environment1&OptionSettings.member.1.Namespace=aws%3Aautoscaling%3Alaunchconfiguration&OptionSettings.member.1.OptionName=Ec2KeyName&OptionSettings.member.1.Value=mykeypair&OptionSettings.member.2.Namespace=aws%3Aelasticbeanstalk%3Aapplication%3Aenvironment&OptionSettings.member.2.OptionName=ENVVAR&OptionSettings.member.2.Value=VALUE1&TemplateName=32bit%20Amazon%20Linux%20running%20Tomcat%207&Version=2010-12-01&VersionLabel=version1 host:elasticbeanstalk.us-east-1.amazonaws.com x-amz-date:20170531T164725Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164725Z 20170531/us-east-1/elasticbeanstalk/aws4_request eaef481063370512ab1b235fbd4048ee4f6e939f255b8e4de9bc371a88245c83 boto: DEBUG: Signature: af6a4e33ee2b185c40ca479dee6eae31ea1daf250dcaaa768a75d378520952be boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'elasticbeanstalk.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/elasticbeanstalk/aws4_request,SignedHeaders=host;x-amz-date,Signature=af6a4e33ee2b185c40ca479dee6eae31ea1daf250dcaaa768a75d378520952be', 'X-Amz-Date': '20170531T164725Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('date', 'Wed, 31 May 2017 16:47:25 GMT'), ('x-amzn-requestid', 'd316e406-4620-11e7-b42c-b1d698dd98ed'), ('content-length', '175'), ('content-type', 'application/json'), ('connection', 'keep-alive')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d316e406-4620-11e7-b42c-b1d698dd98ed"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_environment_with_tier (tests.unit.beanstalk.test_layer1.TestCreateEnvironment) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/beanstalk/test_layer1.py", line 131, in test_create_environment_with_tier tier_name='Worker', tier_type='SQS/HTTP', tier_version='1.0') File "/usr/lib/python2.7/dist-packages/boto/beanstalk/layer1.py", line 357, in create_environment return self._get_response('CreateEnvironment', params) File "/usr/lib/python2.7/dist-packages/boto/beanstalk/layer1.py", line 71, in _get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d34df9c6-4620-11e7-8041-4384b9ee4562"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://elasticbeanstalk.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: elasticbeanstalk.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'ApplicationName': 'application1', 'EnvironmentName': 'environment1', 'VersionLabel': 'version1', 'OptionSettings.member.1.Value': 'mykeypair', 'ContentType': 'JSON', 'OptionSettings.member.2.OptionName': 'ENVVAR', 'Tier.Name': 'Worker', 'OptionSettings.member.1.OptionName': 'Ec2KeyName', 'Version': '2010-12-01', 'OptionSettings.member.1.Namespace': 'aws:autoscaling:launchconfiguration', 'TemplateName': '32bit Amazon Linux running Tomcat 7', 'Tier.Type': 'SQS/HTTP', 'Action': 'CreateEnvironment', 'OptionSettings.member.2.Namespace': 'aws:elasticbeanstalk:application:environment', 'OptionSettings.member.2.Value': 'VALUE1', 'Tier.Version': '1.0'} boto: DEBUG: establishing HTTPS connection: host=elasticbeanstalk.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT elasticbeanstalk.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=elasticbeanstalk.us-east-1.amazonaws.com, certificate hosts=['elasticbeanstalk.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateEnvironment&ApplicationName=application1&ContentType=JSON&EnvironmentName=environment1&OptionSettings.member.1.Namespace=aws%3Aautoscaling%3Alaunchconfiguration&OptionSettings.member.1.OptionName=Ec2KeyName&OptionSettings.member.1.Value=mykeypair&OptionSettings.member.2.Namespace=aws%3Aelasticbeanstalk%3Aapplication%3Aenvironment&OptionSettings.member.2.OptionName=ENVVAR&OptionSettings.member.2.Value=VALUE1&TemplateName=32bit%20Amazon%20Linux%20running%20Tomcat%207&Tier.Name=Worker&Tier.Type=SQS%2FHTTP&Tier.Version=1.0&Version=2010-12-01&VersionLabel=version1 host:elasticbeanstalk.us-east-1.amazonaws.com x-amz-date:20170531T164725Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164725Z 20170531/us-east-1/elasticbeanstalk/aws4_request ba3c8e966a780fedffea2c1661c0417d3750cc35a37b0b3edf81ef4b801c6ca8 boto: DEBUG: Signature: ac2b6eab309eab36810586fd9aaba1a10e710d050dc2a81c1e057539c08edc25 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'elasticbeanstalk.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/elasticbeanstalk/aws4_request,SignedHeaders=host;x-amz-date,Signature=ac2b6eab309eab36810586fd9aaba1a10e710d050dc2a81c1e057539c08edc25', 'X-Amz-Date': '20170531T164725Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('date', 'Wed, 31 May 2017 16:47:25 GMT'), ('x-amzn-requestid', 'd34df9c6-4620-11e7-8041-4384b9ee4562'), ('content-length', '175'), ('content-type', 'application/json'), ('connection', 'keep-alive')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d34df9c6-4620-11e7-8041-4384b9ee4562"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_list_available_solution_stacks (tests.unit.beanstalk.test_layer1.TestListAvailableSolutionStacks) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/beanstalk/test_layer1.py", line 32, in test_list_available_solution_stacks api_response = self.service_connection.list_available_solution_stacks() File "/usr/lib/python2.7/dist-packages/boto/beanstalk/layer1.py", line 756, in list_available_solution_stacks return self._get_response('ListAvailableSolutionStacks', params={}) File "/usr/lib/python2.7/dist-packages/boto/beanstalk/layer1.py", line 71, in _get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d384c116-4620-11e7-b42c-b1d698dd98ed"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://elasticbeanstalk.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: elasticbeanstalk.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ListAvailableSolutionStacks', 'Version': '2010-12-01', 'ContentType': 'JSON'} boto: DEBUG: establishing HTTPS connection: host=elasticbeanstalk.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT elasticbeanstalk.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=elasticbeanstalk.us-east-1.amazonaws.com, certificate hosts=['elasticbeanstalk.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=ListAvailableSolutionStacks&ContentType=JSON&Version=2010-12-01 host:elasticbeanstalk.us-east-1.amazonaws.com x-amz-date:20170531T164725Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164725Z 20170531/us-east-1/elasticbeanstalk/aws4_request 4a9c9df12798e273c12fc8de4446acd266d51dde50f889f0c0b59d56dcd1998f boto: DEBUG: Signature: 9e5884854ca6bc521aa1c5dcf00163f310b4d15b11c2ea82bfb8d6306ddeb8d0 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'elasticbeanstalk.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/elasticbeanstalk/aws4_request,SignedHeaders=host;x-amz-date,Signature=9e5884854ca6bc521aa1c5dcf00163f310b4d15b11c2ea82bfb8d6306ddeb8d0', 'X-Amz-Date': '20170531T164725Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('date', 'Wed, 31 May 2017 16:47:25 GMT'), ('x-amzn-requestid', 'd384c116-4620-11e7-b42c-b1d698dd98ed'), ('content-length', '175'), ('content-type', 'application/json'), ('connection', 'keep-alive')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d384c116-4620-11e7-b42c-b1d698dd98ed"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cancel_update_stack (tests.unit.cloudformation.test_connection.TestCloudFormationCancelUpdateStack) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 639, in test_cancel_update_stack api_response = self.service_connection.cancel_update_stack('stack_name') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 826, in cancel_update_stack return self.get_status('CancelUpdateStack', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. d3cbdcbb-4620-11e7-a970-7788f3bc41d2 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'StackName': 'stack_name', 'Action': 'CancelUpdateStack', 'Version': '2010-05-15'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CancelUpdateStack&StackName=stack_name&Version=2010-05-15 host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164726Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164726Z 20170531/us-east-1/cloudformation/aws4_request 2ce8f6f42890ad2ab5ddc3f26b1e42ca955ef0a6454b552823835584f5c27a41 boto: DEBUG: Signature: f2a77ecaa2135e6fb89ee230b33ddd4418b0dc295fe1620efd283430f24e70d8 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=f2a77ecaa2135e6fb89ee230b33ddd4418b0dc295fe1620efd283430f24e70d8', 'X-Amz-Date': '20170531T164726Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd3cbdcbb-4620-11e7-a970-7788f3bc41d2'), ('date', 'Wed, 31 May 2017 16:47:25 GMT'), ('content-length', '316'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. d3cbdcbb-4620-11e7-a970-7788f3bc41d2 boto: ERROR: 403 Forbidden boto: ERROR: Sender InvalidClientTokenId The security token included in the request is invalid. d3cbdcbb-4620-11e7-a970-7788f3bc41d2 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_stack_has_correct_request_params (tests.unit.cloudformation.test_connection.TestCloudFormationCreateStack) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 63, in test_create_stack_has_correct_request_params timeout_in_minutes=20, capabilities=['CAPABILITY_IAM'] File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 403, in create_stack body = self._do_request('CreateStack', params, '/', 'POST') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 304, in _do_request raise self.ResponseError(response.status, response.reason, body=body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d474edeb-4620-11e7-8af8-dbac77a90090"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: WARNING: If both TemplateBody and TemplateURL are specified, only TemplateBody will be honored by the API boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'StackName': 'stack_name', 'ContentType': 'JSON', 'Parameters.member.1.ParameterKey': 'KeyName', 'TemplateBody': '\n{\n "AWSTemplateFormatVersion" : "2010-09-09",\n "Description" : "Sample template",\n "Parameters" : {\n "KeyName" : {\n "Description" : "key pair",\n "Type" : "String"\n }\n },\n "Resources" : {\n "Ec2Instance" : {\n "Type" : "AWS::EC2::Instance",\n "Properties" : {\n "KeyName" : { "Ref" : "KeyName" },\n "ImageId" : "ami-7f418316",\n "UserData" : { "Fn::Base64" : "80" }\n }\n }\n },\n "Outputs" : {\n "InstanceId" : {\n "Description" : "InstanceId of the newly created EC2 instance",\n "Value" : { "Ref" : "Ec2Instance" }\n }\n}\n', 'Version': '2010-05-15', 'TimeoutInMinutes': 20, 'Tags.member.1.Key': 'TagKey', 'Action': 'CreateStack', 'Parameters.member.1.ParameterValue': 'myKeyName', 'DisableRollback': 'true', 'Capabilities.member.1': 'CAPABILITY_IAM', 'NotificationARNs.member.1': 'arn:notify1', 'TemplateURL': 'http://url', 'Tags.member.1.Value': 'TagValue', 'NotificationARNs.member.2': 'arn:notify2'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164727Z host;x-amz-date 7206eb5e20919557ae6731b1dbeb46e7c5069bd2a491d62bf96642ff867e1a04 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164727Z 20170531/us-east-1/cloudformation/aws4_request 911cefd36dad731e008e09313e898b47df18dd7c131275292c4239fbe1069408 boto: DEBUG: Signature: 8b2093bafd84868676af6eb4df89def016c4d9f1fbb4abfcf08105742a57607f boto: DEBUG: Final headers: {'Content-Length': '1607', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164727Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=8b2093bafd84868676af6eb4df89def016c4d9f1fbb4abfcf08105742a57607f'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd474edeb-4620-11e7-8af8-dbac77a90090'), ('date', 'Wed, 31 May 2017 16:47:27 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: ERROR: 403 Forbidden boto: ERROR: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d474edeb-4620-11e7-8af8-dbac77a90090"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_stack_with_minimum_args (tests.unit.cloudformation.test_connection.TestCloudFormationCreateStack) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 94, in test_create_stack_with_minimum_args api_response = self.service_connection.create_stack('stack_name') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 403, in create_stack body = self._do_request('CreateStack', params, '/', 'POST') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 304, in _do_request raise self.ResponseError(response.status, response.reason, body=body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d4b097c8-4620-11e7-936b-bb601000c04e"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'StackName': 'stack_name', 'Action': 'CreateStack', 'Version': '2010-05-15', 'ContentType': 'JSON', 'DisableRollback': 'false'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164727Z host;x-amz-date 92f874e2c8b95515205debfd3ac173bab0694967c43f75c87b97cba02577e6bf boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164727Z 20170531/us-east-1/cloudformation/aws4_request 631ccf2656e5202b2ad3bb9340b38b0ec0f9184205f4bc7d8af7527b6f94cc3a boto: DEBUG: Signature: d09eb3e767f9d6ca980643ca4db569cbd4531ca7128b853ae07508a628e2d35b boto: DEBUG: Final headers: {'Content-Length': '97', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164727Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=d09eb3e767f9d6ca980643ca4db569cbd4531ca7128b853ae07508a628e2d35b'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd4b097c8-4620-11e7-936b-bb601000c04e'), ('date', 'Wed, 31 May 2017 16:47:27 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: ERROR: 403 Forbidden boto: ERROR: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d4b097c8-4620-11e7-936b-bb601000c04e"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_stack (tests.unit.cloudformation.test_connection.TestCloudFormationDeleteStack) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 201, in test_delete_stack api_response = self.service_connection.delete_stack('stack_name') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 553, in delete_stack return self._do_request('DeleteStack', params, '/', 'GET') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 304, in _do_request raise self.ResponseError(response.status, response.reason, body=body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d4e7ac8f-4620-11e7-b68f-db8e408d0bb0"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'StackName': 'stack_name', 'Action': 'DeleteStack', 'Version': '2010-05-15', 'ContentType': 'JSON'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DeleteStack&ContentType=JSON&StackName=stack_name&Version=2010-05-15 host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164728Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164728Z 20170531/us-east-1/cloudformation/aws4_request d93880c310d0a3c9ffdfc8b0b8347ce16650e7a74965bf657c4fa3e0c24294c1 boto: DEBUG: Signature: 127391df1a873a3ff4eb6e8b4d730984655d45753874cc3a49d4d714417c4ad8 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=127391df1a873a3ff4eb6e8b4d730984655d45753874cc3a49d4d714417c4ad8', 'X-Amz-Date': '20170531T164728Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd4e7ac8f-4620-11e7-b68f-db8e408d0bb0'), ('date', 'Wed, 31 May 2017 16:47:27 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: ERROR: 403 Forbidden boto: ERROR: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d4e7ac8f-4620-11e7-b68f-db8e408d0bb0"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe_stack_resource (tests.unit.cloudformation.test_connection.TestCloudFormationDescribeStackResource) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 223, in test_describe_stack_resource 'stack_name', 'resource_id') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 604, in describe_stack_resource return self._do_request('DescribeStackResource', params, '/', 'GET') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 304, in _do_request raise self.ResponseError(response.status, response.reason, body=body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d5553bae-4620-11e7-bca5-6b4a7bdd6741"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'StackName': 'stack_name', 'Action': 'DescribeStackResource', 'Version': '2010-05-15', 'ContentType': 'JSON', 'LogicalResourceId': 'resource_id'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeStackResource&ContentType=JSON&LogicalResourceId=resource_id&StackName=stack_name&Version=2010-05-15 host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164728Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164728Z 20170531/us-east-1/cloudformation/aws4_request dbd7bbb415904b121794108bc8c7fe1e41f01fb2cdc8e046d0a992ebe09e2205 boto: DEBUG: Signature: d436cfc272588d42a6fd06438f4ad91157da0486e165339418147fad68678697 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=d436cfc272588d42a6fd06438f4ad91157da0486e165339418147fad68678697', 'X-Amz-Date': '20170531T164728Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd5553bae-4620-11e7-bca5-6b4a7bdd6741'), ('date', 'Wed, 31 May 2017 16:47:29 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: ERROR: 403 Forbidden boto: ERROR: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d5553bae-4620-11e7-bca5-6b4a7bdd6741"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe_stack_resources (tests.unit.cloudformation.test_connection.TestCloudFormationDescribeStackResources) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 355, in test_describe_stack_resources 'stack_name', 'logical_resource_id', 'physical_resource_id') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 667, in describe_stack_resources [('member', StackResource)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. d5cbcb1a-4620-11e7-8cae-974cf9846228 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'StackName': 'stack_name', 'Action': 'DescribeStackResources', 'PhysicalResourceId': 'physical_resource_id', 'Version': '2010-05-15', 'LogicalResourceId': 'logical_resource_id'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeStackResources&LogicalResourceId=logical_resource_id&PhysicalResourceId=physical_resource_id&StackName=stack_name&Version=2010-05-15 host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164729Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164729Z 20170531/us-east-1/cloudformation/aws4_request 53fe4f9b87b1d6120ff41586e98696c00bcb2033bd1aac99dd788973709fc35d boto: DEBUG: Signature: 599dc7cbb00e9d63b1eccce05c9df220209b49ad83ccd34d87f6e0de6fc70412 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=599dc7cbb00e9d63b1eccce05c9df220209b49ad83ccd34d87f6e0de6fc70412', 'X-Amz-Date': '20170531T164729Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd5cbcb1a-4620-11e7-8cae-974cf9846228'), ('date', 'Wed, 31 May 2017 16:47:29 GMT'), ('content-length', '316'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. d5cbcb1a-4620-11e7-8cae-974cf9846228 boto: ERROR: 403 Forbidden boto: ERROR: Sender InvalidClientTokenId The security token included in the request is invalid. d5cbcb1a-4620-11e7-8cae-974cf9846228 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe_stacks (tests.unit.cloudformation.test_connection.TestCloudFormationDescribeStacks) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 436, in test_describe_stacks stacks = self.service_connection.describe_stacks('MyStack') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 690, in describe_stacks return self.get_list('DescribeStacks', params, [('member', Stack)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. d60ccb80-4620-11e7-b7b8-3399c4a134fe -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'StackName': 'MyStack', 'Action': 'DescribeStacks', 'Version': '2010-05-15'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeStacks&StackName=MyStack&Version=2010-05-15 host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164730Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164730Z 20170531/us-east-1/cloudformation/aws4_request c3061791fc5db2428bbd5c5001abf46f2409bddd5954bb2374688cd25bd018da boto: DEBUG: Signature: 3435d161bd3d34df8a0c1b86bfdf5441a008ecc0672f56be34d442348b46b264 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=3435d161bd3d34df8a0c1b86bfdf5441a008ecc0672f56be34d442348b46b264', 'X-Amz-Date': '20170531T164730Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd60ccb80-4620-11e7-b7b8-3399c4a134fe'), ('date', 'Wed, 31 May 2017 16:47:30 GMT'), ('content-length', '316'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. d60ccb80-4620-11e7-b7b8-3399c4a134fe boto: ERROR: 403 Forbidden boto: ERROR: Sender InvalidClientTokenId The security token included in the request is invalid. d60ccb80-4620-11e7-b7b8-3399c4a134fe --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_estimate_template_cost (tests.unit.cloudformation.test_connection.TestCloudFormationEstimateTemplateCost) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 663, in test_estimate_template_cost template_body='{}') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 868, in estimate_template_cost response = self._do_request('EstimateTemplateCost', params, '/', 'POST') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 304, in _do_request raise self.ResponseError(response.status, response.reason, body=body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d6478b20-4620-11e7-afa3-11863db3a692"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'EstimateTemplateCost', 'Version': '2010-05-15', 'ContentType': 'JSON', 'TemplateBody': '{}'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164730Z host;x-amz-date 7ca79625ba997ff557b15a7fa21018352218dba13c48211cd7f13f2f55bf44fa boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164730Z 20170531/us-east-1/cloudformation/aws4_request 0271cbca1d4337b309bb5b379669a44f52cb45cdb70416feba1d789366112780 boto: DEBUG: Signature: 10d0ea04bda258fd6742cf65ccd67d970718aa62f053297059a38a074003ed2f boto: DEBUG: Final headers: {'Content-Length': '83', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164730Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=10d0ea04bda258fd6742cf65ccd67d970718aa62f053297059a38a074003ed2f'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd6478b20-4620-11e7-afa3-11863db3a692'), ('date', 'Wed, 31 May 2017 16:47:30 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: ERROR: 403 Forbidden boto: ERROR: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d6478b20-4620-11e7-afa3-11863db3a692"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_stack_policy (tests.unit.cloudformation.test_connection.TestCloudFormationGetStackPolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 688, in test_get_stack_policy api_response = self.service_connection.get_stack_policy('stack-id') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 886, in get_stack_policy response = self._do_request('GetStackPolicy', params, '/', 'POST') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 304, in _do_request raise self.ResponseError(response.status, response.reason, body=body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d67e2ae1-4620-11e7-81ba-690727eca1d3"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'StackName': 'stack-id', 'Action': 'GetStackPolicy', 'Version': '2010-05-15', 'ContentType': 'JSON'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164730Z host;x-amz-date bab0c63d4487d086662ab759de06e7a990d5f7dd67eb7973755172e7205eae27 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164730Z 20170531/us-east-1/cloudformation/aws4_request dd435dc95e989263b734bd5896c2fb89f91687549f5fdf23bbba3a17b186d6b9 boto: DEBUG: Signature: 418c6bde698b6277aab4c9eed788930b60bc3df6e6eb1375a2021d2612546b32 boto: DEBUG: Final headers: {'Content-Length': '76', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164730Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=418c6bde698b6277aab4c9eed788930b60bc3df6e6eb1375a2021d2612546b32'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd67e2ae1-4620-11e7-81ba-690727eca1d3'), ('date', 'Wed, 31 May 2017 16:47:30 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: ERROR: 403 Forbidden boto: ERROR: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d67e2ae1-4620-11e7-81ba-690727eca1d3"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe_stack_events (tests.unit.cloudformation.test_connection.TestCloudFormationGetStackevents) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 294, in test_describe_stack_events first, second = self.service_connection.describe_stack_events('stack_name', next_token='next_token') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 580, in describe_stack_events StackEvent)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. d6b986f5-4620-11e7-ad55-39755716e7a2 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'StackName': 'stack_name', 'Action': 'DescribeStackEvents', 'NextToken': 'next_token', 'Version': '2010-05-15'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeStackEvents&NextToken=next_token&StackName=stack_name&Version=2010-05-15 host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164731Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164731Z 20170531/us-east-1/cloudformation/aws4_request 53021831ede4074e1b80fdaf788f1dce7d07dedd6c8af48a6a63d543e8ceba0b boto: DEBUG: Signature: 9b1f6e4368de0d3571bd68cde4745443bf8f0488ccdde4ace704fa625188a5b5 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=9b1f6e4368de0d3571bd68cde4745443bf8f0488ccdde4ace704fa625188a5b5', 'X-Amz-Date': '20170531T164731Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd6b986f5-4620-11e7-ad55-39755716e7a2'), ('date', 'Wed, 31 May 2017 16:47:31 GMT'), ('content-length', '316'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. d6b986f5-4620-11e7-ad55-39755716e7a2 boto: ERROR: 403 Forbidden boto: ERROR: Sender InvalidClientTokenId The security token included in the request is invalid. d6b986f5-4620-11e7-ad55-39755716e7a2 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_template (tests.unit.cloudformation.test_connection.TestCloudFormationGetTemplate) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 246, in test_get_template api_response = self.service_connection.get_template('stack_name') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 715, in get_template return self._do_request('GetTemplate', params, '/', 'GET') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 304, in _do_request raise self.ResponseError(response.status, response.reason, body=body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d6f52fb5-4620-11e7-806a-892136591403"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'StackName': 'stack_name', 'Action': 'GetTemplate', 'Version': '2010-05-15', 'ContentType': 'JSON'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=GetTemplate&ContentType=JSON&StackName=stack_name&Version=2010-05-15 host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164731Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164731Z 20170531/us-east-1/cloudformation/aws4_request 93796bf9c959d5f90a0234134c10eab5863e18636488f048adf171f3836f8ec2 boto: DEBUG: Signature: 279bbdb32ad9e346c2dab334c363a5e67efb04540e581125e05a71cca2cba8a9 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=279bbdb32ad9e346c2dab334c363a5e67efb04540e581125e05a71cca2cba8a9', 'X-Amz-Date': '20170531T164731Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd6f52fb5-4620-11e7-806a-892136591403'), ('date', 'Wed, 31 May 2017 16:47:30 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: ERROR: 403 Forbidden boto: ERROR: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d6f52fb5-4620-11e7-806a-892136591403"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_list_stack_resources (tests.unit.cloudformation.test_connection.TestCloudFormationListStackResources) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 507, in test_list_stack_resources next_token='next_token') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 746, in list_stack_resources [('member', StackResourceSummary)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. d765575d-4620-11e7-b916-831d0eaf1924 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'StackName': 'MyStack', 'Action': 'ListStackResources', 'NextToken': 'next_token', 'Version': '2010-05-15'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=ListStackResources&NextToken=next_token&StackName=MyStack&Version=2010-05-15 host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164732Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164732Z 20170531/us-east-1/cloudformation/aws4_request 2acaf6e1c0ab09d178e707da035ff325f9c0ccefd6fcc0f08bc72f9292e6b310 boto: DEBUG: Signature: b18eda7ece6169deac92254a63e7aa076dbdd309de572a0c6bd2525461dd3d1d boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=b18eda7ece6169deac92254a63e7aa076dbdd309de572a0c6bd2525461dd3d1d', 'X-Amz-Date': '20170531T164732Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd765575d-4620-11e7-b916-831d0eaf1924'), ('date', 'Wed, 31 May 2017 16:47:32 GMT'), ('content-length', '316'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. d765575d-4620-11e7-b916-831d0eaf1924 boto: ERROR: 403 Forbidden boto: ERROR: Sender InvalidClientTokenId The security token included in the request is invalid. d765575d-4620-11e7-b916-831d0eaf1924 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_list_stacks (tests.unit.cloudformation.test_connection.TestCloudFormationListStacks) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 554, in test_list_stacks next_token='next_token') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 777, in list_stacks [('member', StackSummary)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. d79910de-4620-11e7-822d-37540f984fce -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ListStacks', 'StackStatusFilter.member.1': 'CREATE_IN_PROGRESS', 'NextToken': 'next_token', 'Version': '2010-05-15'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=ListStacks&NextToken=next_token&StackStatusFilter.member.1=CREATE_IN_PROGRESS&Version=2010-05-15 host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164732Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164732Z 20170531/us-east-1/cloudformation/aws4_request 01a14e55dee12bb604bf9ea10423ad7374c531e9b685105b16473e8c332b2f3b boto: DEBUG: Signature: 3cc7ebd428e92f5ed29101daf60cb4b8dd078491f720c32aeb0cd1130388fa6d boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=3cc7ebd428e92f5ed29101daf60cb4b8dd078491f720c32aeb0cd1130388fa6d', 'X-Amz-Date': '20170531T164732Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd79910de-4620-11e7-822d-37540f984fce'), ('date', 'Wed, 31 May 2017 16:47:32 GMT'), ('content-length', '316'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. d79910de-4620-11e7-822d-37540f984fce boto: ERROR: 403 Forbidden boto: ERROR: Sender InvalidClientTokenId The security token included in the request is invalid. d79910de-4620-11e7-822d-37540f984fce --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_set_stack_policy (tests.unit.cloudformation.test_connection.TestCloudFormationSetStackPolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 713, in test_set_stack_policy stack_policy_body='{}') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 921, in set_stack_policy response = self._do_request('SetStackPolicy', params, '/', 'POST') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 304, in _do_request raise self.ResponseError(response.status, response.reason, body=body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d7d3342b-4620-11e7-a29d-ad5c86dea6db"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'StackName': 'stack-id', 'Action': 'SetStackPolicy', 'Version': '2010-05-15', 'ContentType': 'JSON', 'StackPolicyBody': '{}'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164733Z host;x-amz-date c0f133627807179b3e02692d551074c64c3421dc2885933509f9db23f60d774e boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164733Z 20170531/us-east-1/cloudformation/aws4_request 845dfa5e74f8000c887bf2dc3f8eddb58ce793f964eaf7d8ed160d51627ddf59 boto: DEBUG: Signature: 3a98cf2b12fb89ec473a51f5cf0d07875fdb6cd192fcd2fd408e3ca2761ff252 boto: DEBUG: Final headers: {'Content-Length': '99', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164733Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=3a98cf2b12fb89ec473a51f5cf0d07875fdb6cd192fcd2fd408e3ca2761ff252'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd7d3342b-4620-11e7-a29d-ad5c86dea6db'), ('date', 'Wed, 31 May 2017 16:47:32 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: ERROR: 403 Forbidden boto: ERROR: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d7d3342b-4620-11e7-a29d-ad5c86dea6db"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_update_stack_all_args (tests.unit.cloudformation.test_connection.TestCloudFormationUpdateStack) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 144, in test_update_stack_all_args use_previous_template=True File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 537, in update_stack body = self._do_request('UpdateStack', params, '/', 'POST') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 304, in _do_request raise self.ResponseError(response.status, response.reason, body=body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d809adbb-4620-11e7-b447-3129d9910288"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: WARNING: If both TemplateBody and TemplateURL are specified, only TemplateBody will be honored by the API boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'UsePreviousTemplate': 'true', 'Parameters.member.1.ParameterKey': 'KeyName', 'TemplateBody': '\n{\n "AWSTemplateFormatVersion" : "2010-09-09",\n "Description" : "Sample template",\n "Parameters" : {\n "KeyName" : {\n "Description" : "key pair",\n "Type" : "String"\n }\n },\n "Resources" : {\n "Ec2Instance" : {\n "Type" : "AWS::EC2::Instance",\n "Properties" : {\n "KeyName" : { "Ref" : "KeyName" },\n "ImageId" : "ami-7f418316",\n "UserData" : { "Fn::Base64" : "80" }\n }\n }\n },\n "Outputs" : {\n "InstanceId" : {\n "Description" : "InstanceId of the newly created EC2 instance",\n "Value" : { "Ref" : "Ec2Instance" }\n }\n}\n', 'TimeoutInMinutes': 20, 'Parameters.member.2.ParameterKey': 'KeyName2', 'Parameters.member.2.UsePreviousValue': 'true', 'StackName': 'stack_name', 'Parameters.member.5.UsePreviousValue': 'true', 'Version': '2010-05-15', 'DisableRollback': 'true', 'Action': 'UpdateStack', 'NotificationARNs.member.1': 'arn:notify1', 'NotificationARNs.member.2': 'arn:notify2', 'Parameters.member.3.ParameterValue': '', 'Tags.member.1.Key': 'TagKey', 'Parameters.member.5.ParameterKey': 'KeyName5', 'ContentType': 'JSON', 'Parameters.member.4.ParameterKey': 'KeyName4', 'Parameters.member.3.ParameterKey': 'KeyName3', 'Parameters.member.1.ParameterValue': 'myKeyName', 'TemplateURL': 'http://url', 'Tags.member.1.Value': 'TagValue', 'Parameters.member.4.UsePreviousValue': 'true'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164733Z host;x-amz-date eb70f4da8a8d244f49f9e3076e9ec5c88032dd26a5b6da1ec8d884cc2643f2a2 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164733Z 20170531/us-east-1/cloudformation/aws4_request 41ae3f239eece40d7a82564c151d44c70a987b419df6a80eaf0313d12962da3c boto: DEBUG: Signature: 8099bb662b5c3ce30100d00fcc48a6213377c63153765a95ec9140f0c415df44 boto: DEBUG: Final headers: {'Content-Length': '1925', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164733Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=8099bb662b5c3ce30100d00fcc48a6213377c63153765a95ec9140f0c415df44'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd809adbb-4620-11e7-b447-3129d9910288'), ('date', 'Wed, 31 May 2017 16:47:33 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: ERROR: 403 Forbidden boto: ERROR: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d809adbb-4620-11e7-b447-3129d9910288"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_update_stack_with_minimum_args (tests.unit.cloudformation.test_connection.TestCloudFormationUpdateStack) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 174, in test_update_stack_with_minimum_args api_response = self.service_connection.update_stack('stack_name') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 537, in update_stack body = self._do_request('UpdateStack', params, '/', 'POST') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 304, in _do_request raise self.ResponseError(response.status, response.reason, body=body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d87abe67-4620-11e7-806a-892136591403"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'StackName': 'stack_name', 'Action': 'UpdateStack', 'Version': '2010-05-15', 'ContentType': 'JSON', 'DisableRollback': 'false'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164734Z host;x-amz-date 400063817bfd75b121451b0ee5a5b94cdae1542965c506982fa535aceb949ee2 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164734Z 20170531/us-east-1/cloudformation/aws4_request fb4b0b51ec6f4a1da08cd0357065f3691ba895fb2fb7b1a96378236c5cfd0086 boto: DEBUG: Signature: 406b08252bc5dc931456896897bf4de42903098bb28d884a3ce155cf787e4dd2 boto: DEBUG: Final headers: {'Content-Length': '97', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164734Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=406b08252bc5dc931456896897bf4de42903098bb28d884a3ce155cf787e4dd2'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd87abe67-4620-11e7-806a-892136591403'), ('date', 'Wed, 31 May 2017 16:47:34 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: ERROR: 403 Forbidden boto: ERROR: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d87abe67-4620-11e7-806a-892136591403"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_validate_template (tests.unit.cloudformation.test_connection.TestCloudFormationValidateTemplate) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 606, in test_validate_template template_url='http://url') File "/usr/lib/python2.7/dist-packages/boto/cloudformation/connection.py", line 808, in validate_template verb="POST") File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. d8b0c31b-4620-11e7-bca5-6b4a7bdd6741 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: WARNING: If both TemplateBody and TemplateURL are specified, only TemplateBody will be honored by the API boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ValidateTemplate', 'TemplateURL': 'http://url', 'Version': '2010-05-15', 'TemplateBody': '\n{\n "AWSTemplateFormatVersion" : "2010-09-09",\n "Description" : "Sample template",\n "Parameters" : {\n "KeyName" : {\n "Description" : "key pair",\n "Type" : "String"\n }\n },\n "Resources" : {\n "Ec2Instance" : {\n "Type" : "AWS::EC2::Instance",\n "Properties" : {\n "KeyName" : { "Ref" : "KeyName" },\n "ImageId" : "ami-7f418316",\n "UserData" : { "Fn::Base64" : "80" }\n }\n }\n },\n "Outputs" : {\n "InstanceId" : {\n "Description" : "InstanceId of the newly created EC2 instance",\n "Value" : { "Ref" : "Ec2Instance" }\n }\n}\n'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164734Z host;x-amz-date 94af09a8a2f053793436208240db8194166674894d517242581ba3e547da6d32 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164734Z 20170531/us-east-1/cloudformation/aws4_request 49469d07f92b206d7174ab7e661fa35c3d3940452379d749b8c3fb388c435f6a boto: DEBUG: Signature: ba6a6a0b53f21989623b0b2f5ea83876725f6a71faa744bef4e606dd5fecf9cd boto: DEBUG: Final headers: {'Content-Length': '1276', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164734Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=ba6a6a0b53f21989623b0b2f5ea83876725f6a71faa744bef4e606dd5fecf9cd'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd8b0c31b-4620-11e7-bca5-6b4a7bdd6741'), ('date', 'Wed, 31 May 2017 16:47:33 GMT'), ('content-length', '316'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. d8b0c31b-4620-11e7-bca5-6b4a7bdd6741 boto: ERROR: 403 Forbidden boto: ERROR: Sender InvalidClientTokenId The security token included in the request is invalid. d8b0c31b-4620-11e7-bca5-6b4a7bdd6741 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_distribution (tests.unit.cloudfront.test_connection.TestCloudFrontConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudfront/test_connection.py", line 190, in test_create_distribution response = self.service_connection.create_distribution(origin, enabled=False, comment="example.com distribution") File "/usr/lib/python2.7/dist-packages/boto/cloudfront/__init__.py", line 173, in create_distribution return self._create_object(config, 'distribution', Distribution) File "/usr/lib/python2.7/dist-packages/boto/cloudfront/__init__.py", line 141, in _create_object raise CloudFrontServerError(response.status, response.reason, body) CloudFrontServerError: CloudFrontServerError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalidd8ee4100-4620-11e7-befa-b95d950b5295 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudfront.amazonaws.com/2010-11-01/distribution boto: DEBUG: Data: example.com 80 443 match_viewer 0a82152a-323b-4f16-be01-1d4eefd2e62c example.com distribution false boto: DEBUG: Headers: {'Content-Type': 'text/xml'} boto: DEBUG: Host: cloudfront.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=cloudfront.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudfront.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudfront.amazonaws.com, certificate hosts=['cloudfront.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Content-Length': '476', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudfront.amazonaws.com', 'Date': 'Wed, 31 May 2017 16:47:35 GMT', 'Content-Type': 'text/xml', 'Authorization': u'AWS aws_access_key_id:McIz0w1TjVyKGnsIvJkn4c1UURY='} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd8ee4100-4620-11e7-befa-b95d950b5295'), ('date', 'Wed, 31 May 2017 16:47:34 GMT'), ('content-length', '307'), ('content-type', 'text/xml')] boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalidd8ee4100-4620-11e7-befa-b95d950b5295 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_distributions (tests.unit.cloudfront.test_connection.TestCloudFrontConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudfront/test_connection.py", line 38, in test_get_all_distributions response = self.service_connection.get_all_distributions() File "/usr/lib/python2.7/dist-packages/boto/cloudfront/__init__.py", line 155, in get_all_distributions return self._get_all_objects('distribution', tags) File "/usr/lib/python2.7/dist-packages/boto/cloudfront/__init__.py", line 76, in _get_all_objects raise CloudFrontServerError(response.status, response.reason, body) CloudFrontServerError: CloudFrontServerError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalidd923cf8d-4620-11e7-953c-7594b481b421 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://cloudfront.amazonaws.com/2010-11-01/distribution boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudfront.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=cloudfront.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudfront.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudfront.amazonaws.com, certificate hosts=['cloudfront.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:47:35 GMT', 'Content-Length': '0', 'Host': 'cloudfront.amazonaws.com', 'Authorization': u'AWS aws_access_key_id:McIz0w1TjVyKGnsIvJkn4c1UURY=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd923cf8d-4620-11e7-953c-7594b481b421'), ('date', 'Wed, 31 May 2017 16:47:34 GMT'), ('content-length', '307'), ('content-type', 'text/xml')] boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalidd923cf8d-4620-11e7-953c-7594b481b421 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_distribution_config (tests.unit.cloudfront.test_connection.TestCloudFrontConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudfront/test_connection.py", line 70, in test_get_distribution_config response = self.service_connection.get_distribution_config('EEEEEEEEEEEEE') File "/usr/lib/python2.7/dist-packages/boto/cloudfront/__init__.py", line 162, in get_distribution_config DistributionConfig) File "/usr/lib/python2.7/dist-packages/boto/cloudfront/__init__.py", line 106, in _get_config raise CloudFrontServerError(response.status, response.reason, body) CloudFrontServerError: CloudFrontServerError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalidd959ad12-4620-11e7-befa-b95d950b5295 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://cloudfront.amazonaws.com/2010-11-01/distribution/EEEEEEEEEEEEE/config boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudfront.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=cloudfront.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudfront.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudfront.amazonaws.com, certificate hosts=['cloudfront.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:47:35 GMT', 'Content-Length': '0', 'Host': 'cloudfront.amazonaws.com', 'Authorization': u'AWS aws_access_key_id:McIz0w1TjVyKGnsIvJkn4c1UURY=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd959ad12-4620-11e7-befa-b95d950b5295'), ('date', 'Wed, 31 May 2017 16:47:35 GMT'), ('content-length', '307'), ('content-type', 'text/xml')] boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalidd959ad12-4620-11e7-befa-b95d950b5295 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_distribution_info (tests.unit.cloudfront.test_connection.TestCloudFrontConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudfront/test_connection.py", line 150, in test_get_distribution_info response = self.service_connection.get_distribution_info('EEEEEEEEEEEEE') File "/usr/lib/python2.7/dist-packages/boto/cloudfront/__init__.py", line 158, in get_distribution_info return self._get_info(distribution_id, 'distribution', Distribution) File "/usr/lib/python2.7/dist-packages/boto/cloudfront/__init__.py", line 90, in _get_info raise CloudFrontServerError(response.status, response.reason, body) CloudFrontServerError: CloudFrontServerError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalidd98f8a0b-4620-11e7-b904-77c9baf055bb -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://cloudfront.amazonaws.com/2010-11-01/distribution/EEEEEEEEEEEEE boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudfront.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=cloudfront.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudfront.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudfront.amazonaws.com, certificate hosts=['cloudfront.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:47:36 GMT', 'Content-Length': '0', 'Host': 'cloudfront.amazonaws.com', 'Authorization': u'AWS aws_access_key_id:cqNUS6M7bcSFf/Mx9FEYavmDxxY=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd98f8a0b-4620-11e7-b904-77c9baf055bb'), ('date', 'Wed, 31 May 2017 16:47:35 GMT'), ('content-length', '307'), ('content-type', 'text/xml')] boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalidd98f8a0b-4620-11e7-b904-77c9baf055bb --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_set_distribution_config (tests.unit.cloudfront.test_connection.TestCloudFrontConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudfront/test_connection.py", line 119, in test_set_distribution_config conf = self.service_connection.get_distribution_config('EEEEEEE') File "/usr/lib/python2.7/dist-packages/boto/cloudfront/__init__.py", line 162, in get_distribution_config DistributionConfig) File "/usr/lib/python2.7/dist-packages/boto/cloudfront/__init__.py", line 106, in _get_config raise CloudFrontServerError(response.status, response.reason, body) CloudFrontServerError: CloudFrontServerError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalidd9c95ec6-4620-11e7-9199-eb0143e38081 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://cloudfront.amazonaws.com/2010-11-01/distribution/EEEEEEE/config boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudfront.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=cloudfront.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudfront.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudfront.amazonaws.com, certificate hosts=['cloudfront.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:47:36 GMT', 'Content-Length': '0', 'Host': 'cloudfront.amazonaws.com', 'Authorization': u'AWS aws_access_key_id:cqNUS6M7bcSFf/Mx9FEYavmDxxY=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd9c95ec6-4620-11e7-9199-eb0143e38081'), ('date', 'Wed, 31 May 2017 16:47:36 GMT'), ('content-length', '307'), ('content-type', 'text/xml')] boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalidd9c95ec6-4620-11e7-9199-eb0143e38081 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that the correct arguments are sent to AWS when creating a ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_connection.py", line 151, in test_cloudsearch_deletion api_response = self.service_connection.delete_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 316, in delete_domain params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 98, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. da12eb17-4620-11e7-9c4c-1f284ca07b65 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DeleteDomain', 'Version': '2011-02-01', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164736Z host;x-amz-date f29f77194bf400bd4ae2f964468f1c30f722f92066c011c0b05c9ce6740d7e15 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164736Z 20170531/us-east-1/cloudsearch/aws4_request e94f42ac7cdbf4283ddeedf75c195af234c5d633a33335162a200397d9b12e8a boto: DEBUG: Signature: bcb73870116b8d4a376dbf2e1a279dc0ce37204907566885229f4e652e6674fb boto: DEBUG: Final headers: {'Content-Length': '54', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164736Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=bcb73870116b8d4a376dbf2e1a279dc0ce37204907566885229f4e652e6674fb'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'da12eb17-4620-11e7-9c4c-1f284ca07b65'), ('date', 'Wed, 31 May 2017 16:47:36 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. da12eb17-4620-11e7-9c4c-1f284ca07b65 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that the correct arguments are sent to AWS when indexing a ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_connection.py", line 205, in test_cloudsearch_index_documents api_response = self.service_connection.index_documents('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 592, in index_documents verb='POST', list_marker='FieldNames') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 98, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. da48c7ef-4620-11e7-867a-13802a278839 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'IndexDocuments', 'Version': '2011-02-01', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164737Z host;x-amz-date 1d6125862cc9527358ec8422ba07ab3a8ab8ad0e85b8e8145351cef8e79032b2 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164737Z 20170531/us-east-1/cloudsearch/aws4_request 5e54e454a9acb9b313e2e8ede5245c86997bc18d9c745adcdda017619555ca44 boto: DEBUG: Signature: e718f26be6ef0bd02fa55a0aad7d20fe29d38003ab78bf580335d5dbd55d62cd boto: DEBUG: Final headers: {'Content-Length': '56', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164737Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=e718f26be6ef0bd02fa55a0aad7d20fe29d38003ab78bf580335d5dbd55d62cd'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'da48c7ef-4620-11e7-867a-13802a278839'), ('date', 'Wed, 31 May 2017 16:47:36 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. da48c7ef-4620-11e7-867a-13802a278839 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that the AWS response is being parsed correctly when indexing a ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_connection.py", line 219, in test_cloudsearch_index_documents_resp api_response = self.service_connection.index_documents('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 592, in index_documents verb='POST', list_marker='FieldNames') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 98, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. da80a0d0-4620-11e7-867a-13802a278839 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'IndexDocuments', 'Version': '2011-02-01', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164737Z host;x-amz-date 1d6125862cc9527358ec8422ba07ab3a8ab8ad0e85b8e8145351cef8e79032b2 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164737Z 20170531/us-east-1/cloudsearch/aws4_request 5e54e454a9acb9b313e2e8ede5245c86997bc18d9c745adcdda017619555ca44 boto: DEBUG: Signature: e718f26be6ef0bd02fa55a0aad7d20fe29d38003ab78bf580335d5dbd55d62cd boto: DEBUG: Final headers: {'Content-Length': '56', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164737Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=e718f26be6ef0bd02fa55a0aad7d20fe29d38003ab78bf580335d5dbd55d62cd'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'da80a0d0-4620-11e7-867a-13802a278839'), ('date', 'Wed, 31 May 2017 16:47:36 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. da80a0d0-4620-11e7-867a-13802a278839 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that the domain information is correctly returned from AWS ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_connection.py", line 83, in test_cloudsearch_connect_result_details api_response = self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 120, in create_domain params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 98, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. daba9c36-4620-11e7-8bf3-5be88e037d21 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2011-02-01', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164738Z host;x-amz-date 496319e3b14fec8ea5eb255d31f558c4aaeab4436a9b6a4e51b5af5a6bfb7202 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164738Z 20170531/us-east-1/cloudsearch/aws4_request 70e082e2f34b7a4bff474da0e2c352c9a103d626c566ae7f1dbc03b77087c9cd boto: DEBUG: Signature: 5eecdb03dac81bb597e6fa415aa3bd1d391da9a47c42c047dc7a5168ccf5dfb2 boto: DEBUG: Final headers: {'Content-Length': '54', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164738Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=5eecdb03dac81bb597e6fa415aa3bd1d391da9a47c42c047dc7a5168ccf5dfb2'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'daba9c36-4620-11e7-8bf3-5be88e037d21'), ('date', 'Wed, 31 May 2017 16:47:37 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. daba9c36-4620-11e7-8bf3-5be88e037d21 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that endpoints & ARNs are correctly returned from AWS ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_connection.py", line 55, in test_cloudsearch_connect_result_endpoints api_response = self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 120, in create_domain params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 98, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. daf29cbb-4620-11e7-9c4c-1f284ca07b65 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2011-02-01', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164738Z host;x-amz-date 496319e3b14fec8ea5eb255d31f558c4aaeab4436a9b6a4e51b5af5a6bfb7202 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164738Z 20170531/us-east-1/cloudsearch/aws4_request 70e082e2f34b7a4bff474da0e2c352c9a103d626c566ae7f1dbc03b77087c9cd boto: DEBUG: Signature: 5eecdb03dac81bb597e6fa415aa3bd1d391da9a47c42c047dc7a5168ccf5dfb2 boto: DEBUG: Final headers: {'Content-Length': '54', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164738Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=5eecdb03dac81bb597e6fa415aa3bd1d391da9a47c42c047dc7a5168ccf5dfb2'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'daf29cbb-4620-11e7-9c4c-1f284ca07b65'), ('date', 'Wed, 31 May 2017 16:47:37 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. daf29cbb-4620-11e7-9c4c-1f284ca07b65 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that domain statuses are correctly returned from AWS ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_connection.py", line 72, in test_cloudsearch_connect_result_statuses api_response = self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 120, in create_domain params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 98, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. db296424-4620-11e7-b978-b914f30a36ba -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2011-02-01', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164738Z host;x-amz-date 496319e3b14fec8ea5eb255d31f558c4aaeab4436a9b6a4e51b5af5a6bfb7202 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164738Z 20170531/us-east-1/cloudsearch/aws4_request 70e082e2f34b7a4bff474da0e2c352c9a103d626c566ae7f1dbc03b77087c9cd boto: DEBUG: Signature: 5eecdb03dac81bb597e6fa415aa3bd1d391da9a47c42c047dc7a5168ccf5dfb2 boto: DEBUG: Final headers: {'Content-Length': '54', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164738Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=5eecdb03dac81bb597e6fa415aa3bd1d391da9a47c42c047dc7a5168ccf5dfb2'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'db296424-4620-11e7-b978-b914f30a36ba'), ('date', 'Wed, 31 May 2017 16:47:38 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. db296424-4620-11e7-b978-b914f30a36ba --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_documentservice_creation (tests.unit.cloudsearch.test_connection.TestCloudSearchCreateDomain) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_connection.py", line 91, in test_cloudsearch_documentservice_creation api_response = self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 120, in create_domain params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 98, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. db61b189-4620-11e7-84af-23c87be953d5 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2011-02-01', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164739Z host;x-amz-date 496319e3b14fec8ea5eb255d31f558c4aaeab4436a9b6a4e51b5af5a6bfb7202 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164739Z 20170531/us-east-1/cloudsearch/aws4_request c9215ea202526632cd00043a44aa117282c6942f48a8bb5bc6d997461138fa1b boto: DEBUG: Signature: 1fd58390d5cca3d5f7e03a5540b0e4f249486e74df2b0661e6851a4b3468d7f8 boto: DEBUG: Final headers: {'Content-Length': '54', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164739Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=1fd58390d5cca3d5f7e03a5540b0e4f249486e74df2b0661e6851a4b3468d7f8'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'db61b189-4620-11e7-84af-23c87be953d5'), ('date', 'Wed, 31 May 2017 16:47:38 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. db61b189-4620-11e7-84af-23c87be953d5 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_searchservice_creation (tests.unit.cloudsearch.test_connection.TestCloudSearchCreateDomain) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_connection.py", line 102, in test_cloudsearch_searchservice_creation api_response = self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 120, in create_domain params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 98, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. dba0b71d-4620-11e7-8812-ed9ae9074527 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2011-02-01', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164739Z host;x-amz-date 496319e3b14fec8ea5eb255d31f558c4aaeab4436a9b6a4e51b5af5a6bfb7202 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164739Z 20170531/us-east-1/cloudsearch/aws4_request c9215ea202526632cd00043a44aa117282c6942f48a8bb5bc6d997461138fa1b boto: DEBUG: Signature: 1fd58390d5cca3d5f7e03a5540b0e4f249486e74df2b0661e6851a4b3468d7f8 boto: DEBUG: Final headers: {'Content-Length': '54', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164739Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=1fd58390d5cca3d5f7e03a5540b0e4f249486e74df2b0661e6851a4b3468d7f8'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'dba0b71d-4620-11e7-8812-ed9ae9074527'), ('date', 'Wed, 31 May 2017 16:47:39 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. dba0b71d-4620-11e7-8812-ed9ae9074527 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_domain (tests.unit.cloudsearch.test_connection.TestCloudSearchCreateDomain) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_connection.py", line 43, in test_create_domain api_response = self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 120, in create_domain params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/layer1.py", line 98, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. dbd81ace-4620-11e7-8812-ed9ae9074527 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2011-02-01', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164739Z host;x-amz-date 496319e3b14fec8ea5eb255d31f558c4aaeab4436a9b6a4e51b5af5a6bfb7202 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164739Z 20170531/us-east-1/cloudsearch/aws4_request c9215ea202526632cd00043a44aa117282c6942f48a8bb5bc6d997461138fa1b boto: DEBUG: Signature: 1fd58390d5cca3d5f7e03a5540b0e4f249486e74df2b0661e6851a4b3468d7f8 boto: DEBUG: Final headers: {'Content-Length': '54', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164739Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=1fd58390d5cca3d5f7e03a5540b0e4f249486e74df2b0661e6851a4b3468d7f8'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'dbd81ace-4620-11e7-8812-ed9ae9074527'), ('date', 'Wed, 31 May 2017 16:47:39 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. dbd81ace-4620-11e7-8812-ed9ae9074527 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_erroneous_sdf (tests.unit.cloudsearch.test_document.CloudSearchBadSDFTesting) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_document.py", line 269, in test_cloudsearch_erroneous_sdf document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/document.py", line 199, in commit r = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Test that the request for a single document deletion is done properly. ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_document.py", line 178, in test_cloudsearch_delete document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/document.py", line 199, in commit r = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that the result of a single document deletion is parsed properly. ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_document.py", line 192, in test_cloudsearch_delete_results doc = document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/document.py", line 199, in commit r = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_delete_multiples (tests.unit.cloudsearch.test_document.CloudSearchDocumentDeleteMultiple) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_document.py", line 211, in test_cloudsearch_delete_multiples document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/document.py", line 199, in commit r = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_fake_bad_unicode (tests.unit.cloudsearch.test_document.CloudSearchDocumentErrorBadUnicode) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_document.py", line 288, in test_fake_bad_unicode self.assertRaises(EncodingError, document.commit) File "/usr/lib/python2.7/unittest/case.py", line 473, in assertRaises callableObj(*args, **kwargs) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/document.py", line 199, in commit r = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_fake_docs_too_big (tests.unit.cloudsearch.test_document.CloudSearchDocumentErrorDocsTooBig) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_document.py", line 305, in test_fake_docs_too_big self.assertRaises(ContentTooLongError, document.commit) File "/usr/lib/python2.7/unittest/case.py", line 473, in assertRaises callableObj(*args, **kwargs) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/document.py", line 199, in commit r = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_fake_failure (tests.unit.cloudsearch.test_document.CloudSearchDocumentErrorMismatch) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_document.py", line 323, in test_fake_failure self.assertRaises(CommitMismatchError, document.commit) File "/usr/lib/python2.7/unittest/case.py", line 473, in assertRaises callableObj(*args, **kwargs) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/document.py", line 199, in commit r = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that multiple documents are added correctly to AWS ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_document.py", line 133, in test_cloudsearch_add_basics document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/document.py", line 199, in commit r = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that the result from adding multiple documents is parsed ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_document.py", line 156, in test_cloudsearch_add_results doc = document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/document.py", line 199, in commit r = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that a simple add document actually sends an add document request ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_document.py", line 45, in test_cloudsearch_add_basics document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/document.py", line 199, in commit r = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that a simple add document sends correct document metadata to ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_document.py", line 61, in test_cloudsearch_add_single_basic document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/document.py", line 199, in commit r = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that a simple add document sends the actual document to AWS. ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_document.py", line 77, in test_cloudsearch_add_single_fields document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/document.py", line 199, in commit r = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that the reply from adding a single document is correctly parsed. ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_document.py", line 94, in test_cloudsearch_add_single_result doc = document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/document.py", line 199, in commit r = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_fake_failure (tests.unit.cloudsearch.test_document.CloudSearchDocumentsErrorMissingAdds) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_document.py", line 337, in test_fake_failure self.assertRaises(SearchServiceException, document.commit) File "/usr/lib/python2.7/unittest/case.py", line 473, in assertRaises callableObj(*args, **kwargs) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/document.py", line 199, in commit r = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2011-02-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_no_simplejson_value_error (tests.unit.cloudsearch.test_exceptions.CloudSearchJSONExceptionTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_exceptions.py", line 28, in test_no_simplejson_value_error search.search(q='test') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_response (tests.unit.cloudsearch.test_search.CloudSearchNonJsonTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 376, in test_response search.search(q='Test') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_search_facets (tests.unit.cloudsearch.test_search.CloudSearchSearchFacetTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 361, in test_cloudsearch_search_facets results = search.search(q='Test', facet=['tags']) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_bqsearch (tests.unit.cloudsearch.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 104, in test_cloudsearch_bqsearch search.search(bq="'Test'") File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_facet_constraint_multiple (tests.unit.cloudsearch.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 157, in test_cloudsearch_facet_constraint_multiple 'category': "'News','Reviews'"}) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_facet_constraint_single (tests.unit.cloudsearch.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 144, in test_cloudsearch_facet_constraint_single facet_constraints={'author': "'John Smith','Mark Smith'"}) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_facet_multiple (tests.unit.cloudsearch.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 133, in test_cloudsearch_facet_multiple search.search(q='Test', facet=["author", "cat"]) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_facet_single (tests.unit.cloudsearch.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 124, in test_cloudsearch_facet_single search.search(q='Test', facet=["Author"]) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_facet_sort_multiple (tests.unit.cloudsearch.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 179, in test_cloudsearch_facet_sort_multiple 'cat': 'count'}) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_facet_sort_single (tests.unit.cloudsearch.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 169, in test_cloudsearch_facet_sort_single search.search(q='Test', facet_sort={'author': 'alpha'}) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_qsearch (tests.unit.cloudsearch.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 93, in test_cloudsearch_qsearch search.search(q='Test') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_rank_multiple (tests.unit.cloudsearch.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 217, in test_cloudsearch_rank_multiple search.search(q='Test', rank=["date", "score"]) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_rank_single (tests.unit.cloudsearch.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 208, in test_cloudsearch_rank_single search.search(q='Test', rank=["date"]) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_result_fields_multiple (tests.unit.cloudsearch.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 235, in test_cloudsearch_result_fields_multiple search.search(q='Test', return_fields=['author', 'title']) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_result_fields_single (tests.unit.cloudsearch.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 226, in test_cloudsearch_result_fields_single search.search(q='Test', return_fields=['author']) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that documents are parsed properly from AWS ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 296, in test_cloudsearch_results_hits results = search.search(q='Test') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check num_pages_needed is calculated correctly ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 274, in test_cloudsearch_results_info results = search.search(q='Test') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check the documents length matches the iterator details ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 320, in test_cloudsearch_results_internal_consistancy results = search.search(q='Test') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check the results iterator ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 309, in test_cloudsearch_results_iterator results = search.search(q='Test') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that information objects are passed back through the API ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 287, in test_cloudsearch_results_matched results = search(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check returned metadata is parsed correctly ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 264, in test_cloudsearch_results_meta results = search.search(q='Test') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_search_details (tests.unit.cloudsearch.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 113, in test_cloudsearch_search_details search.search(q='Test', size=50, start=20) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check next page query is correct ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 330, in test_cloudsearch_search_nextpage results = search(query2) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_t_field_multiple (tests.unit.cloudsearch.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 253, in test_cloudsearch_t_field_multiple search.search(q='Test', t={'year': '2001..2007', 'score': '10..50'}) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_t_field_single (tests.unit.cloudsearch.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 244, in test_cloudsearch_t_field_single search.search(q='Test', t={'year': '2001..2007'}) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_top_n_multiple (tests.unit.cloudsearch.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 198, in test_cloudsearch_top_n_multiple search.search(q='Test', facet_top_n={'author': 5, 'cat': 10}) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_top_n_single (tests.unit.cloudsearch.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 189, in test_cloudsearch_top_n_single search.search(q='Test', facet_top_n={'author': 5}) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_response (tests.unit.cloudsearch.test_search.CloudSearchUnauthorizedTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch/test_search.py", line 388, in test_response search.search(q='Test') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 274, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch/search.py", line 288, in __call__ r = requests.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 70, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 56, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that the correct arguments are sent to AWS when creating a ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_connection.py", line 163, in test_cloudsearch_deletion self.service_connection.delete_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 281, in delete_domain path='/', params=params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 783, in _make_request body=json_body) JSONResponseError: JSONResponseError: 403 Forbidden {u'RequestId': u'dcbc8692-4620-11e7-9de9-911eea54937f', u'Error': {u'Message': u'The security token included in the request is invalid.', u'Code': u'InvalidClientTokenId', u'Type': u'Sender'}} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DeleteDomain', 'Version': '2013-01-01', 'ContentType': 'JSON', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164741Z host;x-amz-date 35a6d78954d09a649ec4710b9072b4c411693133cc6248856e9d401ae3a188aa boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164741Z 20170531/us-east-1/cloudsearch/aws4_request 7c145b7302bd57ee8bc137049140d10eb394c10368577bb15cc01c3266d17641 boto: DEBUG: Signature: 0486af6807fd4d5458688e0e4901b832673ef2280942cbb0e61cdb89f8ba069b boto: DEBUG: Final headers: {'Content-Length': '71', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164741Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=0486af6807fd4d5458688e0e4901b832673ef2280942cbb0e61cdb89f8ba069b'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'dcbc8692-4620-11e7-9de9-911eea54937f'), ('date', 'Wed, 31 May 2017 16:47:40 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"dcbc8692-4620-11e7-9de9-911eea54937f"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that the correct arguments are sent to AWS when indexing a ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_connection.py", line 220, in test_cloudsearch_index_documents self.service_connection.index_documents('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 635, in index_documents path='/', params=params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 783, in _make_request body=json_body) JSONResponseError: JSONResponseError: 403 Forbidden {u'RequestId': u'dceee1f5-4620-11e7-8cfa-fba559c12304', u'Error': {u'Message': u'The security token included in the request is invalid.', u'Code': u'InvalidClientTokenId', u'Type': u'Sender'}} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'IndexDocuments', 'Version': '2013-01-01', 'ContentType': 'JSON', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164741Z host;x-amz-date 5a0041d635979a43b3d306a2679e23aada4da1b65ea8da6933d0b2c99d170091 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164741Z 20170531/us-east-1/cloudsearch/aws4_request ae457c03f4df73debf870fb260d4ffc16ae0e9cb63fb66291656385e645f51aa boto: DEBUG: Signature: 24f11b2789a6b66c614614edae31f5d0f145d9a9f33869b2870f3b427d8a1ebe boto: DEBUG: Final headers: {'Content-Length': '73', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164741Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=24f11b2789a6b66c614614edae31f5d0f145d9a9f33869b2870f3b427d8a1ebe'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'dceee1f5-4620-11e7-8cfa-fba559c12304'), ('date', 'Wed, 31 May 2017 16:47:41 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"dceee1f5-4620-11e7-8cfa-fba559c12304"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that the AWS response is being parsed correctly when indexing a ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_connection.py", line 235, in test_cloudsearch_index_documents_resp api_response = self.service_connection.index_documents('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 635, in index_documents path='/', params=params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 783, in _make_request body=json_body) JSONResponseError: JSONResponseError: 403 Forbidden {u'RequestId': u'dd25a8fe-4620-11e7-87a8-c7047d1c2825', u'Error': {u'Message': u'The security token included in the request is invalid.', u'Code': u'InvalidClientTokenId', u'Type': u'Sender'}} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'IndexDocuments', 'Version': '2013-01-01', 'ContentType': 'JSON', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164742Z host;x-amz-date 5a0041d635979a43b3d306a2679e23aada4da1b65ea8da6933d0b2c99d170091 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164742Z 20170531/us-east-1/cloudsearch/aws4_request 01402b8028d6dc61bf0042941ec4c47dedac9ba0d907afea85b990ce29895350 boto: DEBUG: Signature: 046d6bf9bb24128ac4b8221c207025f4f94bf16c6782f3d68abffb58bd4d173f boto: DEBUG: Final headers: {'Content-Length': '73', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164742Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=046d6bf9bb24128ac4b8221c207025f4f94bf16c6782f3d68abffb58bd4d173f'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'dd25a8fe-4620-11e7-87a8-c7047d1c2825'), ('date', 'Wed, 31 May 2017 16:47:42 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"dd25a8fe-4620-11e7-87a8-c7047d1c2825"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that the domain information is correctly returned from AWS ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_connection.py", line 88, in test_cloudsearch_connect_result_details api_response = self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 112, in create_domain path='/', params=params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 783, in _make_request body=json_body) JSONResponseError: JSONResponseError: 403 Forbidden {u'RequestId': u'dd626454-4620-11e7-8812-ed9ae9074527', u'Error': {u'Message': u'The security token included in the request is invalid.', u'Code': u'InvalidClientTokenId', u'Type': u'Sender'}} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2013-01-01', 'ContentType': 'JSON', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164742Z host;x-amz-date fc126cc3f87f020a25d41fd41069a0a2ba24edecb733221928db72ac2ef70d49 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164742Z 20170531/us-east-1/cloudsearch/aws4_request 76c879225af5bbeaa67688dc93aecd3b9595e8b64c13fe77950fb1566ef00038 boto: DEBUG: Signature: 9821eecb6eaea14c9429a9f4a3af465c34289f5611e51053bcd4d1f3894df4b2 boto: DEBUG: Final headers: {'Content-Length': '71', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164742Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=9821eecb6eaea14c9429a9f4a3af465c34289f5611e51053bcd4d1f3894df4b2'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'dd626454-4620-11e7-8812-ed9ae9074527'), ('date', 'Wed, 31 May 2017 16:47:41 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"dd626454-4620-11e7-8812-ed9ae9074527"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that endpoints & ARNs are correctly returned from AWS ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_connection.py", line 58, in test_cloudsearch_connect_result_endpoints api_response = self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 112, in create_domain path='/', params=params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 783, in _make_request body=json_body) JSONResponseError: JSONResponseError: 403 Forbidden {u'RequestId': u'dd935f51-4620-11e7-9c4c-1f284ca07b65', u'Error': {u'Message': u'The security token included in the request is invalid.', u'Code': u'InvalidClientTokenId', u'Type': u'Sender'}} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2013-01-01', 'ContentType': 'JSON', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164742Z host;x-amz-date fc126cc3f87f020a25d41fd41069a0a2ba24edecb733221928db72ac2ef70d49 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164742Z 20170531/us-east-1/cloudsearch/aws4_request 76c879225af5bbeaa67688dc93aecd3b9595e8b64c13fe77950fb1566ef00038 boto: DEBUG: Signature: 9821eecb6eaea14c9429a9f4a3af465c34289f5611e51053bcd4d1f3894df4b2 boto: DEBUG: Final headers: {'Content-Length': '71', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164742Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=9821eecb6eaea14c9429a9f4a3af465c34289f5611e51053bcd4d1f3894df4b2'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'dd935f51-4620-11e7-9c4c-1f284ca07b65'), ('date', 'Wed, 31 May 2017 16:47:42 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"dd935f51-4620-11e7-9c4c-1f284ca07b65"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that domain statuses are correctly returned from AWS ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_connection.py", line 75, in test_cloudsearch_connect_result_statuses api_response = self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 112, in create_domain path='/', params=params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 783, in _make_request body=json_body) JSONResponseError: JSONResponseError: 403 Forbidden {u'RequestId': u'ddca260f-4620-11e7-84af-23c87be953d5', u'Error': {u'Message': u'The security token included in the request is invalid.', u'Code': u'InvalidClientTokenId', u'Type': u'Sender'}} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2013-01-01', 'ContentType': 'JSON', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164743Z host;x-amz-date fc126cc3f87f020a25d41fd41069a0a2ba24edecb733221928db72ac2ef70d49 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164743Z 20170531/us-east-1/cloudsearch/aws4_request c3f72b342ad91c7d1c22dd220389fc0b82b9d877012655d01c3cc08366e01e44 boto: DEBUG: Signature: 84dc98cf8bc76cf3b32cda440183035290ac55a37a5660a9f7fc8891588ece64 boto: DEBUG: Final headers: {'Content-Length': '71', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164743Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=84dc98cf8bc76cf3b32cda440183035290ac55a37a5660a9f7fc8891588ece64'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'ddca260f-4620-11e7-84af-23c87be953d5'), ('date', 'Wed, 31 May 2017 16:47:43 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"ddca260f-4620-11e7-84af-23c87be953d5"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_documentservice_creation (tests.unit.cloudsearch2.test_connection.TestCloudSearchCreateDomain) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_connection.py", line 98, in test_cloudsearch_documentservice_creation api_response = self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 112, in create_domain path='/', params=params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 783, in _make_request body=json_body) JSONResponseError: JSONResponseError: 403 Forbidden {u'RequestId': u'de009ffc-4620-11e7-976d-cbf993d3cd74', u'Error': {u'Message': u'The security token included in the request is invalid.', u'Code': u'InvalidClientTokenId', u'Type': u'Sender'}} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2013-01-01', 'ContentType': 'JSON', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164743Z host;x-amz-date fc126cc3f87f020a25d41fd41069a0a2ba24edecb733221928db72ac2ef70d49 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164743Z 20170531/us-east-1/cloudsearch/aws4_request c3f72b342ad91c7d1c22dd220389fc0b82b9d877012655d01c3cc08366e01e44 boto: DEBUG: Signature: 84dc98cf8bc76cf3b32cda440183035290ac55a37a5660a9f7fc8891588ece64 boto: DEBUG: Final headers: {'Content-Length': '71', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164743Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=84dc98cf8bc76cf3b32cda440183035290ac55a37a5660a9f7fc8891588ece64'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'de009ffc-4620-11e7-976d-cbf993d3cd74'), ('date', 'Wed, 31 May 2017 16:47:42 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"de009ffc-4620-11e7-976d-cbf993d3cd74"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_searchservice_creation (tests.unit.cloudsearch2.test_connection.TestCloudSearchCreateDomain) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_connection.py", line 111, in test_cloudsearch_searchservice_creation api_response = self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 112, in create_domain path='/', params=params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 783, in _make_request body=json_body) JSONResponseError: JSONResponseError: 403 Forbidden {u'RequestId': u'de37b4f2-4620-11e7-84af-23c87be953d5', u'Error': {u'Message': u'The security token included in the request is invalid.', u'Code': u'InvalidClientTokenId', u'Type': u'Sender'}} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2013-01-01', 'ContentType': 'JSON', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164743Z host;x-amz-date fc126cc3f87f020a25d41fd41069a0a2ba24edecb733221928db72ac2ef70d49 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164743Z 20170531/us-east-1/cloudsearch/aws4_request c3f72b342ad91c7d1c22dd220389fc0b82b9d877012655d01c3cc08366e01e44 boto: DEBUG: Signature: 84dc98cf8bc76cf3b32cda440183035290ac55a37a5660a9f7fc8891588ece64 boto: DEBUG: Final headers: {'Content-Length': '71', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164743Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=84dc98cf8bc76cf3b32cda440183035290ac55a37a5660a9f7fc8891588ece64'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'de37b4f2-4620-11e7-84af-23c87be953d5'), ('date', 'Wed, 31 May 2017 16:47:43 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"de37b4f2-4620-11e7-84af-23c87be953d5"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_domain (tests.unit.cloudsearch2.test_connection.TestCloudSearchCreateDomain) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_connection.py", line 45, in test_create_domain self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 112, in create_domain path='/', params=params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 783, in _make_request body=json_body) JSONResponseError: JSONResponseError: 403 Forbidden {u'RequestId': u'de6f18c6-4620-11e7-aaf4-132a5a345d58', u'Error': {u'Message': u'The security token included in the request is invalid.', u'Code': u'InvalidClientTokenId', u'Type': u'Sender'}} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2013-01-01', 'ContentType': 'JSON', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164744Z host;x-amz-date fc126cc3f87f020a25d41fd41069a0a2ba24edecb733221928db72ac2ef70d49 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164744Z 20170531/us-east-1/cloudsearch/aws4_request 3f9671d5431fafce1d635a14f7316e33f4879ff27268ac4ef40ca81d9df8e777 boto: DEBUG: Signature: 51ac9e13e42c2cc78d04014f940a07d9c7c04e8c391dd5c96e85b5b52c002603 boto: DEBUG: Final headers: {'Content-Length': '71', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164744Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=51ac9e13e42c2cc78d04014f940a07d9c7c04e8c391dd5c96e85b5b52c002603'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'de6f18c6-4620-11e7-aaf4-132a5a345d58'), ('date', 'Wed, 31 May 2017 16:47:44 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"de6f18c6-4620-11e7-aaf4-132a5a345d58"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_erroneous_sdf (tests.unit.cloudsearch2.test_document.CloudSearchBadSDFTesting) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_document.py", line 277, in test_cloudsearch_erroneous_sdf document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 228, in commit r = self._commit_without_auth(sdf, api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 199, in _commit_without_auth resp = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Test that the request for a single document deletion is done properly. ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_document.py", line 194, in test_cloudsearch_delete document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 228, in commit r = self._commit_without_auth(sdf, api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 199, in _commit_without_auth resp = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that the result of a single document deletion is parsed properly. ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_document.py", line 207, in test_cloudsearch_delete_results doc = document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 228, in commit r = self._commit_without_auth(sdf, api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 199, in _commit_without_auth resp = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_delete_multiples (tests.unit.cloudsearch2.test_document.CloudSearchDocumentDeleteMultiple) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_document.py", line 226, in test_cloudsearch_delete_multiples document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 228, in commit r = self._commit_without_auth(sdf, api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 199, in _commit_without_auth resp = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_fake_bad_unicode (tests.unit.cloudsearch2.test_document.CloudSearchDocumentErrorBadUnicode) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_document.py", line 296, in test_fake_bad_unicode self.assertRaises(EncodingError, document.commit) File "/usr/lib/python2.7/unittest/case.py", line 473, in assertRaises callableObj(*args, **kwargs) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 228, in commit r = self._commit_without_auth(sdf, api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 199, in _commit_without_auth resp = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_fake_docs_too_big (tests.unit.cloudsearch2.test_document.CloudSearchDocumentErrorDocsTooBig) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_document.py", line 313, in test_fake_docs_too_big self.assertRaises(ContentTooLongError, document.commit) File "/usr/lib/python2.7/unittest/case.py", line 473, in assertRaises callableObj(*args, **kwargs) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 228, in commit r = self._commit_without_auth(sdf, api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 199, in _commit_without_auth resp = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_attached_errors_list (tests.unit.cloudsearch2.test_document.CloudSearchDocumentErrorMismatch) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_document.py", line 339, in test_attached_errors_list document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 228, in commit r = self._commit_without_auth(sdf, api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 199, in _commit_without_auth resp = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_fake_failure (tests.unit.cloudsearch2.test_document.CloudSearchDocumentErrorMismatch) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_document.py", line 330, in test_fake_failure self.assertRaises(CommitMismatchError, document.commit) File "/usr/lib/python2.7/unittest/case.py", line 473, in assertRaises callableObj(*args, **kwargs) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 228, in commit r = self._commit_without_auth(sdf, api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 199, in _commit_without_auth resp = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that multiple documents are added correctly to AWS ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_document.py", line 150, in test_cloudsearch_add_basics document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 228, in commit r = self._commit_without_auth(sdf, api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 199, in _commit_without_auth resp = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that the result from adding multiple documents is parsed ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_document.py", line 172, in test_cloudsearch_add_results doc = document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 228, in commit r = self._commit_without_auth(sdf, api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 199, in _commit_without_auth resp = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that a simple add document actually sends an add document request ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_document.py", line 66, in test_cloudsearch_add_basics document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 228, in commit r = self._commit_without_auth(sdf, api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 199, in _commit_without_auth resp = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that a simple add document sends correct document metadata to ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_document.py", line 81, in test_cloudsearch_add_single_basic document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 228, in commit r = self._commit_without_auth(sdf, api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 199, in _commit_without_auth resp = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that a simple add document sends the actual document to AWS. ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_document.py", line 96, in test_cloudsearch_add_single_fields document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 228, in commit r = self._commit_without_auth(sdf, api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 199, in _commit_without_auth resp = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that the reply from adding a single document is correctly parsed. ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_document.py", line 113, in test_cloudsearch_add_single_result doc = document.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 228, in commit r = self._commit_without_auth(sdf, api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 199, in _commit_without_auth resp = session.post(url, data=sdf, headers={'Content-Type': 'application/json'}) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 535, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 487, in send raise ConnectionError(e, request=request) ConnectionError: HTTPConnectionPool(host='squid.internal', port=3128): Max retries exceeded with url: http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch (Caused by ProtocolError('Connection aborted.', BadStatusLine("''",))) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.util.retry: DEBUG: Converted retries value: 5 -> Retry(total=5, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=4, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=4, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (2): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=3, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=3, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (3): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=2, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=2, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (4): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=1, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=1, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (5): squid.internal requests.packages.urllib3.util.retry: DEBUG: Incremented Retry for (url='http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch'): Retry(total=0, connect=None, read=None, redirect=None) requests.packages.urllib3.connectionpool: WARNING: Retrying (Retry(total=0, connect=None, read=None, redirect=None)) after connection broken by 'ProtocolError('Connection aborted.', BadStatusLine("''",))': http://doc-demo-userdomain.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (6): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_no_simplejson_value_error (tests.unit.cloudsearch2.test_exceptions.CloudSearchJSONExceptionTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_exceptions.py", line 28, in test_no_simplejson_value_error search.search(q='test') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_response (tests.unit.cloudsearch2.test_search.CloudSearchNonJsonTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 322, in test_response search.search(q='Test') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_search_facets (tests.unit.cloudsearch2.test_search.CloudSearchSearchFacetTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 307, in test_cloudsearch_search_facets results = search.search(q='Test', facet={'tags': {}}) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_facet_constraint_multiple (tests.unit.cloudsearch2.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 157, in test_cloudsearch_facet_constraint_multiple 'category': "'News','Reviews'"}) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_facet_constraint_single (tests.unit.cloudsearch2.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 144, in test_cloudsearch_facet_constraint_single facet={'author': "'John Smith','Mark Smith'"}) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_facet_sort_multiple (tests.unit.cloudsearch2.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 181, in test_cloudsearch_facet_sort_multiple 'cat': {'sort': 'count'}}) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_facet_sort_single (tests.unit.cloudsearch2.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 169, in test_cloudsearch_facet_sort_single search.search(q='Test', facet={'author': {'sort': 'alpha'}}) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_qsearch (tests.unit.cloudsearch2.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 119, in test_cloudsearch_qsearch search.search(q='Test', options='TestOptions') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_result_fields_multiple (tests.unit.cloudsearch2.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 200, in test_cloudsearch_result_fields_multiple search.search(q='Test', return_fields=['author', 'title']) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_result_fields_single (tests.unit.cloudsearch2.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 191, in test_cloudsearch_result_fields_single search.search(q='Test', return_fields=['author']) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that documents are parsed properly from AWS ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 242, in test_cloudsearch_results_hits results = search.search(q='Test') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check num_pages_needed is calculated correctly ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 220, in test_cloudsearch_results_info results = search.search(q='Test') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check the documents length matches the iterator details ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 265, in test_cloudsearch_results_internal_consistancy results = search.search(q='Test') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check the results iterator ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 255, in test_cloudsearch_results_iterator results = search.search(q='Test') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that information objects are passed back through the API ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 233, in test_cloudsearch_results_matched results = search(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check returned metadata is parsed correctly ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 210, in test_cloudsearch_results_meta results = search.search(q='Test') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_search_details (tests.unit.cloudsearch2.test_search.CloudSearchSearchTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 131, in test_cloudsearch_search_details search.search(q='Test', size=50, start=20) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check next page query is correct ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 275, in test_cloudsearch_search_nextpage results = search(query2) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_response (tests.unit.cloudsearch2.test_search.CloudSearchUnauthorizedTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_search.py", line 334, in test_response search.search(q='Test') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 363, in __call__ r = self._search_without_auth(query.to_params(), api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 343, in _search_without_auth resp = self.session.get(url, params=params) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 501, in get return self.request('GET', url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 488, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 609, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 473, in send raise ConnectionError(err, request=request) ConnectionError: ('Connection aborted.', BadStatusLine("''",)) -------------------- >> begin captured logging << -------------------- requests.packages.urllib3.connectionpool: DEBUG: Starting new HTTP connection (1): squid.internal --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that the domain information is correctly returned from AWS ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_connection.py", line 88, in test_cloudsearch_connect_result_details api_response = self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 112, in create_domain path='/', params=params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 783, in _make_request body=json_body) JSONResponseError: JSONResponseError: 403 Forbidden {u'RequestId': u'df41f9c8-4620-11e7-8812-ed9ae9074527', u'Error': {u'Message': u'The security token included in the request is invalid.', u'Code': u'InvalidClientTokenId', u'Type': u'Sender'}} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2013-01-01', 'ContentType': 'JSON', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164745Z host;x-amz-date fc126cc3f87f020a25d41fd41069a0a2ba24edecb733221928db72ac2ef70d49 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164745Z 20170531/us-east-1/cloudsearch/aws4_request ee03c1af701ee3fef5b61a793c8ba91bf212f947e15245d57dfd72542cda3ce5 boto: DEBUG: Signature: db813349b67f73bc167570445160e6dbc0b172d7fc4f4a37c47b412fea488d4e boto: DEBUG: Final headers: {'Content-Length': '71', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164745Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=db813349b67f73bc167570445160e6dbc0b172d7fc4f4a37c47b412fea488d4e'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'df41f9c8-4620-11e7-8812-ed9ae9074527'), ('date', 'Wed, 31 May 2017 16:47:45 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"df41f9c8-4620-11e7-8812-ed9ae9074527"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that endpoints & ARNs are correctly returned from AWS ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_connection.py", line 58, in test_cloudsearch_connect_result_endpoints api_response = self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 112, in create_domain path='/', params=params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 783, in _make_request body=json_body) JSONResponseError: JSONResponseError: 403 Forbidden {u'RequestId': u'df73df11-4620-11e7-976d-cbf993d3cd74', u'Error': {u'Message': u'The security token included in the request is invalid.', u'Code': u'InvalidClientTokenId', u'Type': u'Sender'}} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2013-01-01', 'ContentType': 'JSON', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164745Z host;x-amz-date fc126cc3f87f020a25d41fd41069a0a2ba24edecb733221928db72ac2ef70d49 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164745Z 20170531/us-east-1/cloudsearch/aws4_request ee03c1af701ee3fef5b61a793c8ba91bf212f947e15245d57dfd72542cda3ce5 boto: DEBUG: Signature: db813349b67f73bc167570445160e6dbc0b172d7fc4f4a37c47b412fea488d4e boto: DEBUG: Final headers: {'Content-Length': '71', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164745Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=db813349b67f73bc167570445160e6dbc0b172d7fc4f4a37c47b412fea488d4e'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'df73df11-4620-11e7-976d-cbf993d3cd74'), ('date', 'Wed, 31 May 2017 16:47:45 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"df73df11-4620-11e7-976d-cbf993d3cd74"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Check that domain statuses are correctly returned from AWS ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_connection.py", line 75, in test_cloudsearch_connect_result_statuses api_response = self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 112, in create_domain path='/', params=params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 783, in _make_request body=json_body) JSONResponseError: JSONResponseError: 403 Forbidden {u'RequestId': u'dfa7c02f-4620-11e7-867a-13802a278839', u'Error': {u'Message': u'The security token included in the request is invalid.', u'Code': u'InvalidClientTokenId', u'Type': u'Sender'}} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2013-01-01', 'ContentType': 'JSON', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164746Z host;x-amz-date fc126cc3f87f020a25d41fd41069a0a2ba24edecb733221928db72ac2ef70d49 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164746Z 20170531/us-east-1/cloudsearch/aws4_request c4f696b60867ec7e47a76a49f514da0929ecb3ad52f6c0e6ff241e1a7672ed75 boto: DEBUG: Signature: 531f30315e10ff8e597f54c3b4c8f6d2ff2f6b493aed68e07567741c97566132 boto: DEBUG: Final headers: {'Content-Length': '71', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164746Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=531f30315e10ff8e597f54c3b4c8f6d2ff2f6b493aed68e07567741c97566132'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'dfa7c02f-4620-11e7-867a-13802a278839'), ('date', 'Wed, 31 May 2017 16:47:46 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"dfa7c02f-4620-11e7-867a-13802a278839"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_documentservice_creation (tests.unit.cloudsearch2.test_search.TestCloudSearchCreateDomain) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_connection.py", line 98, in test_cloudsearch_documentservice_creation api_response = self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 112, in create_domain path='/', params=params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 783, in _make_request body=json_body) JSONResponseError: JSONResponseError: 403 Forbidden {u'RequestId': u'dfe2a681-4620-11e7-b978-b914f30a36ba', u'Error': {u'Message': u'The security token included in the request is invalid.', u'Code': u'InvalidClientTokenId', u'Type': u'Sender'}} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2013-01-01', 'ContentType': 'JSON', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164746Z host;x-amz-date fc126cc3f87f020a25d41fd41069a0a2ba24edecb733221928db72ac2ef70d49 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164746Z 20170531/us-east-1/cloudsearch/aws4_request c4f696b60867ec7e47a76a49f514da0929ecb3ad52f6c0e6ff241e1a7672ed75 boto: DEBUG: Signature: 531f30315e10ff8e597f54c3b4c8f6d2ff2f6b493aed68e07567741c97566132 boto: DEBUG: Final headers: {'Content-Length': '71', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164746Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=531f30315e10ff8e597f54c3b4c8f6d2ff2f6b493aed68e07567741c97566132'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'dfe2a681-4620-11e7-b978-b914f30a36ba'), ('date', 'Wed, 31 May 2017 16:47:46 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"dfe2a681-4620-11e7-b978-b914f30a36ba"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cloudsearch_searchservice_creation (tests.unit.cloudsearch2.test_search.TestCloudSearchCreateDomain) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_connection.py", line 111, in test_cloudsearch_searchservice_creation api_response = self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 112, in create_domain path='/', params=params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 783, in _make_request body=json_body) JSONResponseError: JSONResponseError: 403 Forbidden {u'RequestId': u'e01e282b-4620-11e7-9de9-911eea54937f', u'Error': {u'Message': u'The security token included in the request is invalid.', u'Code': u'InvalidClientTokenId', u'Type': u'Sender'}} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2013-01-01', 'ContentType': 'JSON', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164747Z host;x-amz-date fc126cc3f87f020a25d41fd41069a0a2ba24edecb733221928db72ac2ef70d49 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164747Z 20170531/us-east-1/cloudsearch/aws4_request 0a5e47cc7296f7d40b1abd8d0108b31c640cddbe5057d024cce2eed8bc5a6367 boto: DEBUG: Signature: b4c915a06d4ce31a0347104138eb04f7eb2d9295dd325d5b71b4dc86a9da53da boto: DEBUG: Final headers: {'Content-Length': '71', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164747Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=b4c915a06d4ce31a0347104138eb04f7eb2d9295dd325d5b71b4dc86a9da53da'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e01e282b-4620-11e7-9de9-911eea54937f'), ('date', 'Wed, 31 May 2017 16:47:46 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"e01e282b-4620-11e7-9de9-911eea54937f"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_domain (tests.unit.cloudsearch2.test_search.TestCloudSearchCreateDomain) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearch2/test_connection.py", line 45, in test_create_domain self.service_connection.create_domain('demo') File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 112, in create_domain path='/', params=params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/layer1.py", line 783, in _make_request body=json_body) JSONResponseError: JSONResponseError: 403 Forbidden {u'RequestId': u'e051944b-4620-11e7-84af-23c87be953d5', u'Error': {u'Message': u'The security token included in the request is invalid.', u'Code': u'InvalidClientTokenId', u'Type': u'Sender'}} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudsearch.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudsearch.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDomain', 'Version': '2013-01-01', 'ContentType': 'JSON', 'DomainName': 'demo'} boto: DEBUG: establishing HTTPS connection: host=cloudsearch.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudsearch.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudsearch.us-east-1.amazonaws.com, certificate hosts=['cloudsearch.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudsearch.us-east-1.amazonaws.com x-amz-date:20170531T164747Z host;x-amz-date fc126cc3f87f020a25d41fd41069a0a2ba24edecb733221928db72ac2ef70d49 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164747Z 20170531/us-east-1/cloudsearch/aws4_request 0a5e47cc7296f7d40b1abd8d0108b31c640cddbe5057d024cce2eed8bc5a6367 boto: DEBUG: Signature: b4c915a06d4ce31a0347104138eb04f7eb2d9295dd325d5b71b4dc86a9da53da boto: DEBUG: Final headers: {'Content-Length': '71', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudsearch.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164747Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudsearch/aws4_request,SignedHeaders=host;x-amz-date,Signature=b4c915a06d4ce31a0347104138eb04f7eb2d9295dd325d5b71b4dc86a9da53da'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e051944b-4620-11e7-84af-23c87be953d5'), ('date', 'Wed, 31 May 2017 16:47:47 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"e051944b-4620-11e7-84af-23c87be953d5"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_search_with_auth (tests.unit.cloudsearchdomain.test_cloudsearchdomain.CloudSearchDomainConnectionTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearchdomain/test_cloudsearchdomain.py", line 88, in test_search_with_auth resp = search_service.search() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 336, in search return self(query) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 361, in __call__ data = self._search_with_auth(query.to_domain_connection_params()) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/search.py", line 339, in _search_with_auth return self.domain_connection.search(params.pop("q", ""), **params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearchdomain/layer1.py", line 428, in search params=query_params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearchdomain/layer1.py", line 535, in make_request self, verb, resource, headers=headers, data=data, params=params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1071, in make_request retry_handler=retry_handler) File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/__init__.py", line 38, in _mexe_spy return self.original_mexe(request, *args, **kwargs) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 913, in _mexe self.is_secure) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 705, in get_http_connection return self.new_http_connection(host, port, is_secure) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 747, in new_http_connection connection = self.proxy_ssl(host, is_secure and 443 or 80) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 816, in proxy_ssl resp.status, resp.reason)) error: [Errno -71] Error talking to HTTP proxy squid.internal:3128: 404 (Not Found) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://search-demo.us-east-1.cloudsearch.amazonaws.com/2013-01-01/search boto: DEBUG: Data: {} boto: DEBUG: Headers: {} boto: DEBUG: Host: search-demo.us-east-1.cloudsearch.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'q': '', 'start': 0, 'size': 10} boto: DEBUG: establishing HTTPS connection: host=search-demo.us-east-1.cloudsearch.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT search-demo.us-east-1.cloudsearch.amazonaws.com:443 HTTP/1.0 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_upload_documents_with_auth (tests.unit.cloudsearchdomain.test_cloudsearchdomain.CloudSearchDomainConnectionTest) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudsearchdomain/test_cloudsearchdomain.py", line 117, in test_upload_documents_with_auth resp = document_service.commit() File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 226, in commit r = self._commit_with_auth(sdf, api_version) File "/usr/lib/python2.7/dist-packages/boto/cloudsearch2/document.py", line 183, in _commit_with_auth return self.domain_connection.upload_documents(sdf, 'application/json') File "/usr/lib/python2.7/dist-packages/boto/cloudsearchdomain/layer1.py", line 528, in upload_documents params=query_params) File "/usr/lib/python2.7/dist-packages/boto/cloudsearchdomain/layer1.py", line 535, in make_request self, verb, resource, headers=headers, data=data, params=params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1071, in make_request retry_handler=retry_handler) File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/__init__.py", line 38, in _mexe_spy return self.original_mexe(request, *args, **kwargs) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 913, in _mexe self.is_secure) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 705, in get_http_connection return self.new_http_connection(host, port, is_secure) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 747, in new_http_connection connection = self.proxy_ssl(host, is_secure and 443 or 80) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 816, in proxy_ssl resp.status, resp.reason)) error: [Errno -71] Error talking to HTTP proxy squid.internal:3128: 404 (Not Found) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://search-demo.us-east-1.cloudsearch.amazonaws.com/2013-01-01/documents/batch boto: DEBUG: Data: [{"fields": {"category": ["cat_a", "cat_b", "cat_c"], "id": "1234", "title": "Title 1"}, "type": "add", "id": "1234"}] boto: DEBUG: Headers: {'Content-Type': 'application/json'} boto: DEBUG: Host: search-demo.us-east-1.cloudsearch.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=search-demo.us-east-1.cloudsearch.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT search-demo.us-east-1.cloudsearch.amazonaws.com:443 HTTP/1.0 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create (tests.unit.cloudtrail.test_layer1.TestCreateTrail) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudtrail/test_layer1.py", line 72, in test_create include_global_service_events=False) File "/usr/lib/python2.7/dist-packages/boto/cloudtrail/layer1.py", line 153, in create_trail body=json.dumps(params)) File "/usr/lib/python2.7/dist-packages/boto/cloudtrail/layer1.py", line 374, in make_request body=json_body) JSONResponseError: JSONResponseError: 400 Bad Request {u'message': u'The security token included in the request is invalid.', u'__type': u'UnrecognizedClientException'} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudtrail.us-east-1.amazonaws.com/ boto: DEBUG: Data: {"IncludeGlobalServiceEvents": false, "Name": "test", "SnsTopicName": "cloudtrail-1", "S3BucketName": "cloudtrail-1"} boto: DEBUG: Headers: {'Host': 'cloudtrail.us-east-1.amazonaws.com', 'Content-Type': 'application/x-amz-json-1.1', 'Content-Length': '117', 'X-Amz-Target': 'com.amazonaws.cloudtrail.v20131101.CloudTrail_20131101.CreateTrail'} boto: DEBUG: Host: cloudtrail.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=cloudtrail.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudtrail.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudtrail.us-east-1.amazonaws.com, certificate hosts=['cloudtrail.us-east-1.amazonaws.com', 'cloudtrail-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudtrail.us-east-1.amazonaws.com x-amz-date:20170531T164747Z x-amz-target:com.amazonaws.cloudtrail.v20131101.CloudTrail_20131101.CreateTrail host;x-amz-date;x-amz-target 8f3034ce15acade52dd8c3e6fb088a5a06652662ad4d85b4c963313ef52d68c6 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164747Z 20170531/us-east-1/cloudtrail/aws4_request 8d9dcc3fd11c9806313235c4fa87856bc354f7a972241368376e770007326f91 boto: DEBUG: Signature: f2b6aaa9a1eb74ca542c3b0924f1014ff534ab72f14757260db9afd12b8c1090 boto: DEBUG: Final headers: {'Content-Length': '117', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudtrail.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164747Z', 'X-Amz-Target': 'com.amazonaws.cloudtrail.v20131101.CloudTrail_20131101.CreateTrail', 'Content-Type': 'application/x-amz-json-1.1', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudtrail/aws4_request,SignedHeaders=host;x-amz-date;x-amz-target,Signature=f2b6aaa9a1eb74ca542c3b0924f1014ff534ab72f14757260db9afd12b8c1090'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e0999a79-4620-11e7-b0a7-a5d8d6108597'), ('date', 'Wed, 31 May 2017 16:47:47 GMT'), ('content-length', '107'), ('content-type', 'application/x-amz-json-1.1'), ('connection', 'close')] boto: DEBUG: {"__type":"UnrecognizedClientException","message":"The security token included in the request is invalid."} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe (tests.unit.cloudtrail.test_layer1.TestDescribeTrails) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudtrail/test_layer1.py", line 27, in test_describe api_response = self.service_connection.describe_trails() File "/usr/lib/python2.7/dist-packages/boto/cloudtrail/layer1.py", line 180, in describe_trails body=json.dumps(params)) File "/usr/lib/python2.7/dist-packages/boto/cloudtrail/layer1.py", line 374, in make_request body=json_body) JSONResponseError: JSONResponseError: 400 Bad Request {u'message': u'The security token included in the request is invalid.', u'__type': u'UnrecognizedClientException'} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudtrail.us-east-1.amazonaws.com/ boto: DEBUG: Data: {} boto: DEBUG: Headers: {'Host': 'cloudtrail.us-east-1.amazonaws.com', 'Content-Type': 'application/x-amz-json-1.1', 'Content-Length': '2', 'X-Amz-Target': 'com.amazonaws.cloudtrail.v20131101.CloudTrail_20131101.DescribeTrails'} boto: DEBUG: Host: cloudtrail.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=cloudtrail.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudtrail.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudtrail.us-east-1.amazonaws.com, certificate hosts=['cloudtrail.us-east-1.amazonaws.com', 'cloudtrail-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudtrail.us-east-1.amazonaws.com x-amz-date:20170531T164748Z x-amz-target:com.amazonaws.cloudtrail.v20131101.CloudTrail_20131101.DescribeTrails host;x-amz-date;x-amz-target 44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164748Z 20170531/us-east-1/cloudtrail/aws4_request a3e09185302875deb192b5237342fe925ccbf48c847423532b73fd3ec82377a0 boto: DEBUG: Signature: 7164ecd970440acb1c0283725f9e834dd7edaca390b3111ad034eee3f8cfb2ef boto: DEBUG: Final headers: {'Content-Length': '2', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudtrail.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164748Z', 'X-Amz-Target': 'com.amazonaws.cloudtrail.v20131101.CloudTrail_20131101.DescribeTrails', 'Content-Type': 'application/x-amz-json-1.1', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudtrail/aws4_request,SignedHeaders=host;x-amz-date;x-amz-target,Signature=7164ecd970440acb1c0283725f9e834dd7edaca390b3111ad034eee3f8cfb2ef'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e0d2d2f3-4620-11e7-b0a7-a5d8d6108597'), ('date', 'Wed, 31 May 2017 16:47:48 GMT'), ('content-length', '107'), ('content-type', 'application/x-amz-json-1.1'), ('connection', 'close')] boto: DEBUG: {"__type":"UnrecognizedClientException","message":"The security token included in the request is invalid."} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe_name_list (tests.unit.cloudtrail.test_layer1.TestDescribeTrails) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudtrail/test_layer1.py", line 40, in test_describe_name_list trail_name_list=['test']) File "/usr/lib/python2.7/dist-packages/boto/cloudtrail/layer1.py", line 180, in describe_trails body=json.dumps(params)) File "/usr/lib/python2.7/dist-packages/boto/cloudtrail/layer1.py", line 374, in make_request body=json_body) JSONResponseError: JSONResponseError: 400 Bad Request {u'message': u'The security token included in the request is invalid.', u'__type': u'UnrecognizedClientException'} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudtrail.us-east-1.amazonaws.com/ boto: DEBUG: Data: {"trailNameList": ["test"]} boto: DEBUG: Headers: {'Host': 'cloudtrail.us-east-1.amazonaws.com', 'Content-Type': 'application/x-amz-json-1.1', 'Content-Length': '27', 'X-Amz-Target': 'com.amazonaws.cloudtrail.v20131101.CloudTrail_20131101.DescribeTrails'} boto: DEBUG: Host: cloudtrail.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=cloudtrail.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudtrail.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudtrail.us-east-1.amazonaws.com, certificate hosts=['cloudtrail.us-east-1.amazonaws.com', 'cloudtrail-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudtrail.us-east-1.amazonaws.com x-amz-date:20170531T164748Z x-amz-target:com.amazonaws.cloudtrail.v20131101.CloudTrail_20131101.DescribeTrails host;x-amz-date;x-amz-target f5fd3b7456b941ee383d7321ce797fbdff38c88572f05bb3588bc67f427cedf2 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164748Z 20170531/us-east-1/cloudtrail/aws4_request cc7e03037558725da91be34945484dfede7fdb7fb3792c4fcfae995a8bfb68a4 boto: DEBUG: Signature: 05f7ebcfdcd66499d39bfbcce3362d73818d2712e340aa992ad5764551852b06 boto: DEBUG: Final headers: {'Content-Length': '27', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudtrail.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164748Z', 'X-Amz-Target': 'com.amazonaws.cloudtrail.v20131101.CloudTrail_20131101.DescribeTrails', 'Content-Type': 'application/x-amz-json-1.1', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudtrail/aws4_request,SignedHeaders=host;x-amz-date;x-amz-target,Signature=05f7ebcfdcd66499d39bfbcce3362d73818d2712e340aa992ad5764551852b06'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e10aab4e-4620-11e7-953d-0dd30633eb20'), ('date', 'Wed, 31 May 2017 16:47:48 GMT'), ('content-length', '107'), ('content-type', 'application/x-amz-json-1.1'), ('connection', 'close')] boto: DEBUG: {"__type":"UnrecognizedClientException","message":"The security token included in the request is invalid."} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe (tests.unit.directconnect.test_layer1.TestDescribeTrails) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/directconnect/test_layer1.py", line 50, in test_describe api_response = self.service_connection.describe_connections() File "/usr/lib/python2.7/dist-packages/boto/directconnect/layer1.py", line 504, in describe_connections body=json.dumps(params)) File "/usr/lib/python2.7/dist-packages/boto/directconnect/layer1.py", line 627, in make_request body=json_body) JSONResponseError: JSONResponseError: 400 Bad Request {u'message': u'The security token included in the request is invalid.', u'__type': u'UnrecognizedClientException'} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://directconnect.us-east-1.amazonaws.com/ boto: DEBUG: Data: {} boto: DEBUG: Headers: {'Host': 'directconnect.us-east-1.amazonaws.com', 'Content-Type': 'application/x-amz-json-1.1', 'Content-Length': '2', 'X-Amz-Target': 'OvertureService.DescribeConnections'} boto: DEBUG: Host: directconnect.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=directconnect.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT directconnect.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=directconnect.us-east-1.amazonaws.com, certificate hosts=['directconnect.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:directconnect.us-east-1.amazonaws.com x-amz-date:20170531T164749Z x-amz-target:OvertureService.DescribeConnections host;x-amz-date;x-amz-target 44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164749Z 20170531/us-east-1/directconnect/aws4_request 14b409e39f281a4480be07f0eaedfe2437171341930c5d6d8066dd86112de42d boto: DEBUG: Signature: 43b1f6ddf67c86c50d44a15cbb1114e8e7e86e5acc7c8250995b1f8d8a1d8dbd boto: DEBUG: Final headers: {'Content-Length': '2', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'directconnect.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164749Z', 'X-Amz-Target': 'OvertureService.DescribeConnections', 'Content-Type': 'application/x-amz-json-1.1', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/directconnect/aws4_request,SignedHeaders=host;x-amz-date;x-amz-target,Signature=43b1f6ddf67c86c50d44a15cbb1114e8e7e86e5acc7c8250995b1f8d8a1d8dbd'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e14606fe-4620-11e7-b0aa-bde51e4bd418'), ('date', 'Wed, 31 May 2017 16:47:48 GMT'), ('content-length', '107'), ('content-type', 'application/x-amz-json-1.1'), ('connection', 'close')] boto: DEBUG: {"__type":"UnrecognizedClientException","message":"The security token included in the request is invalid."} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_attach_instances (tests.unit.ec2.autoscale.test_group.TestAttachInstances) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 626, in test_attach_instances ['inst2', 'inst1', 'inst4'] File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 193, in attach_instances return self.get_status('AttachInstances', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e1bf2e88-4620-11e7-90e3-d95b8202201f -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'InstanceIds.member.1': 'inst2', 'InstanceIds.member.3': 'inst4', 'InstanceIds.member.2': 'inst1', 'AutoScalingGroupName': 'autoscale', 'Version': '2011-01-01', 'Action': 'AttachInstances'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=AttachInstances&AutoScalingGroupName=autoscale&InstanceIds.member.1=inst2&InstanceIds.member.2=inst1&InstanceIds.member.3=inst4&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164749Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164749Z 20170531/us-east-1/autoscaling/aws4_request 83bd197507899ba45e763681d1e5e141e67a24efd1aa6d9fcf79ae2fa2f601fb boto: DEBUG: Signature: fb4150498290b60588084faecc16dcad7b9bf32e4a1541b658ad351cbda64ee4 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=fb4150498290b60588084faecc16dcad7b9bf32e4a1541b658ad351cbda64ee4', 'X-Amz-Date': '20170531T164749Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e1bf2e88-4620-11e7-90e3-d95b8202201f'), ('date', 'Wed, 31 May 2017 16:47:49 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e1bf2e88-4620-11e7-90e3-d95b8202201f --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_autoscaling_group_single_vpc_zone_identifier (tests.unit.ec2.autoscale.test_group.TestAutoScaleGroup) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 79, in test_autoscaling_group_single_vpc_zone_identifier self.service_connection.create_auto_scaling_group(autoscale) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 220, in create_auto_scaling_group return self._update_group('CreateAutoScalingGroup', as_group) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 183, in _update_group return self.get_object(op, params, Request) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e1f7f1d2-4620-11e7-aa4f-95262a8a87b8 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Version': '2011-01-01', 'AutoScalingGroupName': 'foo', 'MinSize': None, 'MaxSize': None, 'VPCZoneIdentifier': 'vpc_zone_1', 'LaunchConfigurationName': None, 'Action': 'CreateAutoScalingGroup'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateAutoScalingGroup&AutoScalingGroupName=foo&LaunchConfigurationName=None&MaxSize=None&MinSize=None&VPCZoneIdentifier=vpc_zone_1&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164750Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164750Z 20170531/us-east-1/autoscaling/aws4_request 1c529cc9422f5e1d8af3df789846af8d1ab496233d2433166344878d79ee856d boto: DEBUG: Signature: d89d265efd5c60ceed591b2e1703d635037459d902c557e82242ab2b4d9af711 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=d89d265efd5c60ceed591b2e1703d635037459d902c557e82242ab2b4d9af711', 'X-Amz-Date': '20170531T164750Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e1f7f1d2-4620-11e7-aa4f-95262a8a87b8'), ('date', 'Wed, 31 May 2017 16:47:50 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e1f7f1d2-4620-11e7-aa4f-95262a8a87b8 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_autoscaling_group_vpc_zone_identifier_list (tests.unit.ec2.autoscale.test_group.TestAutoScaleGroup) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 91, in test_autoscaling_group_vpc_zone_identifier_list self.service_connection.create_auto_scaling_group(autoscale) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 220, in create_auto_scaling_group return self._update_group('CreateAutoScalingGroup', as_group) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 183, in _update_group return self.get_object(op, params, Request) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e2334d17-4620-11e7-8704-1f0766ac05ed -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Version': '2011-01-01', 'AutoScalingGroupName': 'foo', 'MinSize': None, 'MaxSize': None, 'VPCZoneIdentifier': 'vpc_zone_1,vpc_zone_2', 'LaunchConfigurationName': None, 'Action': 'CreateAutoScalingGroup'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateAutoScalingGroup&AutoScalingGroupName=foo&LaunchConfigurationName=None&MaxSize=None&MinSize=None&VPCZoneIdentifier=vpc_zone_1%2Cvpc_zone_2&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164750Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164750Z 20170531/us-east-1/autoscaling/aws4_request 65194ef08b00b907285498f67e81dbcb06ecd325996ba8b2dffa3e286d41a1ac boto: DEBUG: Signature: 337bf9f72f90267f6b11ad151f33fde9f9da4c1b8004a013249425de69a202cd boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=337bf9f72f90267f6b11ad151f33fde9f9da4c1b8004a013249425de69a202cd', 'X-Amz-Date': '20170531T164750Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e2334d17-4620-11e7-8704-1f0766ac05ed'), ('date', 'Wed, 31 May 2017 16:47:50 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e2334d17-4620-11e7-8704-1f0766ac05ed --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_autoscaling_group_vpc_zone_identifier_multi (tests.unit.ec2.autoscale.test_group.TestAutoScaleGroup) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 103, in test_autoscaling_group_vpc_zone_identifier_multi self.service_connection.create_auto_scaling_group(autoscale) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 220, in create_auto_scaling_group return self._update_group('CreateAutoScalingGroup', as_group) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 183, in _update_group return self.get_object(op, params, Request) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e2729fc3-4620-11e7-98ad-872e9f880d94 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Version': '2011-01-01', 'AutoScalingGroupName': 'foo', 'MinSize': None, 'MaxSize': None, 'VPCZoneIdentifier': 'vpc_zone_1,vpc_zone_2', 'LaunchConfigurationName': None, 'Action': 'CreateAutoScalingGroup'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateAutoScalingGroup&AutoScalingGroupName=foo&LaunchConfigurationName=None&MaxSize=None&MinSize=None&VPCZoneIdentifier=vpc_zone_1%2Cvpc_zone_2&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164750Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164750Z 20170531/us-east-1/autoscaling/aws4_request 65194ef08b00b907285498f67e81dbcb06ecd325996ba8b2dffa3e286d41a1ac boto: DEBUG: Signature: 337bf9f72f90267f6b11ad151f33fde9f9da4c1b8004a013249425de69a202cd boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=337bf9f72f90267f6b11ad151f33fde9f9da4c1b8004a013249425de69a202cd', 'X-Amz-Date': '20170531T164750Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e2729fc3-4620-11e7-98ad-872e9f880d94'), ('date', 'Wed, 31 May 2017 16:47:50 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e2729fc3-4620-11e7-98ad-872e9f880d94 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_autoscaling_group_with_termination_policies (tests.unit.ec2.autoscale.test_group.TestAutoScaleGroup) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 62, in test_autoscaling_group_with_termination_policies self.service_connection.create_auto_scaling_group(autoscale) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 220, in create_auto_scaling_group return self._update_group('CreateAutoScalingGroup', as_group) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 183, in _update_group return self.get_object(op, params, Request) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e2a76c07-4620-11e7-8af9-cf701bd22bee -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'MinSize': 1, 'Action': 'CreateAutoScalingGroup', 'MaxSize': 2, 'Version': '2011-01-01', 'TerminationPolicies.member.2': 'OldestLaunchConfiguration', 'TerminationPolicies.member.1': 'OldestInstance', 'InstanceId': 'test-id', 'LaunchConfigurationName': 'lauch_config', 'AutoScalingGroupName': 'foo'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateAutoScalingGroup&AutoScalingGroupName=foo&InstanceId=test-id&LaunchConfigurationName=lauch_config&MaxSize=2&MinSize=1&TerminationPolicies.member.1=OldestInstance&TerminationPolicies.member.2=OldestLaunchConfiguration&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164751Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164751Z 20170531/us-east-1/autoscaling/aws4_request abc8f2fdfa90ac18c3dbfd919e426235e16382197fe09c19dfba1d8df69fce14 boto: DEBUG: Signature: 3dcdd038db05df4a833ed1428f46d081781eea1583bbc5860f797d16fa6cea3a boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=3dcdd038db05df4a833ed1428f46d081781eea1583bbc5860f797d16fa6cea3a', 'X-Amz-Date': '20170531T164751Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e2a76c07-4620-11e7-8af9-cf701bd22bee'), ('date', 'Wed, 31 May 2017 16:47:50 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e2a76c07-4620-11e7-8af9-cf701bd22bee --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_honor_cooldown (tests.unit.ec2.autoscale.test_group.TestAutoScaleGroupHonorCooldown) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 125, in test_honor_cooldown self.service_connection.set_desired_capacity('foo', 10, True) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 841, in set_desired_capacity return self.get_status('SetDesiredCapacity', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e333581d-4620-11e7-b2da-ef1a2517e8c9 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'SetDesiredCapacity', 'Version': '2011-01-01', 'AutoScalingGroupName': 'foo', 'DesiredCapacity': 10, 'HonorCooldown': 'true'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=SetDesiredCapacity&AutoScalingGroupName=foo&DesiredCapacity=10&HonorCooldown=true&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164752Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164752Z 20170531/us-east-1/autoscaling/aws4_request ef96a0f9ae5260440748923d2ab4d9b217204ac6c2c301af26cd1229015e72ce boto: DEBUG: Signature: 35d3bd26d3ce9a8a754889686f39ad8cbed3213b10136ca1fc10617fd36d354a boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=35d3bd26d3ce9a8a754889686f39ad8cbed3213b10136ca1fc10617fd36d354a', 'X-Amz-Date': '20170531T164752Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e333581d-4620-11e7-b2da-ef1a2517e8c9'), ('date', 'Wed, 31 May 2017 16:47:51 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e333581d-4620-11e7-b2da-ef1a2517e8c9 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_or_update_tags (tests.unit.ec2.autoscale.test_group.TestAutoScalingTag) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 573, in test_create_or_update_tags response = self.service_connection.create_or_update_tags(tags) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 883, in create_or_update_tags return self.get_status('CreateOrUpdateTags', params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e36b0980-4620-11e7-ac6a-37558b48b1e4 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Tags.member.2.Value': 'sierra', 'Tags.member.2.ResourceType': 'auto-scaling-group', 'Tags.member.2.ResourceId': 'sg-00000000', 'Tags.member.2.Key': 'bravo', 'Tags.member.1.Key': 'alpha', 'Version': '2011-01-01', 'Tags.member.1.PropagateAtLaunch': 'true', 'Action': 'CreateOrUpdateTags', 'Tags.member.1.ResourceType': 'auto-scaling-group', 'Tags.member.2.PropagateAtLaunch': 'false', 'Tags.member.1.Value': 'tango', 'Tags.member.1.ResourceId': 'sg-00000000'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164752Z host;x-amz-date 7b8441bcb941f7761b4c770a9abc88ce524b3263afb7662ca986743b0aaee97f boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164752Z 20170531/us-east-1/autoscaling/aws4_request 23f6ad792f4774eae57fadb9d33b53e7bc40136604e3717bbb8fd29a91e68535 boto: DEBUG: Signature: 1f1f06e556ac0fd2da34bda22477343fafd73cefdb26f67ac5d0fea0f47a61e1 boto: DEBUG: Final headers: {'Content-Length': '386', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164752Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=1f1f06e556ac0fd2da34bda22477343fafd73cefdb26f67ac5d0fea0f47a61e1'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e36b0980-4620-11e7-ac6a-37558b48b1e4'), ('date', 'Wed, 31 May 2017 16:47:52 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e36b0980-4620-11e7-ac6a-37558b48b1e4 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_scaling_policy_with_min_adjustment_step (tests.unit.ec2.autoscale.test_group.TestCreateAutoScalePolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 436, in test_scaling_policy_with_min_adjustment_step self.service_connection.create_scaling_policy(policy) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 321, in create_scaling_policy return self.get_object('PutScalingPolicy', params, Request) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e3a37ece-4620-11e7-8cae-e51101f83b20 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'PolicyName': 'foo', 'MinAdjustmentStep': 30, 'AutoScalingGroupName': 'bar', 'Version': '2011-01-01', 'AdjustmentType': 'PercentChangeInCapacity', 'Action': 'PutScalingPolicy', 'ScalingAdjustment': 50} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=PutScalingPolicy&AdjustmentType=PercentChangeInCapacity&AutoScalingGroupName=bar&MinAdjustmentStep=30&PolicyName=foo&ScalingAdjustment=50&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164752Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164752Z 20170531/us-east-1/autoscaling/aws4_request d1968d46234b2b4bc4df3e5ebebc9174ddb401b4ff50779244d79335b59a34c2 boto: DEBUG: Signature: 55e88fce17b877de739026ca90ca720b85b57219769868c79ea20f6fde0b17b3 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=55e88fce17b877de739026ca90ca720b85b57219769868c79ea20f6fde0b17b3', 'X-Amz-Date': '20170531T164752Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e3a37ece-4620-11e7-8cae-e51101f83b20'), ('date', 'Wed, 31 May 2017 16:47:52 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e3a37ece-4620-11e7-8cae-e51101f83b20 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_scaling_policy_with_wrong_adjustment_type (tests.unit.ec2.autoscale.test_group.TestCreateAutoScalePolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 454, in test_scaling_policy_with_wrong_adjustment_type self.service_connection.create_scaling_policy(policy) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 321, in create_scaling_policy return self.get_object('PutScalingPolicy', params, Request) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e3ddefe1-4620-11e7-a107-4761894e3360 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'PolicyName': 'foo', 'AutoScalingGroupName': 'bar', 'Version': '2011-01-01', 'AdjustmentType': 'ChangeInCapacity', 'Action': 'PutScalingPolicy', 'ScalingAdjustment': 50} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=PutScalingPolicy&AdjustmentType=ChangeInCapacity&AutoScalingGroupName=bar&PolicyName=foo&ScalingAdjustment=50&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164753Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164753Z 20170531/us-east-1/autoscaling/aws4_request 65aad734673f0c69b0dedd632b0340cd2c06a38770b0b6f08f91d4d25216a408 boto: DEBUG: Signature: d662d2554b3dace47c443338569a542fd22230d0cbefe620a5af1b115657aa55 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=d662d2554b3dace47c443338569a542fd22230d0cbefe620a5af1b115657aa55', 'X-Amz-Date': '20170531T164753Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e3ddefe1-4620-11e7-a107-4761894e3360'), ('date', 'Wed, 31 May 2017 16:47:52 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e3ddefe1-4620-11e7-a107-4761894e3360 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_scaling_policy_without_min_adjustment_step (tests.unit.ec2.autoscale.test_group.TestCreateAutoScalePolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 470, in test_scaling_policy_without_min_adjustment_step self.service_connection.create_scaling_policy(policy) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 321, in create_scaling_policy return self.get_object('PutScalingPolicy', params, Request) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e4170159-4620-11e7-902a-fffc8ebd61cf -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'PolicyName': 'foo', 'AutoScalingGroupName': 'bar', 'Version': '2011-01-01', 'AdjustmentType': 'PercentChangeInCapacity', 'Action': 'PutScalingPolicy', 'ScalingAdjustment': 50} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=PutScalingPolicy&AdjustmentType=PercentChangeInCapacity&AutoScalingGroupName=bar&PolicyName=foo&ScalingAdjustment=50&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164753Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164753Z 20170531/us-east-1/autoscaling/aws4_request f6d199903ddb256cfc4bc5375f38a580b5c42ef8096198948443a6b465f7f557 boto: DEBUG: Signature: 753059f913e40693ef354d343534f4c3e17b100cc513a1ba56310239e369a51c boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=753059f913e40693ef354d343534f4c3e17b100cc513a1ba56310239e369a51c', 'X-Amz-Date': '20170531T164753Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e4170159-4620-11e7-902a-fffc8ebd61cf'), ('date', 'Wed, 31 May 2017 16:47:53 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e4170159-4620-11e7-902a-fffc8ebd61cf --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_autoscaling_group_put_notification_configuration (tests.unit.ec2.autoscale.test_group.TestDeleteNotificationConfiguration) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 532, in test_autoscaling_group_put_notification_configuration self.service_connection.delete_notification_configuration(autoscale, 'arn:aws:sns:us-east-1:19890506:AutoScaling-Up') File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 792, in delete_notification_configuration return self.get_status('DeleteNotificationConfiguration', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e450d5fe-4620-11e7-80b7-01da68c4d253 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DeleteNotificationConfiguration', 'Version': '2011-01-01', 'AutoScalingGroupName': 'ana', 'TopicARN': 'arn:aws:sns:us-east-1:19890506:AutoScaling-Up'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DeleteNotificationConfiguration&AutoScalingGroupName=ana&TopicARN=arn%3Aaws%3Asns%3Aus-east-1%3A19890506%3AAutoScaling-Up&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164754Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164754Z 20170531/us-east-1/autoscaling/aws4_request 1169c7d233aa803b63ff68c4fa6258ee69873af8f086742cc944b70bbddf9cab boto: DEBUG: Signature: 43b2b0e7e9c15653613485ccff2ff4adb6cc318d9bd7a346b682a79b4926d3f1 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=43b2b0e7e9c15653613485ccff2ff4adb6cc318d9bd7a346b682a79b4926d3f1', 'X-Amz-Date': '20170531T164754Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e450d5fe-4620-11e7-80b7-01da68c4d253'), ('date', 'Wed, 31 May 2017 16:47:53 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e450d5fe-4620-11e7-80b7-01da68c4d253 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_autoscaling_group_with_termination_policies (tests.unit.ec2.autoscale.test_group.TestDescribeTerminationPolicies) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 264, in test_autoscaling_group_with_termination_policies response = self.service_connection.get_termination_policies() File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 441, in get_termination_policies {}, TerminationPolicies) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e48d905a-4620-11e7-9079-172b78f467d2 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeTerminationPolicyTypes', 'Version': '2011-01-01'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeTerminationPolicyTypes&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164754Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164754Z 20170531/us-east-1/autoscaling/aws4_request 1708bb86c39fa57109e0510a77e19dcebc36fab2679f081bc4fdd532e760acff boto: DEBUG: Signature: 12dba9487c7c1b62f6f735a0290f078d382c1c98ce2e31ca840561e957979068 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=12dba9487c7c1b62f6f735a0290f078d382c1c98ce2e31ca840561e957979068', 'X-Amz-Date': '20170531T164754Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e48d905a-4620-11e7-9079-172b78f467d2'), ('date', 'Wed, 31 May 2017 16:47:54 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e48d905a-4620-11e7-9079-172b78f467d2 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_detach_instances (tests.unit.ec2.autoscale.test_group.TestDetachInstances) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 656, in test_detach_instances ['inst2', 'inst1', 'inst4'] File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 214, in detach_instances return self.get_status('DetachInstances', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e4c51b8a-4620-11e7-861b-f541af65057a -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'InstanceIds.member.1': 'inst2', 'InstanceIds.member.3': 'inst4', 'InstanceIds.member.2': 'inst1', 'AutoScalingGroupName': 'autoscale', 'Version': '2011-01-01', 'Action': 'DetachInstances', 'ShouldDecrementDesiredCapacity': 'true'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DetachInstances&AutoScalingGroupName=autoscale&InstanceIds.member.1=inst2&InstanceIds.member.2=inst1&InstanceIds.member.3=inst4&ShouldDecrementDesiredCapacity=true&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164754Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164754Z 20170531/us-east-1/autoscaling/aws4_request 56b244043bef47830126a7cefdbcfbeba11a0fe053e6f6fd89be8a201e5a6583 boto: DEBUG: Signature: eeba0286cedc0a9c181984cd9bfe4a28b70711ca1d449e351050f3130c01dae0 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=eeba0286cedc0a9c181984cd9bfe4a28b70711ca1d449e351050f3130c01dae0', 'X-Amz-Date': '20170531T164754Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e4c51b8a-4620-11e7-861b-f541af65057a'), ('date', 'Wed, 31 May 2017 16:47:54 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e4c51b8a-4620-11e7-861b-f541af65057a --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_detach_instances_with_decrement_desired_capacity (tests.unit.ec2.autoscale.test_group.TestDetachInstances) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 672, in test_detach_instances_with_decrement_desired_capacity True File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 214, in detach_instances return self.get_status('DetachInstances', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e4fe537c-4620-11e7-9257-2b9782e5240d -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'InstanceIds.member.1': 'inst2', 'InstanceIds.member.3': 'inst4', 'InstanceIds.member.2': 'inst1', 'AutoScalingGroupName': 'autoscale', 'Version': '2011-01-01', 'Action': 'DetachInstances', 'ShouldDecrementDesiredCapacity': 'true'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DetachInstances&AutoScalingGroupName=autoscale&InstanceIds.member.1=inst2&InstanceIds.member.2=inst1&InstanceIds.member.3=inst4&ShouldDecrementDesiredCapacity=true&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164755Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164755Z 20170531/us-east-1/autoscaling/aws4_request 1eee67a3a936928b6b84a360fa3154e216a9960f436488be942fd79597a25fcf boto: DEBUG: Signature: c78913a058971b9605b7700ca582948477f5d2d1c7f2195b4ccf77138140d4cc boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=c78913a058971b9605b7700ca582948477f5d2d1c7f2195b4ccf77138140d4cc', 'X-Amz-Date': '20170531T164755Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e4fe537c-4620-11e7-9257-2b9782e5240d'), ('date', 'Wed, 31 May 2017 16:47:55 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e4fe537c-4620-11e7-9257-2b9782e5240d --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_detach_instances_without_decrement_desired_capacity (tests.unit.ec2.autoscale.test_group.TestDetachInstances) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 688, in test_detach_instances_without_decrement_desired_capacity False File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 214, in detach_instances return self.get_status('DetachInstances', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e534cd54-4620-11e7-b526-bf9f9467bfe3 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'InstanceIds.member.1': 'inst2', 'InstanceIds.member.3': 'inst4', 'InstanceIds.member.2': 'inst1', 'AutoScalingGroupName': 'autoscale', 'Version': '2011-01-01', 'Action': 'DetachInstances', 'ShouldDecrementDesiredCapacity': 'false'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DetachInstances&AutoScalingGroupName=autoscale&InstanceIds.member.1=inst2&InstanceIds.member.2=inst1&InstanceIds.member.3=inst4&ShouldDecrementDesiredCapacity=false&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164755Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164755Z 20170531/us-east-1/autoscaling/aws4_request c2a06bc01f4694c065e67b7bf868f728cc8fa1d2fbeefbc52cfb0d8eabe1b706 boto: DEBUG: Signature: 54bc64e58bd768b02016070a348bdd8244d828d475a5e47016940ec210ae08ae boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=54bc64e58bd768b02016070a348bdd8244d828d475a5e47016940ec210ae08ae', 'X-Amz-Date': '20170531T164755Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e534cd54-4620-11e7-b526-bf9f9467bfe3'), ('date', 'Wed, 31 May 2017 16:47:55 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e534cd54-4620-11e7-b526-bf9f9467bfe3 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_autoscaling_group_put_notification_configuration (tests.unit.ec2.autoscale.test_group.TestGetAccountLimits) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 719, in test_autoscaling_group_put_notification_configuration limits = self.service_connection.get_account_limits() File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 300, in get_account_limits return self.get_object('DescribeAccountLimits', params, AccountLimits) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e56ca59a-4620-11e7-8157-535040e067f2 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeAccountLimits', 'Version': '2011-01-01'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeAccountLimits&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164755Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164755Z 20170531/us-east-1/autoscaling/aws4_request 389d199f220208ce71ca54a750e1e9809a47551250d9c9f04fc3da928387e2c0 boto: DEBUG: Signature: 3c90d93d64934cf827be44afecdafae0f9c011258a3d2bfe306b3933d16d7081 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=3c90d93d64934cf827be44afecdafae0f9c011258a3d2bfe306b3933d16d7081', 'X-Amz-Date': '20170531T164755Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e56ca59a-4620-11e7-8157-535040e067f2'), ('date', 'Wed, 31 May 2017 16:47:55 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e56ca59a-4620-11e7-8157-535040e067f2 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_autoscaling_adjustment_types (tests.unit.ec2.autoscale.test_group.TestGetAdjustmentTypes) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 757, in test_autoscaling_adjustment_types response = self.service_connection.get_all_adjustment_types() File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 497, in get_all_adjustment_types [('member', AdjustmentType)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e5a6a23c-4620-11e7-b2da-ef1a2517e8c9 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeAdjustmentTypes', 'Version': '2011-01-01'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeAdjustmentTypes&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164756Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164756Z 20170531/us-east-1/autoscaling/aws4_request ce69d5493a806aca5686c986d4bd028fa934ba10c56695a89ddfd376e5d9fac6 boto: DEBUG: Signature: b15c6dc9fc9e74b52ec889db3f40840c0adaed0356731e7d3a03326d1828af9f boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=b15c6dc9fc9e74b52ec889db3f40840c0adaed0356731e7d3a03326d1828af9f', 'X-Amz-Date': '20170531T164756Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e5a6a23c-4620-11e7-b2da-ef1a2517e8c9'), ('date', 'Wed, 31 May 2017 16:47:55 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e5a6a23c-4620-11e7-b2da-ef1a2517e8c9 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_launch_config (tests.unit.ec2.autoscale.test_group.TestLaunchConfiguration) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 382, in test_launch_config response = self.service_connection.create_launch_configuration(lc) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 292, in create_launch_configuration Request, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e5e94fbd-4620-11e7-a9ef-4d5474c08a93 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'SecurityGroups.member.1': 'group1', 'Version': '2011-01-01', 'ClassicLinkVPCId': 'vpc-1234', 'InstanceMonitoring.Enabled': 'false', 'VolumeType': 'atype', 'BlockDeviceMappings.member.1.Ebs.DeleteOnTermination': 'false', 'Action': 'CreateLaunchConfiguration', 'EbsOptimized': 'false', 'LaunchConfigurationName': 'launch_config', 'DeleteOnTermination': 'false', 'BlockDeviceMappings.member.1.Ebs.SnapshotId': 'snap-12345', 'AssociatePublicIpAddress': 'true', 'UserData': u'IyEvYmluL2Jhc2g=', 'ClassicLinkVPCSecurityGroups.member.1': 'classic_link_group', 'BlockDeviceMappings.member.1.DeviceName': '/dev/sdf', 'ImageId': '123456', 'Iops': 3000, 'InstanceType': 'm1.large', 'SpotPrice': 'price'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164756Z host;x-amz-date 2df7ee3b6c2fa63a56d99e9a8c5f0aedd175f5c11baf372b682d7c3746780236 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164756Z 20170531/us-east-1/autoscaling/aws4_request 0cb4e00ec733ab869a6358c53aea4cb84adf4b74fe4455befda9b956a3a9fcdb boto: DEBUG: Signature: 526ce21c29c0e0e58d337c8bd780d5392ea2916c23bfeb4736b57e264dc21ec7 boto: DEBUG: Final headers: {'Content-Length': '586', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164756Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=526ce21c29c0e0e58d337c8bd780d5392ea2916c23bfeb4736b57e264dc21ec7'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e5e94fbd-4620-11e7-a9ef-4d5474c08a93'), ('date', 'Wed, 31 May 2017 16:47:55 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e5e94fbd-4620-11e7-a9ef-4d5474c08a93 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_configuration_limited (tests.unit.ec2.autoscale.test_group.TestLaunchConfigurationDescribe) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 338, in test_get_all_configuration_limited response = self.service_connection.get_all_launch_configurations(max_records=10, names=["my-test1", "my-test2"]) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 399, in get_all_launch_configurations [('member', LaunchConfiguration)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e6208cd2-4620-11e7-99ce-e32862df6414 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeLaunchConfigurations', 'MaxRecords': 10, 'Version': '2011-01-01', 'LaunchConfigurationNames.member.2': 'my-test2', 'LaunchConfigurationNames.member.1': 'my-test1'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeLaunchConfigurations&LaunchConfigurationNames.member.1=my-test1&LaunchConfigurationNames.member.2=my-test2&MaxRecords=10&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164757Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164757Z 20170531/us-east-1/autoscaling/aws4_request 530431e4047c9d5cf77c0b75eb3746a717e3e6d9cab00eeed0f67c1f07ff646f boto: DEBUG: Signature: dad43afdcd3f6812743edc4cd8a7a9a118a19821168122bed77c4fe917f2b488 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=dad43afdcd3f6812743edc4cd8a7a9a118a19821168122bed77c4fe917f2b488', 'X-Amz-Date': '20170531T164757Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e6208cd2-4620-11e7-99ce-e32862df6414'), ('date', 'Wed, 31 May 2017 16:47:56 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e6208cd2-4620-11e7-99ce-e32862df6414 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_launch_configurations (tests.unit.ec2.autoscale.test_group.TestLaunchConfigurationDescribe) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 313, in test_get_all_launch_configurations response = self.service_connection.get_all_launch_configurations() File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 399, in get_all_launch_configurations [('member', LaunchConfiguration)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e65901c3-4620-11e7-884f-1b35d9d8df85 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeLaunchConfigurations', 'Version': '2011-01-01'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeLaunchConfigurations&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164757Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164757Z 20170531/us-east-1/autoscaling/aws4_request c946e63e75ca2ac2ac133a52f3967af8570d2ee29c042f87eebab511facf2c42 boto: DEBUG: Signature: 977fdb268464ff6c7e1b40b1e8a9546004a8bd7d0d17f3bb32e8bf032212d6b3 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=977fdb268464ff6c7e1b40b1e8a9546004a8bd7d0d17f3bb32e8bf032212d6b3', 'X-Amz-Date': '20170531T164757Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e65901c3-4620-11e7-884f-1b35d9d8df85'), ('date', 'Wed, 31 May 2017 16:47:57 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e65901c3-4620-11e7-884f-1b35d9d8df85 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_configuration_limited (tests.unit.ec2.autoscale.test_group.TestLaunchConfigurationDescribeWithBlockDeviceTypes) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 871, in test_get_all_configuration_limited response = self.service_connection.get_all_launch_configurations(max_records=10, names=["my-test1", "my-test2"]) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 399, in get_all_launch_configurations [('member', LaunchConfiguration)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e69239fe-4620-11e7-8157-535040e067f2 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeLaunchConfigurations', 'MaxRecords': 10, 'Version': '2011-01-01', 'LaunchConfigurationNames.member.2': 'my-test2', 'LaunchConfigurationNames.member.1': 'my-test1'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeLaunchConfigurations&LaunchConfigurationNames.member.1=my-test1&LaunchConfigurationNames.member.2=my-test2&MaxRecords=10&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164757Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164757Z 20170531/us-east-1/autoscaling/aws4_request 530431e4047c9d5cf77c0b75eb3746a717e3e6d9cab00eeed0f67c1f07ff646f boto: DEBUG: Signature: dad43afdcd3f6812743edc4cd8a7a9a118a19821168122bed77c4fe917f2b488 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=dad43afdcd3f6812743edc4cd8a7a9a118a19821168122bed77c4fe917f2b488', 'X-Amz-Date': '20170531T164757Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e69239fe-4620-11e7-8157-535040e067f2'), ('date', 'Wed, 31 May 2017 16:47:57 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e69239fe-4620-11e7-8157-535040e067f2 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_launch_configurations_with_block_device_types (tests.unit.ec2.autoscale.test_group.TestLaunchConfigurationDescribeWithBlockDeviceTypes) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 835, in test_get_all_launch_configurations_with_block_device_types response = self.service_connection.get_all_launch_configurations() File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 399, in get_all_launch_configurations [('member', LaunchConfiguration)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e6cc35c0-4620-11e7-8157-535040e067f2 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeLaunchConfigurations', 'Version': '2011-01-01'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeLaunchConfigurations&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164758Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164758Z 20170531/us-east-1/autoscaling/aws4_request b690a8f2a1736aaf457c40bf711f99000fddb8713412aad2b9170ade5a49e0fb boto: DEBUG: Signature: bfd7855e26ea28f6fa441c68afe8af8e7cf5d4de3e1c829761cd096a1f6e6eaf boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=bfd7855e26ea28f6fa441c68afe8af8e7cf5d4de3e1c829761cd096a1f6e6eaf', 'X-Amz-Date': '20170531T164758Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e6cc35c0-4620-11e7-8157-535040e067f2'), ('date', 'Wed, 31 May 2017 16:47:58 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e6cc35c0-4620-11e7-8157-535040e067f2 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_groups_is_parsed_correctly (tests.unit.ec2.autoscale.test_group.TestParseAutoScaleGroupResponse) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 220, in test_get_all_groups_is_parsed_correctly response = self.service_connection.get_all_groups(names=['test_group']) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 363, in get_all_groups [('member', AutoScalingGroup)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e70546f3-4620-11e7-aac4-4b3595235fec -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'AutoScalingGroupNames.member.1': 'test_group', 'Action': 'DescribeAutoScalingGroups', 'Version': '2011-01-01'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeAutoScalingGroups&AutoScalingGroupNames.member.1=test_group&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164758Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164758Z 20170531/us-east-1/autoscaling/aws4_request ccb4c819fd017677a0b9947deea3c989e10592a8cb417bdc37677bd1438b7eca boto: DEBUG: Signature: 1a48568aab881dc1ce26eaaa4e982640e56645a87224b30bcf203307a28ad1c8 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=1a48568aab881dc1ce26eaaa4e982640e56645a87224b30bcf203307a28ad1c8', 'X-Amz-Date': '20170531T164758Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e70546f3-4620-11e7-aac4-4b3595235fec'), ('date', 'Wed, 31 May 2017 16:47:57 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e70546f3-4620-11e7-aac4-4b3595235fec --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_autoscaling_group_put_notification_configuration (tests.unit.ec2.autoscale.test_group.TestPutNotificationConfiguration) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 502, in test_autoscaling_group_put_notification_configuration self.service_connection.put_notification_configuration(autoscale, 'arn:aws:sns:us-east-1:19890506:AutoScaling-Up', ['autoscaling:EC2_INSTANCE_LAUNCH']) File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 769, in put_notification_configuration return self.get_status('PutNotificationConfiguration', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e73f9183-4620-11e7-b70d-21d29f119ce3 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'PutNotificationConfiguration', 'NotificationTypes.member.1': 'autoscaling:EC2_INSTANCE_LAUNCH', 'Version': '2011-01-01', 'AutoScalingGroupName': 'ana', 'TopicARN': 'arn:aws:sns:us-east-1:19890506:AutoScaling-Up'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=PutNotificationConfiguration&AutoScalingGroupName=ana&NotificationTypes.member.1=autoscaling%3AEC2_INSTANCE_LAUNCH&TopicARN=arn%3Aaws%3Asns%3Aus-east-1%3A19890506%3AAutoScaling-Up&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164759Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164759Z 20170531/us-east-1/autoscaling/aws4_request 68737ae9ecbe27b1dc7ab7a28fc15c960f5ec611c9e8ba79f65487d0501ade08 boto: DEBUG: Signature: 02fead0bc22c3e485ca229baaf741b1796ed348ca10754d8ed5b9458a9923b71 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=02fead0bc22c3e485ca229baaf741b1796ed348ca10754d8ed5b9458a9923b71', 'X-Amz-Date': '20170531T164759Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e73f9183-4620-11e7-b70d-21d29f119ce3'), ('date', 'Wed, 31 May 2017 16:47:58 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e73f9183-4620-11e7-b70d-21d29f119ce3 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_scheduled_group_creation (tests.unit.ec2.autoscale.test_group.TestScheduledGroup) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/autoscale/test_group.py", line 158, in test_scheduled_group_creation recurrence='0 10 * * *') File "/usr/lib/python2.7/dist-packages/boto/ec2/autoscale/__init__.py", line 673, in create_scheduled_group_action return self.get_status('PutScheduledUpdateGroupAction', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. e7832a69-4620-11e7-936f-ad6c66bb46e2 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://autoscaling.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: autoscaling.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Recurrence': '0 10 * * *', 'DesiredCapacity': 1, 'AutoScalingGroupName': 'foo', 'MinSize': 1, 'MaxSize': 2, 'Version': '2011-01-01', 'ScheduledActionName': 'scheduled-foo', 'StartTime': '2013-01-01T22:55:31', 'Action': 'PutScheduledUpdateGroupAction', 'EndTime': '2013-02-01T22:55:31'} boto: DEBUG: establishing HTTPS connection: host=autoscaling.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT autoscaling.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=autoscaling.us-east-1.amazonaws.com, certificate hosts=['autoscaling.us-east-1.amazonaws.com', 'us-east-1.autoscaling.amazonaws.com', 'autoscaling.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=PutScheduledUpdateGroupAction&AutoScalingGroupName=foo&DesiredCapacity=1&EndTime=2013-02-01T22%3A55%3A31&MaxSize=2&MinSize=1&Recurrence=0%2010%20%2A%20%2A%20%2A&ScheduledActionName=scheduled-foo&StartTime=2013-01-01T22%3A55%3A31&Version=2011-01-01 host:autoscaling.us-east-1.amazonaws.com x-amz-date:20170531T164759Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164759Z 20170531/us-east-1/autoscaling/aws4_request f62b91c547446f15b8a68dc61c2d6a36e9cdcfb3d06ba884bac1ba85a202ae49 boto: DEBUG: Signature: b2de20d02cec1c7d450aee23dec388743b4af83ffd8a7c346f06517a3b20dfa9 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'autoscaling.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/autoscaling/aws4_request,SignedHeaders=host;x-amz-date,Signature=b2de20d02cec1c7d450aee23dec388743b4af83ffd8a7c346f06517a3b20dfa9', 'X-Amz-Date': '20170531T164759Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'e7832a69-4620-11e7-936f-ad6c66bb46e2'), ('date', 'Wed, 31 May 2017 16:47:58 GMT'), ('content-length', '313'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. e7832a69-4620-11e7-936f-ad6c66bb46e2 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_run_instances_block_device_mapping (tests.unit.ec2.test_blockdevicemapping.TestLaunchConfiguration) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_blockdevicemapping.py", line 121, in test_run_instances_block_device_mapping block_device_map=bdm File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 977, in run_instances verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials7392dd80-d324-4cb9-af22-c723d03eebf5 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'BlockDeviceMapping.2.Ebs.Encrypted': 'true', 'SecurityGroup.2': 'group2', 'BlockDeviceMapping.1.Ebs.SnapshotId': 'snap-12345', 'SecurityGroup.1': 'group1', 'MinCount': 1, 'BlockDeviceMapping.2.Ebs.DeleteOnTermination': 'true', 'BlockDeviceMapping.1.Ebs.DeleteOnTermination': 'false', 'ImageId': '123456', 'BlockDeviceMapping.1.DeviceName': '/dev/sdf', 'Version': '2014-10-01', 'MaxCount': 1, 'Action': 'RunInstances', 'BlockDeviceMapping.2.DeviceName': '/dev/sdg', 'BlockDeviceMapping.2.Ebs.SnapshotId': 'snap-12346', 'InstanceType': 'm1.large'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164759Z host;x-amz-date e7965b51a32be98a0fd2c51fd568e369110e614c2db4c18b1998ee960f3c95c5 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164759Z 20170531/us-east-1/ec2/aws4_request e468e803a74dfe841286f2b8982782a63557f6cc063037449863cd413f96402f boto: DEBUG: Signature: 13e0831a7195eb41e0d6bf25209be4cab03eed4aae040e8e89a2d0804ad0010f boto: DEBUG: Final headers: {'Content-Length': '468', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164759Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=13e0831a7195eb41e0d6bf25209be4cab03eed4aae040e8e89a2d0804ad0010f'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:47:59 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials7392dd80-d324-4cb9-af22-c723d03eebf5 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe_account_attributes (tests.unit.ec2.test_connection.TestAccountAttributes) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 663, in test_describe_account_attributes parsed = self.ec2.describe_account_attributes() File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4447, in describe_account_attributes [('item', AccountAttribute)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials252485a0-5407-4410-906d-54566401ccdb -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeAccountAttributes', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164800Z host;x-amz-date 96614d489925aee3cc2c59b8cf9a074db17b09cca584cef5161f50f89777c81b boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164800Z 20170531/us-east-1/ec2/aws4_request 9e100ffb95d6dd6b97a87831021a04e9f3c5b77d3dea27359eeae88b35e8a059 boto: DEBUG: Signature: 64a02ac230b751d2a6a9fc7ac4fec2cc9f2535185c51bf182c196edad28357ac boto: DEBUG: Final headers: {'Content-Length': '51', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164800Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=64a02ac230b751d2a6a9fc7ac4fec2cc9f2535185c51bf182c196edad28357ac'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:00 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials252485a0-5407-4410-906d-54566401ccdb --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_associate_address (tests.unit.ec2.test_connection.TestAssociateAddress) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1538, in test_associate_address public_ip='192.0.2.1') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 1967, in associate_address allow_reassociation=allow_reassociation, dry_run=dry_run) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 1916, in _associate_address return self.get_status('AssociateAddress', params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsb4725f88-d54e-4cfb-85de-fdc54d769856 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'InstanceId': 'i-1234', 'PublicIp': '192.0.2.1', 'Version': '2014-10-01', 'Action': 'AssociateAddress'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164800Z host;x-amz-date bc11b80f3521eed0c7f13752d21fd081573d75a5d3438e53ea92aa2c4b29cdc7 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164800Z 20170531/us-east-1/ec2/aws4_request 4836525dd140d21fb0747592858bd2d62507691a17d5a80e7f510490aea0cde6 boto: DEBUG: Signature: f45fdfb29eeaf9c23e2ed1cea986f3c830142f17d17572d57d0e7ab31ec4e219 boto: DEBUG: Final headers: {'Content-Length': '79', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164800Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=f45fdfb29eeaf9c23e2ed1cea986f3c830142f17d17572d57d0e7ab31ec4e219'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:00 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsb4725f88-d54e-4cfb-85de-fdc54d769856 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_associate_address_object (tests.unit.ec2.test_connection.TestAssociateAddress) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1544, in test_associate_address_object public_ip='192.0.2.1') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 2015, in associate_address_object allow_reassociation=allow_reassociation, dry_run=dry_run) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 1919, in _associate_address verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialse7f2356f-90c2-4ff1-9067-da26c50a11f0 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'InstanceId': 'i-1234', 'PublicIp': '192.0.2.1', 'Version': '2014-10-01', 'Action': 'AssociateAddress'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164801Z host;x-amz-date bc11b80f3521eed0c7f13752d21fd081573d75a5d3438e53ea92aa2c4b29cdc7 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164801Z 20170531/us-east-1/ec2/aws4_request a50fd69b601bdfe065093f1913c9f06f29579f2d04189094eaa7d6767fe52c6d boto: DEBUG: Signature: febc8c2c36ab084fe4754b64bbfe94d7b8e723f1437e6c91e0b4df829e914998 boto: DEBUG: Final headers: {'Content-Length': '79', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164801Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=febc8c2c36ab084fe4754b64bbfe94d7b8e723f1437e6c91e0b4df829e914998'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:01 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialse7f2356f-90c2-4ff1-9067-da26c50a11f0 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_associate_address (tests.unit.ec2.test_connection.TestAssociateAddressFail) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1566, in test_associate_address public_ip='192.0.2.1') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 1967, in associate_address allow_reassociation=allow_reassociation, dry_run=dry_run) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 1916, in _associate_address return self.get_status('AssociateAddress', params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials20c45ce3-f121-4c43-bc60-525056f2ed6f -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'InstanceId': 'i-1234', 'PublicIp': '192.0.2.1', 'Version': '2014-10-01', 'Action': 'AssociateAddress'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164801Z host;x-amz-date bc11b80f3521eed0c7f13752d21fd081573d75a5d3438e53ea92aa2c4b29cdc7 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164801Z 20170531/us-east-1/ec2/aws4_request a50fd69b601bdfe065093f1913c9f06f29579f2d04189094eaa7d6767fe52c6d boto: DEBUG: Signature: febc8c2c36ab084fe4754b64bbfe94d7b8e723f1437e6c91e0b4df829e914998 boto: DEBUG: Final headers: {'Content-Length': '79', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164801Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=febc8c2c36ab084fe4754b64bbfe94d7b8e723f1437e6c91e0b4df829e914998'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:00 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials20c45ce3-f121-4c43-bc60-525056f2ed6f --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_reserved_instances_listing (tests.unit.ec2.test_connection.TestCancelReservedInstancesListing) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 266, in test_reserved_instances_listing response = self.ec2.cancel_reserved_instances_listing() File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 3793, in cancel_reserved_instances_listing params, [('item', ReservedInstanceListing)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialse6b90510-1397-4562-9b57-d9a76700ddd0 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CancelReservedInstancesListing', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164801Z host;x-amz-date f2434c383c111c51b403ee4773603006e3f43d2670f64af6174158889331dda9 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164801Z 20170531/us-east-1/ec2/aws4_request f196a3e107fbdc42cc4098b78b572b3d1aad8504510f66cd0572d31b5a7f9240 boto: DEBUG: Signature: 0319d23b4c83b4d33d423ca6258d9ef1b9387e6da945641e1d2bff376cc0229d boto: DEBUG: Final headers: {'Content-Length': '56', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164801Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=0319d23b4c83b4d33d423ca6258d9ef1b9387e6da945641e1d2bff376cc0229d'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:01 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialse6b90510-1397-4562-9b57-d9a76700ddd0 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_copy_image_client_token (tests.unit.ec2.test_connection.TestCopyImage) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 561, in test_copy_image_client_token copied_ami = self.ec2.copy_image('us-west-2', 'ami-id', client_token='client-token') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4433, in copy_image verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsce2ae10c-a335-409a-b5ec-338471c5a7b9 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'SourceImageId': 'ami-id', 'Action': 'CopyImage', 'SourceRegion': 'us-west-2', 'Version': '2014-10-01', 'ClientToken': 'client-token'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164802Z host;x-amz-date e560ce40b517983da503baec43f847e07ca806adf3aa46879fd017c0be65fb8b boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164802Z 20170531/us-east-1/ec2/aws4_request 76f93dff78e110cb5b0dc8797602882e624a2e73af7dabb33b24f5f4dfc3b50d boto: DEBUG: Signature: 952ea921952cfe01ba7376b35c63787bcfe0238cd0d278e8c1f6a7b2265ecf84 boto: DEBUG: Final headers: {'Content-Length': '104', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164802Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=952ea921952cfe01ba7376b35c63787bcfe0238cd0d278e8c1f6a7b2265ecf84'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:01 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsce2ae10c-a335-409a-b5ec-338471c5a7b9 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_copy_image_encrypted (tests.unit.ec2.test_connection.TestCopyImage) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 574, in test_copy_image_encrypted copied_ami = self.ec2.copy_image('us-west-2', 'ami-id', encrypted=True) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4433, in copy_image verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials5c621e64-4c21-4f2e-8547-53262c51cfaa -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'SourceImageId': 'ami-id', 'Encrypted': 'true', 'SourceRegion': 'us-west-2', 'Action': 'CopyImage', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164803Z host;x-amz-date b12b5e07f857b33a216011288ac9503d60476484848343763b213748ad8c1bb7 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164803Z 20170531/us-east-1/ec2/aws4_request e9ef1d35a6de03441e7c643d8a3c209ef916a7cb9a749d519fd459dada587912 boto: DEBUG: Signature: 00133ffac2bd91f90d3d6d4ab765f5e157cf532bfcf9aa5e5c9c93192bbe6a4d boto: DEBUG: Final headers: {'Content-Length': '94', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164803Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=00133ffac2bd91f90d3d6d4ab765f5e157cf532bfcf9aa5e5c9c93192bbe6a4d'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:02 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials5c621e64-4c21-4f2e-8547-53262c51cfaa --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_copy_image_encrypted_with_kms_key (tests.unit.ec2.test_connection.TestCopyImage) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 602, in test_copy_image_encrypted_with_kms_key copied_ami = self.ec2.copy_image('us-west-2', 'ami-id', encrypted=False, kms_key_id='kms-key') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4433, in copy_image verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials2cfd7610-b7ca-4fe3-99fa-d4472272656f -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Version': '2014-10-01', 'Encrypted': 'false', 'SourceImageId': 'ami-id', 'SourceRegion': 'us-west-2', 'KmsKeyId': 'kms-key', 'Action': 'CopyImage'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164803Z host;x-amz-date aeacee5697437040382827d229a3e399e6e9b726a91536d44ab75f5030bd7a59 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164803Z 20170531/us-east-1/ec2/aws4_request a9d0479b9c444325079e16f590f9c1fb85ee0d7013376a8072131b5412e973de boto: DEBUG: Signature: 6d637020595c7566e7285ca98fe8f0212c4000541fc72be0a8e143fcb1258737 boto: DEBUG: Final headers: {'Content-Length': '112', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164803Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=6d637020595c7566e7285ca98fe8f0212c4000541fc72be0a8e143fcb1258737'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:02 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials2cfd7610-b7ca-4fe3-99fa-d4472272656f --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_copy_image_name_and_description (tests.unit.ec2.test_connection.TestCopyImage) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 547, in test_copy_image_name_and_description copied_ami = self.ec2.copy_image('us-west-2', 'ami-id', 'name', 'description') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4433, in copy_image verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials016cc1de-9704-40d0-ac48-62957823b8dc -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Version': '2014-10-01', 'Name': 'name', 'SourceImageId': 'ami-id', 'SourceRegion': 'us-west-2', 'Action': 'CopyImage', 'Description': 'description'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164803Z host;x-amz-date 7e00bfaa7b19719ecccebb9143ef5c0c6373269efe1647912ca6c3329ed6d145 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164803Z 20170531/us-east-1/ec2/aws4_request 08f1ffbbd14a6732004a5a29bbc105441acf27f315955fa16d191e0968ba523a boto: DEBUG: Signature: fd263cd2cb5f2643f0d2140d73f625964f4122018c7f107dabc81cbbc048e38f boto: DEBUG: Final headers: {'Content-Length': '113', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164803Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=fd263cd2cb5f2643f0d2140d73f625964f4122018c7f107dabc81cbbc048e38f'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:03 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials016cc1de-9704-40d0-ac48-62957823b8dc --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_copy_image_not_encrypted (tests.unit.ec2.test_connection.TestCopyImage) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 588, in test_copy_image_not_encrypted copied_ami = self.ec2.copy_image('us-west-2', 'ami-id', encrypted=False) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4433, in copy_image verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials479a37d7-a0ae-46c7-b241-8d1b46f5be3d -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'SourceImageId': 'ami-id', 'Encrypted': 'false', 'SourceRegion': 'us-west-2', 'Action': 'CopyImage', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164804Z host;x-amz-date db30ef2edb454a866815477aaeec47fb3bf4923fa6e0723da0a83b405e938da8 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164804Z 20170531/us-east-1/ec2/aws4_request 655cd81703697434a6059fd42b495523276247e6f4115040318354f5f27e3721 boto: DEBUG: Signature: 3b17a6ffe0aaed168c48c9d3876f92e218631dd34025f7a3af8cec1668351ee0 boto: DEBUG: Final headers: {'Content-Length': '95', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164804Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=3b17a6ffe0aaed168c48c9d3876f92e218631dd34025f7a3af8cec1668351ee0'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:04 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials479a37d7-a0ae-46c7-b241-8d1b46f5be3d --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_copy_image_required_params (tests.unit.ec2.test_connection.TestCopyImage) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 535, in test_copy_image_required_params copied_ami = self.ec2.copy_image('us-west-2', 'ami-id') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4433, in copy_image verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsd9c7c7ce-56fe-4e32-8f8b-fa743b11e890 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'SourceImageId': 'ami-id', 'Action': 'CopyImage', 'SourceRegion': 'us-west-2', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164804Z host;x-amz-date e1d7b1cdecd65bdbf8f2761245953e8ed5ad431174d1189a5b47c573468608f3 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164804Z 20170531/us-east-1/ec2/aws4_request 0449ad6b095938dab0c2aa93e2d588cdccaa1ef2a364324b78945584dbf55a4b boto: DEBUG: Signature: 4e2aa0fb61ff4c019000ddb1e98495cef03058300db895314a7a637e90f92c09 boto: DEBUG: Final headers: {'Content-Length': '79', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164804Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=4e2aa0fb61ff4c019000ddb1e98495cef03058300db895314a7a637e90f92c09'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:04 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsd9c7c7ce-56fe-4e32-8f8b-fa743b11e890 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_copy_snapshot (tests.unit.ec2.test_connection.TestCopySnapshot) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 511, in test_copy_snapshot 'description') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 2555, in copy_snapshot verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials22812625-51b9-4797-9de3-1d5b891b5120 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'SourceSnapshotId': 'snap-id', 'Action': 'CopySnapshot', 'SourceRegion': 'us-west-2', 'Version': '2014-10-01', 'Description': 'description'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164804Z host;x-amz-date 9bb231f31216566dbc4d568526fb726bf3a8985e26dd18930887c08bd96c6aeb boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164804Z 20170531/us-east-1/ec2/aws4_request 908491a60a86a12d23144501e38e22449ba5272b8ff505dc9ce5786568a3832d boto: DEBUG: Signature: 5289e392dc350ed1891b970e159c4f16a6e2c6bb2d7624c4fbc8a603088e037b boto: DEBUG: Final headers: {'Content-Length': '110', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164804Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=5289e392dc350ed1891b970e159c4f16a6e2c6bb2d7624c4fbc8a603088e037b'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:05 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials22812625-51b9-4797-9de3-1d5b891b5120 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_block_device_mapping (tests.unit.ec2.test_connection.TestCreateImage) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 182, in test_block_device_mapping 'instance_id', 'name', block_device_mapping=bdm) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 443, in create_image img = self.get_object('CreateImage', params, Image, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials831e13eb-d939-4d66-94b7-0c8de8a7e5b8 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Name': 'name', 'InstanceId': 'instance_id', 'BlockDeviceMapping.1.Ebs.DeleteOnTermination': 'false', 'BlockDeviceMapping.1.DeviceName': 'test', 'Version': '2014-10-01', 'Action': 'CreateImage'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164805Z host;x-amz-date 9fe9e7acaab013d53125271104f1f938605eddb074c59516b77fa561e4c70316 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164805Z 20170531/us-east-1/ec2/aws4_request aa1d77fbdd50ab7340b3407938067a9d0ad726b1f0f7938cba6124cf63ab94fa boto: DEBUG: Signature: 4dbc972457eb2058672ae1622c941b1e43edcd648fca51940e743ec9fb16dfdb boto: DEBUG: Final headers: {'Content-Length': '158', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164805Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=4dbc972457eb2058672ae1622c941b1e43edcd648fca51940e743ec9fb16dfdb'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:04 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials831e13eb-d939-4d66-94b7-0c8de8a7e5b8 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_minimal (tests.unit.ec2.test_connection.TestCreateImage) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 168, in test_minimal 'instance_id', 'name') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 443, in create_image img = self.get_object('CreateImage', params, Image, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials43e1e07b-002a-46f7-8ecd-33441c28da4e -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'InstanceId': 'instance_id', 'Action': 'CreateImage', 'Version': '2014-10-01', 'Name': 'name'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164805Z host;x-amz-date 43bbde06dbef793d8ebcf45d11cb44a49f9c081bc44f8764f0d8b9da7d5c0899 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164805Z 20170531/us-east-1/ec2/aws4_request d8e2c957c882adae0b814ee2570b97f8834fed83894dd7618411e43be2c97e23 boto: DEBUG: Signature: 1721c3f9cd32f6b5ab72324c4825e011bcec7534034d1a42871c6203db7df953 boto: DEBUG: Final headers: {'Content-Length': '70', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164805Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=1721c3f9cd32f6b5ab72324c4825e011bcec7534034d1a42871c6203db7df953'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:05 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials43e1e07b-002a-46f7-8ecd-33441c28da4e --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_reserved_instances_listing (tests.unit.ec2.test_connection.TestCreateReservedInstancesListing) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 392, in test_create_reserved_instances_listing 'instance_id', 1, [('2.5', 11), ('2.0', 8)], 'client_token') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 3767, in create_reserved_instances_listing params, [('item', ReservedInstanceListing)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsdfdf1c1f-49c7-4e45-8ea9-7bc397fd6bc6 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'ReservedInstancesId': 'instance_id', 'InstanceCount': '1', 'Version': '2014-10-01', 'PriceSchedules.1.Term': '8', 'PriceSchedules.0.Price': '2.5', 'ClientToken': 'client_token', 'Action': 'CreateReservedInstancesListing', 'PriceSchedules.0.Term': '11', 'PriceSchedules.1.Price': '2.0'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164806Z host;x-amz-date a97ee62924e4eb9be17375f113368b62651575bebb5a575b980719d6d379774e boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164806Z 20170531/us-east-1/ec2/aws4_request 2f2be3734d32e39eaae1636737f3a3ee6e8328bd212fa77a627b3bbc0492eb3a boto: DEBUG: Signature: c95bdc47cd2fa0fc1df0af0fd27eb470d3a9bc0287c54d1ef53efd6b9fcb766c boto: DEBUG: Final headers: {'Content-Length': '232', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164806Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=c95bdc47cd2fa0fc1df0af0fd27eb470d3a9bc0287c54d1ef53efd6b9fcb766c'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:05 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsdfdf1c1f-49c7-4e45-8ea9-7bc397fd6bc6 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_volume (tests.unit.ec2.test_connection.TestCreateVolume) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1709, in test_create_volume encrypted=True) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 2331, in create_volume return self.get_object('CreateVolume', params, Volume, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials95e2c6ea-b274-4a19-8445-956b3949bbcb -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'AvailabilityZone': 'us-east-1e', 'Encrypted': 'true', 'Version': '2014-10-01', 'Action': 'CreateVolume', 'SnapshotId': 'snap-1a2b3c4d', 'Size': 80} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164806Z host;x-amz-date 9a9738e88d891452cfef51e16fd61fa7f82ca1b7f6070ba28197e1f34579061d boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164806Z 20170531/us-east-1/ec2/aws4_request 49f73a6d104440145808861913e45dc2da2123be8cbef147f252509eef6f1d13 boto: DEBUG: Signature: b38e9fbebd4c84dbe92fc70238bcda8a2a0a9a7bf4182a70f6385b51b5c1a160 boto: DEBUG: Final headers: {'Content-Length': '114', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164806Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=b38e9fbebd4c84dbe92fc70238bcda8a2a0a9a7bf4182a70f6385b51b5c1a160'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:05 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials95e2c6ea-b274-4a19-8445-956b3949bbcb --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_volume_with_specify_kms (tests.unit.ec2.test_connection.TestCreateVolume) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1725, in test_create_volume_with_specify_kms encrypted=True,kms_key_id='arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 2331, in create_volume return self.get_object('CreateVolume', params, Volume, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials38ea3c57-c5ac-4899-9258-c7d692a93103 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'AvailabilityZone': 'us-east-1e', 'Version': '2014-10-01', 'Encrypted': 'true', 'KmsKeyId': 'arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef', 'Action': 'CreateVolume', 'SnapshotId': 'snap-1a2b3c4d', 'Size': 80} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164806Z host;x-amz-date 94f7b819b8f381359c8a7d0b62cddce70ce567f35b97bf084c0adb9b76985da8 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164806Z 20170531/us-east-1/ec2/aws4_request e7cbb35e17f870d1aa62e9df79292d9568896ecd89dde17e6b94dfe294b3b17e boto: DEBUG: Signature: b9693ed66703aeeb1dae06e2417a992932216415641ef69c7fece9451f8c2b67 boto: DEBUG: Final headers: {'Content-Length': '211', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164806Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=b9693ed66703aeeb1dae06e2417a992932216415641ef69c7fece9451f8c2b67'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:06 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials38ea3c57-c5ac-4899-9258-c7d692a93103 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_default_behavior (tests.unit.ec2.test_connection.TestDescribeInstances) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1431, in test_default_behavior self.ec2.get_all_instances() File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 585, in get_all_instances max_results=max_results) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 681, in get_all_reservations [('item', Reservation)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials4899f102-133d-475a-9a6b-f58a177185a4 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeInstances', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164807Z host;x-amz-date 478363e4162398f50a78678e9baea952fcf681805b47686d85835217ea6b0866 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164807Z 20170531/us-east-1/ec2/aws4_request fbacd66a51accdf160b39ae730440948cc367d7af5ed50d6986da2aa4c58aa78 boto: DEBUG: Signature: 319aec599727eead1733573258a1cb45832f4b20b82f6f4bdeb5548b872c8784 boto: DEBUG: Final headers: {'Content-Length': '43', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164807Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=319aec599727eead1733573258a1cb45832f4b20b82f6f4bdeb5548b872c8784'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:06 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials4899f102-133d-475a-9a6b-f58a177185a4 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_max_results (tests.unit.ec2.test_connection.TestDescribeInstances) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1452, in test_max_results max_results=10 File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 585, in get_all_instances max_results=max_results) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 681, in get_all_reservations [('item', Reservation)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials32a5effd-50f0-4a68-b5fe-4edc57ea9015 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeInstances', 'Version': '2014-10-01', 'MaxResults': 10} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164807Z host;x-amz-date d2704fad03c6904857d1ad715a227af0b197664093d355aa52805f1294fcbc4b boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164807Z 20170531/us-east-1/ec2/aws4_request 60b5586cdd25c0961f8989a63b0b8c072a2d1e11f3dd32f9e186b0b280dec905 boto: DEBUG: Signature: b71082f472f80c11c0c1b413aca75ee9589d2ba5af6502ad7e945b6c0999d0e6 boto: DEBUG: Final headers: {'Content-Length': '57', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164807Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=b71082f472f80c11c0c1b413aca75ee9589d2ba5af6502ad7e945b6c0999d0e6'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:07 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials32a5effd-50f0-4a68-b5fe-4edc57ea9015 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_next_token (tests.unit.ec2.test_connection.TestDescribeInstances) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1463, in test_next_token next_token='abcdefgh', File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 681, in get_all_reservations [('item', Reservation)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials6c7f95d2-aa87-4235-9a9c-9a8b5520371a -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeInstances', 'NextToken': 'abcdefgh', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164808Z host;x-amz-date 6ee6a324d8b0066f5a87bbea52a5bd7adf1df662d71e6aa48dd3897a6d210c64 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164808Z 20170531/us-east-1/ec2/aws4_request 39bf4055df56f439150329160ebb4ee4122c626bf8f6e8df7866323a21aa27cc boto: DEBUG: Signature: e2cce3f19ec8eb6cecc67d03481d5817eb48f431af58413ec86d420b552483a7 boto: DEBUG: Final headers: {'Content-Length': '62', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164808Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=e2cce3f19ec8eb6cecc67d03481d5817eb48f431af58413ec86d420b552483a7'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:07 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials6c7f95d2-aa87-4235-9a9c-9a8b5520371a --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_serialized_api_args (tests.unit.ec2.test_connection.TestDescribeReservedInstancesModifications) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1234, in test_serialized_api_args 'status': 'processing', File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 3879, in describe_reserved_instances_modifications verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsd2b5a772-c295-4187-ad49-0e7a1078db60 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeReservedInstancesModifications', 'ReservedInstancesModificationId.1': '2567o137-8a55-48d6-82fb-7258506bb497', 'Filter.1.Value.1': 'processing', 'Version': '2014-10-01', 'Filter.1.Name': 'status'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164808Z host;x-amz-date bf756293b292a098c51de402db9084c2a54dc4c0cc1b9f16effafcb7984b055f boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164808Z 20170531/us-east-1/ec2/aws4_request fa278e36a199192160bd64333d19374e4c925fc4f3a449e60e737a557c64dea0 boto: DEBUG: Signature: a6c24a9c6f69b971c0f92e91c7b066889c2b2badd2b1644d855844bdd3f1c7ad boto: DEBUG: Final headers: {'Content-Length': '184', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164808Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=a6c24a9c6f69b971c0f92e91c7b066889c2b2badd2b1644d855844bdd3f1c7ad'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:08 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsd2b5a772-c295-4187-ad49-0e7a1078db60 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_snapshots (tests.unit.ec2.test_connection.TestDescribeSnapshots) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1675, in test_get_all_snapshots result = self.ec2.get_all_snapshots(snapshot_ids=['snap-1a2b3c4d', 'snap-5e6f7a8b']) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 2476, in get_all_snapshots [('item', Snapshot)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials17261c9b-c041-4f4c-a15b-d79e739ede18 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'SnapshotId.1': 'snap-1a2b3c4d', 'Action': 'DescribeSnapshots', 'SnapshotId.2': 'snap-5e6f7a8b', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164808Z host;x-amz-date 824bac4fb4c248a12dcc3405ad0a3f680be1f9e8f59e86671b90111e4c0d10f0 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164808Z 20170531/us-east-1/ec2/aws4_request fe5a157353f7b9688eee85e626e8e19d2beab43fd7d555a090a0f35646b0a0b2 boto: DEBUG: Signature: 49752b0eb8a2fdd4a3484a9d3fe796d9bc4e60b3ca771f4af2a0f111422f087b boto: DEBUG: Final headers: {'Content-Length': '97', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164808Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=49752b0eb8a2fdd4a3484a9d3fe796d9bc4e60b3ca771f4af2a0f111422f087b'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:07 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials17261c9b-c041-4f4c-a15b-d79e739ede18 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe_spot_instance_requets (tests.unit.ec2.test_connection.TestDescribeSpotInstanceRequests) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 464, in test_describe_spot_instance_requets response = self.ec2.get_all_spot_instance_requests() File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 1344, in get_all_spot_instance_requests [('item', SpotInstanceRequest)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsad6c0294-d0f1-4fde-a0fd-6afcc942eb06 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeSpotInstanceRequests', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164809Z host;x-amz-date b820304325d57c9ee72d78d501e510520670779b53258b241349976bd30c14ce boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164809Z 20170531/us-east-1/ec2/aws4_request 7b4f885dffab3d15d9099f896548dab81b64a34c4c5c43f7eb217531f6b1f7ba boto: DEBUG: Signature: 82448ba56e5f8fce49aa0ecb5ed722ae0a82f715bbec92cd01e96a22460f0d8b boto: DEBUG: Final headers: {'Content-Length': '54', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164809Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=82448ba56e5f8fce49aa0ecb5ed722ae0a82f715bbec92cd01e96a22460f0d8b'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:08 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsad6c0294-d0f1-4fde-a0fd-6afcc942eb06 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_default_behavior (tests.unit.ec2.test_connection.TestDescribeTags) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1482, in test_default_behavior self.ec2.get_all_tags() File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4195, in get_all_tags [('item', Tag)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials52ad9765-d334-499d-9879-680e57b49081 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeTags', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164809Z host;x-amz-date dafefa9ab2e7fc1a545cd6a8b79e028e346b125f81ebccb2582510f643f27ad1 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164809Z 20170531/us-east-1/ec2/aws4_request d50ec39b9d056ff2ad04aae5d6140db1c9a8dd336256a4f752f943d9c34401d5 boto: DEBUG: Signature: 84bb1aaf6f2c356487f55f747ea47566a63de0be640f385353aee7a8d73297a7 boto: DEBUG: Final headers: {'Content-Length': '38', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164809Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=84bb1aaf6f2c356487f55f747ea47566a63de0be640f385353aee7a8d73297a7'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:09 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials52ad9765-d334-499d-9879-680e57b49081 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_max_results (tests.unit.ec2.test_connection.TestDescribeTags) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1491, in test_max_results max_results=10 File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4195, in get_all_tags [('item', Tag)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials3c7e3ca3-7904-405e-82fe-ab4409cab413 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeTags', 'Version': '2014-10-01', 'MaxResults': 10} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164809Z host;x-amz-date 50f76bf097c2109753198881ff60b615ce6567499f690c375b6b7374e2535d0d boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164809Z 20170531/us-east-1/ec2/aws4_request 5fe0aef0fca16ab5a40ac4ef493abd09a432b160ce3e167ebc1cc7395cf54953 boto: DEBUG: Signature: 67e9465049c2646d664fce74e544e5b3b2a443226bc157ca4beec2ce00b64df2 boto: DEBUG: Final headers: {'Content-Length': '52', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164809Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=67e9465049c2646d664fce74e544e5b3b2a443226bc157ca4beec2ce00b64df2'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:09 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials3c7e3ca3-7904-405e-82fe-ab4409cab413 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe_vpc_attribute (tests.unit.ec2.test_connection.TestDescribeVPCAttribute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 690, in test_describe_vpc_attribute 'enableDnsHostnames') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4463, in describe_vpc_attribute VPCAttribute, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsf23d9b9d-6cf0-4963-b71c-f9ee39bed5d3 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeVpcAttribute', 'Attribute': 'enableDnsHostnames', 'VpcId': 'vpc-id', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164810Z host;x-amz-date 57e3527069f415fc124bd2cd9b1f55618cbd8e49b04e86ad10f8437778388b95 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164810Z 20170531/us-east-1/ec2/aws4_request d7c80099dcb34569f8a3d8b86495cb98d47eaf0dd42b81b1b374a5cab39441ea boto: DEBUG: Signature: 66bdbb36eb3d1cd9d5e15378e12f40ab08abc4a223841610a35052fcee31cb21 boto: DEBUG: Final headers: {'Content-Length': '88', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164810Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=66bdbb36eb3d1cd9d5e15378e12f40ab08abc4a223841610a35052fcee31cb21'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:09 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsf23d9b9d-6cf0-4963-b71c-f9ee39bed5d3 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_volumes (tests.unit.ec2.test_connection.TestDescribeVolumes) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1622, in test_get_all_volumes result = self.ec2.get_all_volumes(volume_ids=['vol-1a2b3c4d', 'vol-5e6f7a8b']) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 2157, in get_all_volumes [('item', Volume)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsd83597af-2d64-4951-9d6c-fdd49a882526 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'VolumeId.1': 'vol-1a2b3c4d', 'Action': 'DescribeVolumes', 'VolumeId.2': 'vol-5e6f7a8b', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164810Z host;x-amz-date 2569a4359df0d10432b16d32a85686dac8e45bb5f56df879c4242329d7b27d8d boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164810Z 20170531/us-east-1/ec2/aws4_request f5c0d5cac7b9d0d2f38dfee1163e35f2b179764df83e00612e8042db7b596372 boto: DEBUG: Signature: 628266b1b84b7ec19bded22cbcc7b8f3e785553a8acc9203fe188e2baebd6ad5 boto: DEBUG: Final headers: {'Content-Length': '89', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164810Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=628266b1b84b7ec19bded22cbcc7b8f3e785553a8acc9203fe188e2baebd6ad5'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:09 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsd83597af-2d64-4951-9d6c-fdd49a882526 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_images (tests.unit.ec2.test_connection.TestGetAllImages) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 834, in test_get_all_images parsed = self.ec2.get_all_images() File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 189, in get_all_images [('item', Image)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials93f50552-5c31-4705-ad3b-3ae459288f07 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeImages', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164810Z host;x-amz-date b246d20d2161a74f1aeb94efbd1e1730470864e532dd90ee6d5f93b271779181 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164810Z 20170531/us-east-1/ec2/aws4_request 73b0d3852170f83cec65cb9ed0ea6be72d57c1477dd7f23ebd8bf012ce488898 boto: DEBUG: Signature: d220d649730bf5d0cd1f072186d5101522ce121cd529d1cd3fc69e565c041852 boto: DEBUG: Final headers: {'Content-Length': '40', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164810Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=d220d649730bf5d0cd1f072186d5101522ce121cd529d1cd3fc69e565c041852'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:10 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials93f50552-5c31-4705-ad3b-3ae459288f07 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_attachment_has_device_index (tests.unit.ec2.test_connection.TestGetAllNetworkInterfaces) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 769, in test_attachment_has_device_index parsed = self.ec2.get_all_network_interfaces() File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4284, in get_all_network_interfaces [('item', NetworkInterface)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials451b49bf-2db2-481f-90d9-0e57c5fbac22 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeNetworkInterfaces', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164811Z host;x-amz-date ef48f85940f53bccd2ea09ae14b89490ec186d2d27f9794a9b60a299698ab30a boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164811Z 20170531/us-east-1/ec2/aws4_request c296dcd27d427505a493b4510c65dd822b2fb01300fbdae914c782fe26ab0a61 boto: DEBUG: Signature: 07f480bb99f3f1aefe3e97f815364cf06f5b59abff37628e2b5ca0e994ec5727 boto: DEBUG: Final headers: {'Content-Length': '51', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164811Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=07f480bb99f3f1aefe3e97f815364cf06f5b59abff37628e2b5ca0e994ec5727'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:10 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials451b49bf-2db2-481f-90d9-0e57c5fbac22 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_network_interfaces (tests.unit.ec2.test_connection.TestGetAllNetworkInterfaces) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 757, in test_get_all_network_interfaces result = self.ec2.get_all_network_interfaces(network_interface_ids=['eni-0f62d866']) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4284, in get_all_network_interfaces [('item', NetworkInterface)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials494ad18f-8642-40dd-a999-70afd4a1aeab -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeNetworkInterfaces', 'Version': '2014-10-01', 'NetworkInterfaceId.1': 'eni-0f62d866'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164811Z host;x-amz-date 65a7fc7ab50e001cc3dfdc813e1e153a13bd65ce625f4539fa27d6f422130f4b boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164811Z 20170531/us-east-1/ec2/aws4_request 050ad1d3c85b0fad1d160fe65301e8e137d521ecd8d48565b4a4870bbe659ffd boto: DEBUG: Signature: 035fe4f10e92af0f3914084d8a648de2189245e506e6f34c3321db76feb6a7d6 boto: DEBUG: Final headers: {'Content-Length': '85', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164811Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=035fe4f10e92af0f3914084d8a648de2189245e506e6f34c3321db76feb6a7d6'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:11 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials494ad18f-8642-40dd-a999-70afd4a1aeab --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_classic_link_instances (tests.unit.ec2.test_connection.TestGetClassicLinkInstances) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1766, in test_get_classic_link_instances response = self.ec2.get_all_classic_link_instances() File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4527, in get_all_classic_link_instances [('item', Instance)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials0364f6a2-8a45-48de-a8dd-eebf63598ef4 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeClassicLinkInstances', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164811Z host;x-amz-date e9a753216f50dd6e99332b5328cdd2c21ca2ae79384a3997d52863108b4b5891 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164811Z 20170531/us-east-1/ec2/aws4_request 01254da47278eb8931f566961449b4d478809781fb4ce440c796e68510207aa4 boto: DEBUG: Signature: 3390ff16103ae98b09cdf436e582a1f200f06782e0f00aa6bb63231cc8f92eae boto: DEBUG: Final headers: {'Content-Length': '54', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164811Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=3390ff16103ae98b09cdf436e582a1f200f06782e0f00aa6bb63231cc8f92eae'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:11 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials0364f6a2-8a45-48de-a8dd-eebf63598ef4 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_classic_link_instances_params (tests.unit.ec2.test_connection.TestGetClassicLinkInstances) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1783, in test_get_classic_link_instances_params max_results=10 File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4527, in get_all_classic_link_instances [('item', Instance)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials209ac6cd-b473-41fd-816d-09b145ccc8fb -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Filter.1.Value.1': 'sg-9b4343fe', 'DryRun': 'true', 'InstanceId.1': 'id1', 'InstanceId.2': 'id2', 'Action': 'DescribeClassicLinkInstances', 'Version': '2014-10-01', 'NextToken': 'next_token', 'MaxResults': 10, 'Filter.1.Name': 'GroupId'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164812Z host;x-amz-date 13a79384cc18a68576b40d5579c6c68d3cb26b85bd11b7e7b651e7eed4a37a40 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164812Z 20170531/us-east-1/ec2/aws4_request 60506cb81b3150e4721b1b2639d24a3201952c7e1ee63cb10ee500ac1ed2877d boto: DEBUG: Signature: 28de8f9b6f25bb8b495938c7ba6df24552a98c4b885adfdf550ea32b21a47a04 boto: DEBUG: Final headers: {'Content-Length': '186', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164812Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=28de8f9b6f25bb8b495938c7ba6df24552a98c4b885adfdf550ea32b21a47a04'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:12 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials209ac6cd-b473-41fd-816d-09b145ccc8fb --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_modify_delete_on_termination_bool (tests.unit.ec2.test_connection.TestModifyInterfaceAttribute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 942, in test_modify_delete_on_termination_bool attachment_id='bar') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 1212, in modify_network_interface_attribute 'ModifyNetworkInterfaceAttribute', params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsacca56a9-1c5b-4708-840a-d98c16fb59ba -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ModifyNetworkInterfaceAttribute', 'NetworkInterfaceId': 'id', 'Attachment.DeleteOnTermination': 'false', 'Attachment.AttachmentId': 'bar', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164812Z host;x-amz-date f5e7ab5d89c6376dbea63361d3bf6ec049118807b8e791f567f54480727899d7 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164812Z 20170531/us-east-1/ec2/aws4_request 2e9c7c387fe34aa60d153884902831f152765f7fba11502944029d70a3a63e13 boto: DEBUG: Signature: 5526d4f30b56f42a5959f2699c7be408e08be1fdbf507866a5c1c75ff3e07d85 boto: DEBUG: Final headers: {'Content-Length': '144', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164812Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=5526d4f30b56f42a5959f2699c7be408e08be1fdbf507866a5c1c75ff3e07d85'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:12 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsacca56a9-1c5b-4708-840a-d98c16fb59ba --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_modify_delete_on_termination_str (tests.unit.ec2.test_connection.TestModifyInterfaceAttribute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 926, in test_modify_delete_on_termination_str True, attachment_id='bar') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 1212, in modify_network_interface_attribute 'ModifyNetworkInterfaceAttribute', params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials24b6da7c-a81e-4380-89d6-e1f697b45a31 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ModifyNetworkInterfaceAttribute', 'NetworkInterfaceId': 'id', 'Attachment.DeleteOnTermination': 'true', 'Attachment.AttachmentId': 'bar', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164813Z host;x-amz-date d54faf4d3f2ef8427c540bf912e32e0030710fc66874e79865214729fa37294c boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164813Z 20170531/us-east-1/ec2/aws4_request 04fe6a620eca2edeff5bdd3baa486e7c276064ab235d4d6ccbff4560b44ca869 boto: DEBUG: Signature: 5f208936772e517e1a237033101cfb47ff33cfb63853bdd3685f13746083bd5f boto: DEBUG: Final headers: {'Content-Length': '143', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164813Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=5f208936772e517e1a237033101cfb47ff33cfb63853bdd3685f13746083bd5f'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:12 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials24b6da7c-a81e-4380-89d6-e1f697b45a31 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_modify_description (tests.unit.ec2.test_connection.TestModifyInterfaceAttribute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 878, in test_modify_description self.ec2.modify_network_interface_attribute('id', 'description', 'foo') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 1212, in modify_network_interface_attribute 'ModifyNetworkInterfaceAttribute', params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialse56e5941-1e48-44f9-8131-b8041d6fdf82 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ModifyNetworkInterfaceAttribute', 'NetworkInterfaceId': 'id', 'Version': '2014-10-01', 'Description.Value': 'foo'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164813Z host;x-amz-date 087cc69eb54e3ff8519a2df222acfb22ecc4b7879618e67305be7c5168a4d9ab boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164813Z 20170531/us-east-1/ec2/aws4_request 1827bb6a02fe45cbf3f3fe3f1dc3fb2ce8d1f631d53777815191d8a614fae71b boto: DEBUG: Signature: 94ea0646902b52b64dc573d125ec2b220c593d73da4d2feac24e3ad1488e5bf3 boto: DEBUG: Final headers: {'Content-Length': '101', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164813Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=94ea0646902b52b64dc573d125ec2b220c593d73da4d2feac24e3ad1488e5bf3'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:12 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialse56e5941-1e48-44f9-8131-b8041d6fdf82 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_modify_group_set_list (tests.unit.ec2.test_connection.TestModifyInterfaceAttribute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 965, in test_modify_group_set_list ['sg-1', 'sg-2']) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 1212, in modify_network_interface_attribute 'ModifyNetworkInterfaceAttribute', params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials0046b3e5-48ae-43ea-81cb-36e4c244226f -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ModifyNetworkInterfaceAttribute', 'NetworkInterfaceId': 'id', 'Version': '2014-10-01', 'SecurityGroupId.2': 'sg-2', 'SecurityGroupId.1': 'sg-1'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164813Z host;x-amz-date ac4186d9a9fa4e2ea0b16a8acb0f05f0ba27da92a664d49d43b56d89e5d95b1d boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164813Z 20170531/us-east-1/ec2/aws4_request 76faf633338fe3e22d3b8d0b321ec1797bb0c82451e22503e26563b852a3b772 boto: DEBUG: Signature: 454d15bd065c6ebfe661c2041fc5bd132a4d5279cc8b5662a832ebe6f0a02d28 boto: DEBUG: Final headers: {'Content-Length': '125', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164813Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=454d15bd065c6ebfe661c2041fc5bd132a4d5279cc8b5662a832ebe6f0a02d28'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:13 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials0046b3e5-48ae-43ea-81cb-36e4c244226f --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_modify_source_dest_check_bool (tests.unit.ec2.test_connection.TestModifyInterfaceAttribute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 891, in test_modify_source_dest_check_bool True) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 1212, in modify_network_interface_attribute 'ModifyNetworkInterfaceAttribute', params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials9d3dd3a7-ab8a-40dd-8632-ee37d5d01493 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ModifyNetworkInterfaceAttribute', 'NetworkInterfaceId': 'id', 'Version': '2014-10-01', 'SourceDestCheck.Value': 'true'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164814Z host;x-amz-date 7ad1a9acd1aeebd3970fed4ffac0540af55790a9b86d501eddf6637bd275a6a2 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164814Z 20170531/us-east-1/ec2/aws4_request d0a9fb851922d4f5471728bb82c6ba2a52c2c4189af87270594d7d64de610b4c boto: DEBUG: Signature: 5bd8d75cb0e23084037a6ac0a72443dd37ec4f767e1c4ab7670f162dcde5fb5f boto: DEBUG: Final headers: {'Content-Length': '106', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164814Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=5bd8d75cb0e23084037a6ac0a72443dd37ec4f767e1c4ab7670f162dcde5fb5f'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:13 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials9d3dd3a7-ab8a-40dd-8632-ee37d5d01493 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_modify_source_dest_check_str (tests.unit.ec2.test_connection.TestModifyInterfaceAttribute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 904, in test_modify_source_dest_check_str 'true') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 1212, in modify_network_interface_attribute 'ModifyNetworkInterfaceAttribute', params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials77e73b3f-415e-47ba-a47d-391c0a9c26ce -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ModifyNetworkInterfaceAttribute', 'NetworkInterfaceId': 'id', 'Version': '2014-10-01', 'SourceDestCheck.Value': 'true'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164814Z host;x-amz-date 7ad1a9acd1aeebd3970fed4ffac0540af55790a9b86d501eddf6637bd275a6a2 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164814Z 20170531/us-east-1/ec2/aws4_request d0a9fb851922d4f5471728bb82c6ba2a52c2c4189af87270594d7d64de610b4c boto: DEBUG: Signature: 5bd8d75cb0e23084037a6ac0a72443dd37ec4f767e1c4ab7670f162dcde5fb5f boto: DEBUG: Final headers: {'Content-Length': '106', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164814Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=5bd8d75cb0e23084037a6ac0a72443dd37ec4f767e1c4ab7670f162dcde5fb5f'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:13 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials77e73b3f-415e-47ba-a47d-391c0a9c26ce --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Ensures that if the token is set to None, nothing is serialized. ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1176, in test_none_token instance_type='c3.large' File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 3839, in modify_reserved_instances verb='POST' File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials283734fa-d92a-4c88-91e0-b344d4d88069 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'ReservedInstancesId.1': '2567o137-8a55-48d6-82fb-7258506bb497', 'ReservedInstancesConfigurationSetItemType.0.InstanceCount': 3, 'ReservedInstancesConfigurationSetItemType.0.AvailabilityZone': 'us-west-2c', 'Version': '2014-10-01', 'ReservedInstancesConfigurationSetItemType.0.Platform': 'EC2-VPC', 'Action': 'ModifyReservedInstances', 'ReservedInstancesConfigurationSetItemType.0.InstanceType': 'c3.large'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164814Z host;x-amz-date 297aa595ff13c55df7739f0cb94378792a762327d8ab04ee988fc9db1262e9ff boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164814Z 20170531/us-east-1/ec2/aws4_request 619d73c0920908e919c694dded566718d1dccb97f7c2be1f6c8a3659d258e0e4 boto: DEBUG: Signature: b058f962cf32c83a597cbfda7b7ed5f58ded80d50c0130745237281c8063fa40 boto: DEBUG: Final headers: {'Content-Length': '367', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164814Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=b058f962cf32c83a597cbfda7b7ed5f58ded80d50c0130745237281c8063fa40'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:13 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials283734fa-d92a-4c88-91e0-b344d4d88069 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_serialized_api_args (tests.unit.ec2.test_connection.TestModifyReservedInstances) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1143, in test_serialized_api_args instance_type='c3.large' File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 3839, in modify_reserved_instances verb='POST' File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsa1eff330-6520-4090-aae9-f10c9b3b8815 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ModifyReservedInstances', 'ReservedInstancesId.1': '2567o137-8a55-48d6-82fb-7258506bb497', 'Version': '2014-10-01', 'ReservedInstancesConfigurationSetItemType.0.Platform': 'EC2-VPC', 'ClientToken': 'a-token-goes-here', 'ReservedInstancesConfigurationSetItemType.0.InstanceCount': 3, 'ReservedInstancesConfigurationSetItemType.0.InstanceType': 'c3.large', 'ReservedInstancesConfigurationSetItemType.0.AvailabilityZone': 'us-west-2c'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164815Z host;x-amz-date 6fbf3beef0d5daed85c05a5b81e38c9e040a438b8cadd50d782c084288dc6b42 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164815Z 20170531/us-east-1/ec2/aws4_request a2276cd45785b42a4397627f97703a9ae093606d154430a2068bb163acb4c073 boto: DEBUG: Signature: 5fd15431c29b2774ffa22f53a7316a64c34229f89eafdb823c33fd10f9578817 boto: DEBUG: Final headers: {'Content-Length': '397', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164815Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=5fd15431c29b2774ffa22f53a7316a64c34229f89eafdb823c33fd10f9578817'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:14 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsa1eff330-6520-4090-aae9-f10c9b3b8815 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_serialized_api_args (tests.unit.ec2.test_connection.TestPurchaseReservedInstanceOffering) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 146, in test_serialized_api_args 'offering_id', 1, (100.0, 'USD')) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 3697, in purchase_reserved_instance_offering ReservedInstance, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials1af3dfff-ad7c-443f-8388-44be0bcbac00 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'LimitPrice.CurrencyCode': 'USD', 'LimitPrice.Amount': '100.0', 'Version': '2014-10-01', 'Action': 'PurchaseReservedInstancesOffering', 'ReservedInstancesOfferingId': 'offering_id', 'InstanceCount': 1} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164815Z host;x-amz-date fc7fcae86148bc42bdf9118001eb9a2646b0fd2b2c158fbd97b128db44a2ff7b boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164815Z 20170531/us-east-1/ec2/aws4_request 848b82704b00380a6a3ac2f744c054ac7a672dd644bd56248082bf40ad53a732 boto: DEBUG: Signature: b5685bd76d2254eec5b60ce77fd499b8000095f1d4fbea262bed19024c69fd0d boto: DEBUG: Final headers: {'Content-Length': '167', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164815Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=b5685bd76d2254eec5b60ce77fd499b8000095f1d4fbea262bed19024c69fd0d'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:15 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials1af3dfff-ad7c-443f-8388-44be0bcbac00 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_sriov_net_support_simple (tests.unit.ec2.test_connection.TestRegisterImage) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1343, in test_sriov_net_support_simple sriov_net_support='simple') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 360, in register_image rs = self.get_object('RegisterImage', params, ResultSet, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsd3788723-8c29-4e69-a670-c9eb2d417189 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Description': 'description', 'SriovNetSupport': 'simple', 'Version': '2014-10-01', 'ImageLocation': 's3://foo', 'Action': 'RegisterImage', 'Name': 'name'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164815Z host;x-amz-date cee57c77b459a7c8b80f72dbd4927614fa726bbc98e9c8e382d65ac4646ca432 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164815Z 20170531/us-east-1/ec2/aws4_request 05dc5d262bccd70524ecd9974000151bad9ae0b25e36fe64d8471da48ed766e8 boto: DEBUG: Signature: 3e7b1d2264d08f12833870b354bda5300a6f697b624cb975156acbf8afe4d88e boto: DEBUG: Final headers: {'Content-Length': '125', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164815Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=3e7b1d2264d08f12833870b354bda5300a6f697b624cb975156acbf8afe4d88e'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:15 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsd3788723-8c29-4e69-a670-c9eb2d417189 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_vm_type_default (tests.unit.ec2.test_connection.TestRegisterImage) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1308, in test_vm_type_default image_location='s3://foo') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 360, in register_image rs = self.get_object('RegisterImage', params, ResultSet, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsf9e89602-a1a8-4612-9889-a86a37ecf2eb -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'RegisterImage', 'Description': 'description', 'Version': '2014-10-01', 'Name': 'name', 'ImageLocation': 's3://foo'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164816Z host;x-amz-date 1babbb2829e0ff7bfb56ef8625e57a845ee8526b7b7a00f456d6aca27771748d boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164816Z 20170531/us-east-1/ec2/aws4_request baba206ade13e355ca7e2b43b3c98f49baee1a63462b497e1a90f2da30ac5c69 boto: DEBUG: Signature: 289a705db7ffe31bce1d2328c0bb1952ea0c45544034c071052ab170a7f0f8e5 boto: DEBUG: Final headers: {'Content-Length': '102', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164816Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=289a705db7ffe31bce1d2328c0bb1952ea0c45544034c071052ab170a7f0f8e5'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:16 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsf9e89602-a1a8-4612-9889-a86a37ecf2eb --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_vm_type_hvm (tests.unit.ec2.test_connection.TestRegisterImage) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1325, in test_vm_type_hvm virtualization_type='hvm') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 360, in register_image rs = self.get_object('RegisterImage', params, ResultSet, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsd3f944eb-f675-4770-aba2-d9faeebe921b -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'VirtualizationType': 'hvm', 'Description': 'description', 'Version': '2014-10-01', 'ImageLocation': 's3://foo', 'Action': 'RegisterImage', 'Name': 'name'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164816Z host;x-amz-date 04066069aac21b2f2d9c9a373777290c48b88d6de495ec95b15043a12a4047d9 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164816Z 20170531/us-east-1/ec2/aws4_request 969c8323e47c6ac3b012632c99d062c79d0b0d1a419ea30043456b6fc32aeff9 boto: DEBUG: Signature: ff5848c02eb9c2166ce5453892547608698256155eefa51940f020306635463c boto: DEBUG: Final headers: {'Content-Length': '125', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164816Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=ff5848c02eb9c2166ce5453892547608698256155eefa51940f020306635463c'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:15 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsd3f944eb-f675-4770-aba2-d9faeebe921b --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_volume_delete_on_termination_default (tests.unit.ec2.test_connection.TestRegisterImage) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1379, in test_volume_delete_on_termination_default snapshot_id='snap-12345678') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 360, in register_image rs = self.get_object('RegisterImage', params, ResultSet, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials1215bc62-a026-46ad-88eb-5ed51f8095e4 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Name': 'name', 'BlockDeviceMapping.1.Ebs.SnapshotId': 'snap-12345678', 'BlockDeviceMapping.1.Ebs.DeleteOnTermination': 'false', 'BlockDeviceMapping.1.DeviceName': None, 'Version': '2014-10-01', 'Action': 'RegisterImage', 'Description': 'description'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164816Z host;x-amz-date 29b641168b8a18237828c57bcefa2d88d2ff9759df215ac921a6cb243389f46b boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164816Z 20170531/us-east-1/ec2/aws4_request 475192dede4421bbe95b45f0240a7c00bdea940bd639920741f5752f045fe42f boto: DEBUG: Signature: f7a97a193ba2b4433d54f116beef4adcf4ae37f629ea44b3a2d6c85f8cd82aa6 boto: DEBUG: Final headers: {'Content-Length': '211', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164816Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=f7a97a193ba2b4433d54f116beef4adcf4ae37f629ea44b3a2d6c85f8cd82aa6'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:16 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials1215bc62-a026-46ad-88eb-5ed51f8095e4 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_volume_delete_on_termination_on (tests.unit.ec2.test_connection.TestRegisterImage) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1361, in test_volume_delete_on_termination_on delete_root_volume_on_termination=True) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 360, in register_image rs = self.get_object('RegisterImage', params, ResultSet, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials231a0125-c9b2-474b-87bb-4fb0071099ab -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Name': 'name', 'BlockDeviceMapping.1.Ebs.SnapshotId': 'snap-12345678', 'BlockDeviceMapping.1.Ebs.DeleteOnTermination': 'true', 'BlockDeviceMapping.1.DeviceName': None, 'Version': '2014-10-01', 'Action': 'RegisterImage', 'Description': 'description'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164817Z host;x-amz-date 22b6e18cef2aa68af6105180946b39375a2c6aa238f7a15637aa723677c79c1e boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164817Z 20170531/us-east-1/ec2/aws4_request 012a591b0fd6a2f01f76c606a43c6ac14677a9154632d26c1d6021ee316cc029 boto: DEBUG: Signature: b02b102e069aed8be3b8628e07eeafbc64b61abc1b4df33a73e774ad399315da boto: DEBUG: Final headers: {'Content-Length': '210', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164817Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=b02b102e069aed8be3b8628e07eeafbc64b61abc1b4df33a73e774ad399315da'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:17 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials231a0125-c9b2-474b-87bb-4fb0071099ab --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_reserved_instance_offerings (tests.unit.ec2.test_connection.TestReservedInstanceOfferings) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 84, in test_get_reserved_instance_offerings response = self.ec2.get_all_reserved_instances_offerings() File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 3622, in get_all_reserved_instances_offerings verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsa5a74f39-0313-4ee3-9469-6e8197b0e569 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeReservedInstancesOfferings', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164817Z host;x-amz-date 1e4fbf194043ed8a7ef2e1eb94af063c882b4413eb04949d130a31efdf380ec5 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164817Z 20170531/us-east-1/ec2/aws4_request 444dd3eec2cb80d3645060c00570f911e19386be0854b48bc526092fdfa7f354 boto: DEBUG: Signature: 95dab126c2946fc18928b3e8aa69953d50fdc0e3b6955638fb2572a02a19a494 boto: DEBUG: Final headers: {'Content-Length': '60', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164817Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=95dab126c2946fc18928b3e8aa69953d50fdc0e3b6955638fb2572a02a19a494'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:17 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsa5a74f39-0313-4ee3-9469-6e8197b0e569 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_reserved_instance_offerings_params (tests.unit.ec2.test_connection.TestReservedInstanceOfferings) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 118, in test_get_reserved_instance_offerings_params max_results=10 File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 3622, in get_all_reserved_instances_offerings verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials656fad29-ae56-427a-bbae-0e4caa31ae29 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'MaxInstanceCount': '1', 'OfferingType': 'offering_type', 'ProductDescription': 'description', 'InstanceTenancy': 'dedicated', 'Version': '2014-10-01', 'IncludeMarketplace': 'false', 'ReservedInstancesOfferingId.2': 'id2', 'ReservedInstancesOfferingId.1': 'id1', 'MaxResults': '10', 'InstanceType': 't1.micro', 'AvailabilityZone': 'us-east-1', 'MinDuration': '100', 'Action': 'DescribeReservedInstancesOfferings', 'NextToken': 'next_token', 'MaxDuration': '1000'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164818Z host;x-amz-date b4129cb9b610cd9b85671cba26ee54053c99239e4d9607ac73e6715db971a8d4 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164818Z 20170531/us-east-1/ec2/aws4_request c13542e869576e04f7e4cd55cff69ad2fa3dc3169521ada9ffbf1ab3fcb60b8f boto: DEBUG: Signature: d997e4a4b17e8220038d8557e4fb842e39eabe5a40faaa9d1384275466de505f boto: DEBUG: Final headers: {'Content-Length': '373', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164818Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=d997e4a4b17e8220038d8557e4fb842e39eabe5a40faaa9d1384275466de505f'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:17 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials656fad29-ae56-427a-bbae-0e4caa31ae29 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_terminate_bad_response (tests.unit.ec2.test_connection.TestTerminateInstances) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_connection.py", line 1418, in test_terminate_bad_response self.ec2.terminate_instances('foo') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 998, in terminate_instances [('item', Instance)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsc88ed150-3b3c-4337-be92-9c4960f3b583 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'TerminateInstances', 'Version': '2014-10-01', 'InstanceId.1': 'foo'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164818Z host;x-amz-date 8e7bd769a0c5a8368bb4cfbec75709f67059228e45977bdc28c15b9ee3aa0f8f boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164818Z 20170531/us-east-1/ec2/aws4_request c10e77353635e53430e565868dec5a07ad6745222825ef9bc56d208507884737 boto: DEBUG: Signature: de18a0f57f1e92c0f7cf4b7a2d616c8bc1728b96010b39da8338eb3e80e55ba2 boto: DEBUG: Final headers: {'Content-Length': '61', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164818Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=de18a0f57f1e92c0f7cf4b7a2d616c8bc1728b96010b39da8338eb3e80e55ba2'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:17 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsc88ed150-3b3c-4337-be92-9c4960f3b583 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_add_tag (tests.unit.ec2.test_ec2object.TestAddTags) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_ec2object.py", line 38, in test_add_tag taggedEC2Object.add_tag("new_key", "new_value") File "/usr/lib/python2.7/dist-packages/boto/ec2/ec2object.py", line 80, in add_tag self.add_tags({key: value}, dry_run) File "/usr/lib/python2.7/dist-packages/boto/ec2/ec2object.py", line 97, in add_tags dry_run=dry_run File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4219, in create_tags return self.get_status('CreateTags', params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials7fffff6d-a14d-4107-9cf7-70cf62d58c47 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'ResourceId.1': 'i-abcd1234', 'Action': 'CreateTags', 'Version': '2014-10-01', 'Tag.1.Key': 'new_key', 'Tag.1.Value': 'new_value'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164818Z host;x-amz-date 941cefc66647b4eb49354cff2dcf07c99d5bfb9d5947bba5f308c26644b78aec boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164818Z 20170531/us-east-1/ec2/aws4_request c9c342baf67ca7b4d4d784a9dd0047f7208eed2dc5f3683e4639a4c78821663b boto: DEBUG: Signature: f274b45236d23e52e7cb7c0425a07b9d805640fc5adbdbdb54389a6ea6864c3c boto: DEBUG: Final headers: {'Content-Length': '100', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164818Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=f274b45236d23e52e7cb7c0425a07b9d805640fc5adbdbdb54389a6ea6864c3c'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:17 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials7fffff6d-a14d-4107-9cf7-70cf62d58c47 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_add_tags (tests.unit.ec2.test_ec2object.TestAddTags) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_ec2object.py", line 59, in test_add_tags taggedEC2Object.add_tags({"key1": "value1", "key2": "value2"}) File "/usr/lib/python2.7/dist-packages/boto/ec2/ec2object.py", line 97, in add_tags dry_run=dry_run File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4219, in create_tags return self.get_status('CreateTags', params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials15d946c7-75a9-445e-baa8-59f25494216e -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Tag.2.Value': 'value2', 'ResourceId.1': 'i-abcd1234', 'Tag.2.Key': 'key2', 'Tag.1.Value': 'value1', 'Version': '2014-10-01', 'Tag.1.Key': 'key1', 'Action': 'CreateTags'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164819Z host;x-amz-date 7029ccf03b021e01fe42627e112b3b6b126b8348b95400b9f9707f63de884077 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164819Z 20170531/us-east-1/ec2/aws4_request 4c28523aaec2158b7dd544955111b1ce5b21d595b26f5441740af7e79411bfc8 boto: DEBUG: Signature: 7550ea1ff7e8777de8f484d3ca26164dcd6b055640d40cfd0035652922f6b901 boto: DEBUG: Final headers: {'Content-Length': '128', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164819Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=7550ea1ff7e8777de8f484d3ca26164dcd6b055640d40cfd0035652922f6b901'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:18 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials15d946c7-75a9-445e-baa8-59f25494216e --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_remove_tag (tests.unit.ec2.test_ec2object.TestRemoveTags) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_ec2object.py", line 91, in test_remove_tag taggedEC2Object.remove_tag("key1", "value1") File "/usr/lib/python2.7/dist-packages/boto/ec2/ec2object.py", line 120, in remove_tag self.remove_tags({key: value}, dry_run) File "/usr/lib/python2.7/dist-packages/boto/ec2/ec2object.py", line 139, in remove_tags dry_run=dry_run File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4248, in delete_tags return self.get_status('DeleteTags', params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsd7eb89b2-908b-4df7-8e99-d87e8347c159 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'ResourceId.1': 'i-abcd1234', 'Action': 'DeleteTags', 'Version': '2014-10-01', 'Tag.1.Key': 'key1', 'Tag.1.Value': 'value1'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164819Z host;x-amz-date 8f43c14630c19d1edee4f26b25b743d7b5676dbd95cbc740f570d49acb192e78 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164819Z 20170531/us-east-1/ec2/aws4_request 755eac37f58a4adea3960d4f8d93f508ef5aa5ec495906e922a8fb50b55579be boto: DEBUG: Signature: dacd4f3cf7a1dce1c88cb3aa7c28a9c651570c0bc607c2db901034e7c8ce120b boto: DEBUG: Final headers: {'Content-Length': '94', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164819Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=dacd4f3cf7a1dce1c88cb3aa7c28a9c651570c0bc607c2db901034e7c8ce120b'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:19 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsd7eb89b2-908b-4df7-8e99-d87e8347c159 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_remove_tag_empty_value (tests.unit.ec2.test_ec2object.TestRemoveTags) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_ec2object.py", line 130, in test_remove_tag_empty_value taggedEC2Object.remove_tag("key1", "") File "/usr/lib/python2.7/dist-packages/boto/ec2/ec2object.py", line 120, in remove_tag self.remove_tags({key: value}, dry_run) File "/usr/lib/python2.7/dist-packages/boto/ec2/ec2object.py", line 139, in remove_tags dry_run=dry_run File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4248, in delete_tags return self.get_status('DeleteTags', params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsed51a88f-5cb2-4d59-bd83-392f595a0e62 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'ResourceId.1': 'i-abcd1234', 'Action': 'DeleteTags', 'Version': '2014-10-01', 'Tag.1.Key': 'key1', 'Tag.1.Value': ''} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164819Z host;x-amz-date 92f5a773c7f414db6ff80b0d39b9ce696b407a69777f22000f4ab3fbb07b9de0 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164819Z 20170531/us-east-1/ec2/aws4_request ece8892dba6d4b3074f56a0b5d9f41272d8eecba6163eaba7fda2733e5f7e9ac boto: DEBUG: Signature: 78cacda8e597049bebabffce3cf6990322b90082597d9d3c4669dbbfcaa0956e boto: DEBUG: Final headers: {'Content-Length': '88', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164819Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=78cacda8e597049bebabffce3cf6990322b90082597d9d3c4669dbbfcaa0956e'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:19 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsed51a88f-5cb2-4d59-bd83-392f595a0e62 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_remove_tag_no_value (tests.unit.ec2.test_ec2object.TestRemoveTags) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_ec2object.py", line 111, in test_remove_tag_no_value taggedEC2Object.remove_tag("key1") File "/usr/lib/python2.7/dist-packages/boto/ec2/ec2object.py", line 120, in remove_tag self.remove_tags({key: value}, dry_run) File "/usr/lib/python2.7/dist-packages/boto/ec2/ec2object.py", line 139, in remove_tags dry_run=dry_run File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4248, in delete_tags return self.get_status('DeleteTags', params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsed65ce73-c270-43cd-8fb9-b2b7d001f322 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'ResourceId.1': 'i-abcd1234', 'Action': 'DeleteTags', 'Version': '2014-10-01', 'Tag.1.Key': 'key1'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164820Z host;x-amz-date c1ea0ea42c736383ddb8877d754e09421b3beb3276b34d13ff46dc1f60870fa0 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164820Z 20170531/us-east-1/ec2/aws4_request 2d339a6418dfd6d4fd2ac4078ad02de9d78b262387648dec36e6d823715f8340 boto: DEBUG: Signature: e0a3a8cbae0aaa47c5235e8776395788b3de3dcdd447032a9d544b9b4bacf7e4 boto: DEBUG: Final headers: {'Content-Length': '75', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164820Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=e0a3a8cbae0aaa47c5235e8776395788b3de3dcdd447032a9d544b9b4bacf7e4'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:19 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsed65ce73-c270-43cd-8fb9-b2b7d001f322 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_remove_tags (tests.unit.ec2.test_ec2object.TestRemoveTags) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_ec2object.py", line 151, in test_remove_tags taggedEC2Object.remove_tags({"key1": "value1", "key2": "value2"}) File "/usr/lib/python2.7/dist-packages/boto/ec2/ec2object.py", line 139, in remove_tags dry_run=dry_run File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4248, in delete_tags return self.get_status('DeleteTags', params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials6e86c043-dbda-4c1e-a6c9-75b7d3064b04 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Tag.2.Value': 'value2', 'ResourceId.1': 'i-abcd1234', 'Tag.2.Key': 'key2', 'Tag.1.Value': 'value1', 'Version': '2014-10-01', 'Tag.1.Key': 'key1', 'Action': 'DeleteTags'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164820Z host;x-amz-date 3a73fd62d4a52e7aeaf02c4f3f1b16f3ac5b78ab4bedb2d8ea1bfd8b434d6ffe boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164820Z 20170531/us-east-1/ec2/aws4_request dd1aa7714419003265ba9513643c5b61de291f32392eedc6294ead294fa7c717 boto: DEBUG: Signature: 79c5c6159fba0db6bfc6342b2a27f33dd11fe6ae43e9094c3daa5cc435cf9b92 boto: DEBUG: Final headers: {'Content-Length': '128', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164820Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=79c5c6159fba0db6bfc6342b2a27f33dd11fe6ae43e9094c3daa5cc435cf9b92'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:20 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials6e86c043-dbda-4c1e-a6c9-75b7d3064b04 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_remove_tags_none_values (tests.unit.ec2.test_ec2object.TestRemoveTags) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_ec2object.py", line 195, in test_remove_tags_none_values taggedEC2Object.remove_tags({"key1": "value1", "key2": None}) File "/usr/lib/python2.7/dist-packages/boto/ec2/ec2object.py", line 139, in remove_tags dry_run=dry_run File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4248, in delete_tags return self.get_status('DeleteTags', params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsa7cd15cf-7756-4716-a032-5e543b77745e -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'ResourceId.1': 'i-abcd1234', 'Tag.2.Key': 'key2', 'Tag.1.Value': 'value1', 'Version': '2014-10-01', 'Tag.1.Key': 'key1', 'Action': 'DeleteTags'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164820Z host;x-amz-date a25cb800b760c9330c3df06e330251afce70a8606b5611a12cd37c1a4703edf4 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164820Z 20170531/us-east-1/ec2/aws4_request e722e57303e6746359fa8d67df54f5ea4ee8a820852d2fcbd87d4127702c1a43 boto: DEBUG: Signature: ecfa0b6d2494231ec3a922af8df36b638b01074304d0408b3f5a1c441e1e027f boto: DEBUG: Final headers: {'Content-Length': '109', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164820Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=ecfa0b6d2494231ec3a922af8df36b638b01074304d0408b3f5a1c441e1e027f'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:20 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsa7cd15cf-7756-4716-a032-5e543b77745e --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_remove_tags_wrong_values (tests.unit.ec2.test_ec2object.TestRemoveTags) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_ec2object.py", line 173, in test_remove_tags_wrong_values taggedEC2Object.remove_tags({"key1": "value1", "key2": "value3"}) File "/usr/lib/python2.7/dist-packages/boto/ec2/ec2object.py", line 139, in remove_tags dry_run=dry_run File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4248, in delete_tags return self.get_status('DeleteTags', params, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials3b906ec1-b9ff-48cd-9ae4-e1e8d286a8f5 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Tag.2.Value': 'value3', 'ResourceId.1': 'i-abcd1234', 'Tag.2.Key': 'key2', 'Tag.1.Value': 'value1', 'Version': '2014-10-01', 'Tag.1.Key': 'key1', 'Action': 'DeleteTags'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164821Z host;x-amz-date ae365e3f4242cc44072026a915e43e07acaf92d8e4d5b1c2701273bc0881d65a boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164821Z 20170531/us-east-1/ec2/aws4_request c5b11fde59c71a63bb9068e01238c97fa37eede72d5cf2d2d67efaa0360c6ff7 boto: DEBUG: Signature: c0f9c21da0685a279c29cc3a4887aa51e296049b6008fce6b1e061726048076c boto: DEBUG: Final headers: {'Content-Length': '128', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164821Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=c0f9c21da0685a279c29cc3a4887aa51e296049b6008fce6b1e061726048076c'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:20 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials3b906ec1-b9ff-48cd-9ae4-e1e8d286a8f5 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_multiple_private_ip_addresses (tests.unit.ec2.test_instance.TestDescribeInstances) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_instance.py", line 253, in test_multiple_private_ip_addresses api_response = self.service_connection.get_all_reservations() File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 681, in get_all_reservations [('item', Reservation)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials9ffa0136-4a05-4a6e-89a4-e2087418bc23 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeInstances', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164821Z host;x-amz-date 478363e4162398f50a78678e9baea952fcf681805b47686d85835217ea6b0866 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164821Z 20170531/us-east-1/ec2/aws4_request c58deb33e071ed6907782ef408458a8a8b8c7f99f61d9b4c7819453d21950beb boto: DEBUG: Signature: 521c6e9427f1e0f3542aa46edef11bedbcded656d6eab647b05ce7cef5b37bec boto: DEBUG: Final headers: {'Content-Length': '43', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164821Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=521c6e9427f1e0f3542aa46edef11bedbcded656d6eab647b05ce7cef5b37bec'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:21 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials9ffa0136-4a05-4a6e-89a4-e2087418bc23 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_run_instances_user_data (tests.unit.ec2.test_instance.TestRunInstances) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_instance.py", line 226, in test_run_instances_user_data user_data='#!/bin/bash' File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 977, in run_instances verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials22061bfa-0015-4889-9b2b-1cdcdd4ed9ad -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'RunInstances', 'UserData': u'IyEvYmluL2Jhc2g=', 'Version': '2014-10-01', 'MaxCount': 1, 'SecurityGroup.2': 'group2', 'MinCount': 1, 'SecurityGroup.1': 'group1', 'InstanceType': 'm1.large', 'ImageId': '123456'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164822Z host;x-amz-date ac83b324a19b3fe1f7a4fe73c22f08afb1f3ccd3195df0172de039e1a200e192 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164822Z 20170531/us-east-1/ec2/aws4_request bd83d53ff6727f838c0809fe63d2ef5e042a279e0aedcab28198ed5a3c2115b9 boto: DEBUG: Signature: f7121c267df49c69aef66700af7e1766dd2315d29ef8e173aaf33290cab3eea8 boto: DEBUG: Final headers: {'Content-Length': '171', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164822Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=f7121c267df49c69aef66700af7e1766dd2315d29ef8e173aaf33290cab3eea8'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:21 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials22061bfa-0015-4889-9b2b-1cdcdd4ed9ad --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_instance_types (tests.unit.ec2.test_instancetype.TestReservedInstanceOfferings) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_instancetype.py", line 103, in test_get_instance_types response = self.ec2.get_all_instance_types() File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 4405, in get_all_instance_types return self.get_list('DescribeInstanceTypes', params, [('item', InstanceType)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 400 Bad Request InvalidActionThe action DescribeInstanceTypes is not valid for this web service.f306e854-0096-4854-bb08-1e7508d48d2f -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeInstanceTypes', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164822Z host;x-amz-date 5c54957336e2cc5a6337c09fad005aa99135709d79692ee2ddf3cc632a5ca6f6 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164822Z 20170531/us-east-1/ec2/aws4_request 56bcbc7a8a0d9e3b5f1e459dbcc81f439aedfd3a9262e19b30be0f50d90c51a9 boto: DEBUG: Signature: 14b266662cb35bd6b3c70637e7c9ba9a9ee75b99842ca3b4e66945d3e1400eb9 boto: DEBUG: Final headers: {'Content-Length': '47', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164822Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=14b266662cb35bd6b3c70637e7c9ba9a9ee75b99842ca3b4e66945d3e1400eb9'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:22 GMT'), ('connection', 'close'), ('server', 'AmazonEC2')] boto: DEBUG: InvalidActionThe action DescribeInstanceTypes is not valid for this web service.f306e854-0096-4854-bb08-1e7508d48d2f --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_reserved_instaces (tests.unit.ec2.test_reservedinstance.TestReservedInstancesSet) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_reservedinstance.py", line 37, in test_get_all_reserved_instaces response = self.service_connection.get_all_reserved_instances() File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 3657, in get_all_reserved_instances params, [('item', ReservedInstance)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials89289fe7-17e4-4e4f-b3d1-e02ba02f2e88 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeReservedInstances', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164822Z host;x-amz-date ce365814e48389694d1ab67629bb0ca3bbe0dbc8367dc7bc50c6525a016870b7 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164822Z 20170531/us-east-1/ec2/aws4_request e1fccab1bffa9f33a078e1f2581a52d05e1c53894c8602aa220aca16c5f96a00 boto: DEBUG: Signature: 27b63eb0537bcd61660ce01cf285cd0518c6278e4b7eceb5b2054bd6f3e0c4b2 boto: DEBUG: Final headers: {'Content-Length': '51', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164822Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=27b63eb0537bcd61660ce01cf285cd0518c6278e4b7eceb5b2054bd6f3e0c4b2'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:22 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials89289fe7-17e4-4e4f-b3d1-e02ba02f2e88 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_instances (tests.unit.ec2.test_securitygroup.TestDescribeSecurityGroups) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_securitygroup.py", line 179, in test_get_instances groups = self.service_connection.get_all_security_groups() File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 2984, in get_all_security_groups [('item', SecurityGroup)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials7f6d6722-b6ca-43a2-9697-bd6de1cf6edb -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeSecurityGroups', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164823Z host;x-amz-date 5cb886222eb832f0eb0ced9d5c754a0188370cee45c4dc4195f3113b95c33ba7 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164823Z 20170531/us-east-1/ec2/aws4_request f54e9f3fcc371c982e46764e2c286a1aab48dcac2227d4074515f17fc68fa385 boto: DEBUG: Signature: 1145d298dc8f39a315fc9e526ce1b1123d2ae423e661a51809d3fe2d2a589cef boto: DEBUG: Final headers: {'Content-Length': '48', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164823Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=1145d298dc8f39a315fc9e526ce1b1123d2ae423e661a51809d3fe2d2a589cef'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:23 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials7f6d6722-b6ca-43a2-9697-bd6de1cf6edb --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe_snapshots (tests.unit.ec2.test_snapshot.TestDescribeSnapshots) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_snapshot.py", line 44, in test_describe_snapshots ('tag-value', '*db_*')))) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 2476, in get_all_snapshots [('item', Snapshot)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsc7edc565-6a94-4811-9afa-3cf4ef04b1d4 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeSnapshots', 'RestorableBy.1': '999988887777', 'Filter.1.Name': 'status', 'Filter.2.Value.1': '*db_*', 'SnapshotId.2': 'snap-9f8e7d6c', 'SnapshotId.1': 'snap-1a2b3c4d', 'Version': '2014-10-01', 'Filter.2.Name': 'tag-value', 'Filter.1.Value.1': 'pending', 'Owner.1': 'self', 'Owner.2': '111122223333'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164823Z host;x-amz-date a43f2bd1ddc1ebbe5357c4c1757bcf290fa50bb80cefa5d567ef3fef849f4365 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164823Z 20170531/us-east-1/ec2/aws4_request 25010a0a6b07c96a53b894c52db452c5251563cdebbfa853c22b09c67e47db78 boto: DEBUG: Signature: 3d9b8ec3729b7da78fc7f47ef125a5359e1f75fc32a71aa015066eb7f1fadf53 boto: DEBUG: Final headers: {'Content-Length': '256', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164823Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=3d9b8ec3729b7da78fc7f47ef125a5359e1f75fc32a71aa015066eb7f1fadf53'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:22 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsc7edc565-6a94-4811-9afa-3cf4ef04b1d4 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_cancel_spot_instance_requests (tests.unit.ec2.test_spotinstance.TestCancelSpotInstanceRequests) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_spotinstance.py", line 30, in test_cancel_spot_instance_requests 'sir-9f8e7d6c']) File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 1668, in cancel_spot_instance_requests [('item', SpotInstanceRequest)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialseea6c77d-4324-4269-a826-c468ac55398a -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'SpotInstanceRequestId.2': 'sir-9f8e7d6c', 'Action': 'CancelSpotInstanceRequests', 'SpotInstanceRequestId.1': 'sir-1a2b3c4d', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164824Z host;x-amz-date fe146ac74be0712d1864e67e649d7f0bacd149d704e11849788f53e2942a33f2 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164824Z 20170531/us-east-1/ec2/aws4_request 57cd4cc3cf2ddd28d4d01f666971ae58b48abb0e71493bfd52a564b8b2a2bab9 boto: DEBUG: Signature: 62dfab0738142939388358aa4782bf514b03be387cc34d43af180fd04d1e2bb6 boto: DEBUG: Final headers: {'Content-Length': '126', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164824Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=62dfab0738142939388358aa4782bf514b03be387cc34d43af180fd04d1e2bb6'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:23 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialseea6c77d-4324-4269-a826-c468ac55398a --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_spot_price_history (tests.unit.ec2.test_spotinstance.TestGetSpotPriceHistory) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ec2/test_spotinstance.py", line 76, in test_get_spot_price_history instance_type='c3.large') File "/usr/lib/python2.7/dist-packages/boto/ec2/connection.py", line 1424, in get_spot_price_history [('item', SpotPriceHistory)], verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials117f8f86-e965-422a-9c39-a83552c65d18 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeSpotPriceHistory', 'Version': '2014-10-01', 'InstanceType': 'c3.large'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164824Z host;x-amz-date d136153cddead2e3bd9f6067f0168cb81b953f7c9de3fa8a913febd1d85cf022 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164824Z 20170531/us-east-1/ec2/aws4_request 5cd7c3d2693cc13ec83a7d0d3e0995d3030b044862fe0db51373a494ad6d9ffb boto: DEBUG: Signature: 725e1687da487cde1800f06f43429fc4f0542cb773d20693723b786f4e7721f5 boto: DEBUG: Final headers: {'Content-Length': '72', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164824Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=725e1687da487cde1800f06f43429fc4f0542cb773d20693723b786f4e7721f5'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:23 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials117f8f86-e965-422a-9c39-a83552c65d18 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_item_lookup (tests.unit.ecs.test_connection.TestECSConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ecs/test_connection.py", line 55, in test_item_lookup ResponseGroup='Reviews' File "/usr/lib/python2.7/dist-packages/boto/ecs/__init__.py", line 105, in item_lookup return self.get_response('ItemLookup', params) File "/usr/lib/python2.7/dist-packages/boto/ecs/__init__.py", line 71, in get_response raise BotoServerError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden InvalidClientTokenIdThe AWS Access Key Id you provided does not exist in our records.54ffdead-fd08-41f8-9ec3-0908bfb0936b -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ecs.amazonaws.com/onca/xml boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ecs.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'ItemId': '0316067938', 'Operation': 'ItemLookup', 'Version': '2010-11-01', 'Service': 'AWSECommerceService', 'ResponseGroup': 'Reviews'} boto: DEBUG: establishing HTTPS connection: host=ecs.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ecs.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ecs.amazonaws.com, certificate hosts=['ecs.amazonaws.ca', 'ecs.amazonaws.com', 'webservices.amazon.com.br', 'webservices.amazon.ca', 'webservices.amazon.com.mx', 'webservices.amazon.com'] boto: DEBUG: Token: None boto: DEBUG: using _calc_signature_2 boto: DEBUG: query string: AWSAccessKeyId=aws_access_key_id&ItemId=0316067938&Operation=ItemLookup&ResponseGroup=Reviews&Service=AWSECommerceService&SignatureMethod=HmacSHA256&SignatureVersion=2&Timestamp=2017-05-31T16%3A48%3A25Z&Version=2010-11-01 boto: DEBUG: string_to_sign: GET ecs.amazonaws.com /onca/xml AWSAccessKeyId=aws_access_key_id&ItemId=0316067938&Operation=ItemLookup&ResponseGroup=Reviews&Service=AWSECommerceService&SignatureMethod=HmacSHA256&SignatureVersion=2&Timestamp=2017-05-31T16%3A48%3A25Z&Version=2010-11-01 boto: DEBUG: len(b64)=44 boto: DEBUG: base64 encoded digest: WGCQr/8qDV1osCK/OlY/3sq+XtfzXHG9iZDjgM1o1zU= boto: DEBUG: query_string: AWSAccessKeyId=aws_access_key_id&ItemId=0316067938&Operation=ItemLookup&ResponseGroup=Reviews&Service=AWSECommerceService&SignatureMethod=HmacSHA256&SignatureVersion=2&Timestamp=2017-05-31T16%3A48%3A25Z&Version=2010-11-01 Signature: WGCQr/8qDV1osCK/OlY/3sq+XtfzXHG9iZDjgM1o1zU= boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ecs.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('date', 'Wed, 31 May 2017 16:48:25 GMT'), ('transfer-encoding', 'chunked'), ('connection', 'keep-alive'), ('vary', 'Accept-Encoding,User-Agent'), ('server', 'Server')] boto: DEBUG: InvalidClientTokenIdThe AWS Access Key Id you provided does not exist in our records.54ffdead-fd08-41f8-9ec3-0908bfb0936b --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: Make sure only the AWS required params are required by boto ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/elasticache/test_api_interface.py", line 12, in test_required_launch_params self.service_connection.create_cache_cluster(name) File "/usr/lib/python2.7/dist-packages/boto/elasticache/layer1.py", line 287, in create_cache_cluster path='/', params=params) File "/usr/lib/python2.7/dist-packages/boto/elasticache/layer1.py", line 1664, in _make_request raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"f6ff6594-4620-11e7-af6a-c53a906c624a"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://elasticache.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: elasticache.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateCacheCluster', 'Version': '2013-06-15', 'ContentType': 'JSON', 'CacheClusterId': 'test_cache_cluster'} boto: DEBUG: establishing HTTPS connection: host=elasticache.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT elasticache.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=elasticache.us-east-1.amazonaws.com, certificate hosts=['elasticache.us-east-1.amazonaws.com', 'dax.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:elasticache.us-east-1.amazonaws.com x-amz-date:20170531T164825Z host;x-amz-date 829fab74aeeda3c8f3fecaeac3b3e3faffca48887771ba37778f221a014de548 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164825Z 20170531/us-east-1/elasticache/aws4_request dbe6490105b4574ddca7550b0bd4280eab812021ac041447cc584acf0c928970 boto: DEBUG: Signature: 77f9a00d4d2d26ff04371e225356a283c60905cbbeca2505d9520ae2afcac5be boto: DEBUG: Final headers: {'Content-Length': '95', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'elasticache.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164825Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/elasticache/aws4_request,SignedHeaders=host;x-amz-date,Signature=77f9a00d4d2d26ff04371e225356a283c60905cbbeca2505d9520ae2afcac5be'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'f6ff6594-4620-11e7-af6a-c53a906c624a'), ('date', 'Wed, 31 May 2017 16:48:25 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"f6ff6594-4620-11e7-af6a-c53a906c624a"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_archive_output (tests.unit.glacier.test_layer1.GlacierJobOperations) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/glacier/test_layer1.py", line 81, in test_get_archive_output 'example-job-id') File "/usr/lib/python2.7/dist-packages/boto/glacier/layer1.py", line 740, in get_job_output response_headers=response_headers) File "/usr/lib/python2.7/dist-packages/boto/glacier/layer1.py", line 119, in make_request raise UnexpectedHTTPResponseError(ok_responses, response) UnexpectedHTTPResponseError: Expected (200, 206), got (403, {"code":"UnrecognizedClientException","type":"Client","message":"The security token included in the request is invalid."}) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://glacier.us-east-1.amazonaws.com/-/vaults/examplevault/jobs/example-job-id/output boto: DEBUG: Data: boto: DEBUG: Headers: {'x-amz-glacier-version': '2012-06-01'} boto: DEBUG: Host: glacier.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=glacier.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT glacier.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=glacier.us-east-1.amazonaws.com, certificate hosts=['glacier.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET /-/vaults/examplevault/jobs/example-job-id/output host:glacier.us-east-1.amazonaws.com x-amz-date:20170531T164825Z x-amz-glacier-version:2012-06-01 host;x-amz-date;x-amz-glacier-version e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164825Z 20170531/us-east-1/glacier/aws4_request c08e049b1b1ff966fdbc92681577fa0d81683d28b932741ff828d02ae334e64c boto: DEBUG: Signature: 6c4f3a74d53feff90d66389c1a620fd344959aaaf853f0b8eac89b7724482595 boto: DEBUG: Final headers: {'x-amz-glacier-version': '2012-06-01', 'Content-Length': '0', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': u'glacier.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164825Z', 'Authorization': u'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/glacier/aws4_request,SignedHeaders=host;x-amz-date;x-amz-glacier-version,Signature=6c4f3a74d53feff90d66389c1a620fd344959aaaf853f0b8eac89b7724482595'} boto: DEBUG: Response headers: [('x-amzn-requestid', 't86CrEMvCA86sk5g1KLchE4WqGf0cK4tJnbBdSlgnrOkdKw'), ('date', 'Wed, 31 May 2017 16:48:25 GMT'), ('content-length', '121'), ('content-type', 'application/json')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_initiate_archive_job (tests.unit.glacier.test_layer1.GlacierJobOperations) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/glacier/test_layer1.py", line 73, in test_initiate_archive_job self.job_content) File "/usr/lib/python2.7/dist-packages/boto/glacier/layer1.py", line 659, in initiate_job response_headers=response_headers) File "/usr/lib/python2.7/dist-packages/boto/glacier/layer1.py", line 119, in make_request raise UnexpectedHTTPResponseError(ok_responses, response) UnexpectedHTTPResponseError: Expected 202, got (403, code=UnrecognizedClientException, message=The security token included in the request is invalid.) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://glacier.us-east-1.amazonaws.com/-/vaults/examplevault/jobs boto: DEBUG: Data: "abcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabc" boto: DEBUG: Headers: {'x-amz-glacier-version': '2012-06-01'} boto: DEBUG: Host: glacier.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=glacier.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT glacier.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=glacier.us-east-1.amazonaws.com, certificate hosts=['glacier.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST /-/vaults/examplevault/jobs host:glacier.us-east-1.amazonaws.com x-amz-date:20170531T164826Z x-amz-glacier-version:2012-06-01 host;x-amz-date;x-amz-glacier-version 992975e7e4a2b8e7b47360d7a1099f78ed8b69696e308471064316540f1d271f boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164826Z 20170531/us-east-1/glacier/aws4_request 1b8fd74f34b603129d8b5126a6904768b36797b7887162ec39a5b60aae0860fd boto: DEBUG: Signature: bd1f580bcbb6054ad007d0ddd373bc8f5deb4f9407c253d5a2837c64fe287b6b boto: DEBUG: Final headers: {'x-amz-glacier-version': '2012-06-01', 'Content-Length': '3074', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': u'glacier.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164826Z', 'Authorization': u'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/glacier/aws4_request,SignedHeaders=host;x-amz-date;x-amz-glacier-version,Signature=bd1f580bcbb6054ad007d0ddd373bc8f5deb4f9407c253d5a2837c64fe287b6b'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'wvBeccRhHRJzbxnupZN5pXKtHkhNX-uKgKqlgtihiMN1g0c'), ('date', 'Wed, 31 May 2017 16:48:26 GMT'), ('content-length', '121'), ('content-type', 'application/json')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_upload_archive (tests.unit.glacier.test_layer1.GlacierUploadArchiveResets) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/glacier/test_layer1.py", line 121, in test_upload_archive lambda *args: fake_data.read() AttributeError: 'instancemethod' object has no attribute 'side_effect' -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: establishing HTTPS connection: host=glacier.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT glacier.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=glacier.us-east-1.amazonaws.com, certificate hosts=['glacier.us-east-1.amazonaws.com'] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_vault_parameters (tests.unit.glacier.test_layer1.GlacierVaultsOperations) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/glacier/test_layer1.py", line 32, in test_create_vault_parameters self.service_connection.create_vault(self.vault_name) File "/usr/lib/python2.7/dist-packages/boto/glacier/layer1.py", line 233, in create_vault response_headers=[('Location', 'Location')]) File "/usr/lib/python2.7/dist-packages/boto/glacier/layer1.py", line 119, in make_request raise UnexpectedHTTPResponseError(ok_responses, response) UnexpectedHTTPResponseError: Expected 201, got (403, code=UnrecognizedClientException, message=The security token included in the request is invalid.) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: PUT boto: DEBUG: Path: https://glacier.us-east-1.amazonaws.com/-/vaults/examplevault boto: DEBUG: Data: boto: DEBUG: Headers: {'x-amz-glacier-version': '2012-06-01'} boto: DEBUG: Host: glacier.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=glacier.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT glacier.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=glacier.us-east-1.amazonaws.com, certificate hosts=['glacier.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: PUT /-/vaults/examplevault host:glacier.us-east-1.amazonaws.com x-amz-date:20170531T164826Z x-amz-glacier-version:2012-06-01 host;x-amz-date;x-amz-glacier-version e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164826Z 20170531/us-east-1/glacier/aws4_request ae02110250c8152380e604f555c5a31f7d531c425972a2b8ae39bc870e53e7ae boto: DEBUG: Signature: f32e1042f8c8347c28ee8c36cf93084a39ceb23f002c0a819128d7e6df1cfae9 boto: DEBUG: Final headers: {'x-amz-glacier-version': '2012-06-01', 'Content-Length': '0', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': u'glacier.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164826Z', 'Authorization': u'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/glacier/aws4_request,SignedHeaders=host;x-amz-date;x-amz-glacier-version,Signature=f32e1042f8c8347c28ee8c36cf93084a39ceb23f002c0a819128d7e6df1cfae9'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'a2uJpAJb6GFXIcPs37Sn6i7laawfOgwvYg_E_8j_h8SRr0o'), ('date', 'Wed, 31 May 2017 16:48:26 GMT'), ('content-length', '121'), ('content-type', 'application/json')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_vault (tests.unit.glacier.test_layer1.GlacierVaultsOperations) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/glacier/test_layer1.py", line 53, in test_delete_vault self.service_connection.delete_vault(self.vault_name) File "/usr/lib/python2.7/dist-packages/boto/glacier/layer1.py", line 266, in delete_vault return self.make_request('DELETE', uri, ok_responses=(204,)) File "/usr/lib/python2.7/dist-packages/boto/glacier/layer1.py", line 119, in make_request raise UnexpectedHTTPResponseError(ok_responses, response) UnexpectedHTTPResponseError: Expected 204, got (403, code=UnrecognizedClientException, message=The security token included in the request is invalid.) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: DELETE boto: DEBUG: Path: https://glacier.us-east-1.amazonaws.com/-/vaults/examplevault boto: DEBUG: Data: boto: DEBUG: Headers: {'x-amz-glacier-version': '2012-06-01'} boto: DEBUG: Host: glacier.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=glacier.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT glacier.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=glacier.us-east-1.amazonaws.com, certificate hosts=['glacier.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: DELETE /-/vaults/examplevault host:glacier.us-east-1.amazonaws.com x-amz-date:20170531T164827Z x-amz-glacier-version:2012-06-01 host;x-amz-date;x-amz-glacier-version e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164827Z 20170531/us-east-1/glacier/aws4_request 67aa565df8f5da796f204c93682c7d5ef36d287987c93eb15757c5baa2703a4d boto: DEBUG: Signature: fa70625538e1c74007a851c44149336aabac08ffe1e3338ff29ef903adab26b1 boto: DEBUG: Final headers: {'x-amz-glacier-version': '2012-06-01', 'Content-Length': '0', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': u'glacier.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164827Z', 'Authorization': u'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/glacier/aws4_request,SignedHeaders=host;x-amz-date;x-amz-glacier-version,Signature=fa70625538e1c74007a851c44149336aabac08ffe1e3338ff29ef903adab26b1'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'rv73b_BOupN1ZRJDQtj1xNmbJxrexjIswg8QqZxaI3FlIH4'), ('date', 'Wed, 31 May 2017 16:48:27 GMT'), ('content-length', '121'), ('content-type', 'application/json')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe_vaults (tests.unit.glacier.test_layer1.GlacierVaultsOperations) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/glacier/test_layer1.py", line 48, in test_describe_vaults api_response = self.service_connection.describe_vault(self.vault_name) File "/usr/lib/python2.7/dist-packages/boto/glacier/layer1.py", line 196, in describe_vault return self.make_request('GET', uri) File "/usr/lib/python2.7/dist-packages/boto/glacier/layer1.py", line 119, in make_request raise UnexpectedHTTPResponseError(ok_responses, response) UnexpectedHTTPResponseError: Expected 200, got (403, code=UnrecognizedClientException, message=The security token included in the request is invalid.) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://glacier.us-east-1.amazonaws.com/-/vaults/examplevault boto: DEBUG: Data: boto: DEBUG: Headers: {'x-amz-glacier-version': '2012-06-01'} boto: DEBUG: Host: glacier.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=glacier.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT glacier.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=glacier.us-east-1.amazonaws.com, certificate hosts=['glacier.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET /-/vaults/examplevault host:glacier.us-east-1.amazonaws.com x-amz-date:20170531T164827Z x-amz-glacier-version:2012-06-01 host;x-amz-date;x-amz-glacier-version e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164827Z 20170531/us-east-1/glacier/aws4_request 7d5be41ef17553dfe549bbe7275be2703e522d8fdb2c0e26b9bda3e2a57e6be9 boto: DEBUG: Signature: 02cee47641b2576653c00419678265252cd2b52ef724520e42f5407c90af82d2 boto: DEBUG: Final headers: {'x-amz-glacier-version': '2012-06-01', 'Content-Length': '0', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': u'glacier.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164827Z', 'Authorization': u'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/glacier/aws4_request,SignedHeaders=host;x-amz-date;x-amz-glacier-version,Signature=02cee47641b2576653c00419678265252cd2b52ef724520e42f5407c90af82d2'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'hsFsN9fahtiwgL_dbExGA3kE9ZOIGfvPwvwsnUlk59gw4_U'), ('date', 'Wed, 31 May 2017 16:48:27 GMT'), ('content-length', '121'), ('content-type', 'application/json')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_list_vaults (tests.unit.glacier.test_layer1.GlacierVaultsOperations) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/glacier/test_layer1.py", line 40, in test_list_vaults api_response = self.service_connection.list_vaults() File "/usr/lib/python2.7/dist-packages/boto/glacier/layer1.py", line 164, in list_vaults return self.make_request('GET', 'vaults', params=params) File "/usr/lib/python2.7/dist-packages/boto/glacier/layer1.py", line 119, in make_request raise UnexpectedHTTPResponseError(ok_responses, response) UnexpectedHTTPResponseError: Expected 200, got (403, code=UnrecognizedClientException, message=The security token included in the request is invalid.) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://glacier.us-east-1.amazonaws.com/-/vaults boto: DEBUG: Data: boto: DEBUG: Headers: {'x-amz-glacier-version': '2012-06-01'} boto: DEBUG: Host: glacier.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=glacier.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT glacier.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=glacier.us-east-1.amazonaws.com, certificate hosts=['glacier.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET /-/vaults host:glacier.us-east-1.amazonaws.com x-amz-date:20170531T164827Z x-amz-glacier-version:2012-06-01 host;x-amz-date;x-amz-glacier-version e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164827Z 20170531/us-east-1/glacier/aws4_request a363ded94ac303558e70c6493962700db6afe5fdced01a3cd6cbb150ac1a65d0 boto: DEBUG: Signature: e49a056d2ec69609b5f142f6b750496cd2e2217013ae108299797713574dd813 boto: DEBUG: Final headers: {'x-amz-glacier-version': '2012-06-01', 'Content-Length': '0', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': u'glacier.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164827Z', 'Authorization': u'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/glacier/aws4_request,SignedHeaders=host;x-amz-date;x-amz-glacier-version,Signature=e49a056d2ec69609b5f142f6b750496cd2e2217013ae108299797713574dd813'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'QpgfucM5Ws2RuapH2GsTGBq7QI6SprWZSH8cck6FIV7ODRs'), ('date', 'Wed, 31 May 2017 16:48:27 GMT'), ('content-length', '121'), ('content-type', 'application/json')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_upload_part_content_range_header (tests.unit.glacier.test_layer1.TestGlacierUploadPart) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/glacier/test_layer1.py", line 91, in test_upload_part_content_range_header (1,2), fake_data) File "/usr/lib/python2.7/dist-packages/boto/glacier/layer1.py", line 1279, in upload_part response_headers=response_headers) File "/usr/lib/python2.7/dist-packages/boto/glacier/layer1.py", line 114, in make_request data=data) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1071, in make_request retry_handler=retry_handler) File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/__init__.py", line 38, in _mexe_spy return self.original_mexe(request, *args, **kwargs) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 943, in _mexe request.body, request.headers) File "/usr/lib/python2.7/httplib.py", line 1042, in request self._send_request(method, url, body, headers) File "/usr/lib/python2.7/httplib.py", line 1082, in _send_request self.endheaders(body) File "/usr/lib/python2.7/httplib.py", line 1038, in endheaders self._send_output(message_body) File "/usr/lib/python2.7/httplib.py", line 880, in _send_output msg += message_body UnicodeDecodeError: 'ascii' codec can't decode byte 0xe2 in position 0: ordinal not in range(128) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: PUT boto: DEBUG: Path: https://glacier.us-east-1.amazonaws.com/-/vaults/unicode_vault_name/multipart-uploads/upload_id boto: DEBUG: Data: â boto: DEBUG: Headers: {'x-amz-content-sha256': 'linear_hash', 'Content-Range': 'bytes 1-2/*', 'x-amz-sha256-tree-hash': 'tree_hash', 'x-amz-glacier-version': '2012-06-01'} boto: DEBUG: Host: glacier.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=glacier.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT glacier.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=glacier.us-east-1.amazonaws.com, certificate hosts=['glacier.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: PUT /-/vaults/unicode_vault_name/multipart-uploads/upload_id host:glacier.us-east-1.amazonaws.com x-amz-content-sha256:linear_hash x-amz-date:20170531T164828Z x-amz-glacier-version:2012-06-01 x-amz-sha256-tree-hash:tree_hash host;x-amz-content-sha256;x-amz-date;x-amz-glacier-version;x-amz-sha256-tree-hash 30a5bfa58e128af9e5a4955725d8ad26d4d574a537b58b7dc6d357acad578572 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164828Z 20170531/us-east-1/glacier/aws4_request 21583f48de6c4e3c8e07f32e91b0644f809c65b6dc28c6f4fb893c56f272a961 boto: DEBUG: Signature: 122132eb522f54ae3f49aaff66e3dd0f6dd5ddf749c18f95ead5b3c24ee75095 boto: DEBUG: Final headers: {'x-amz-content-sha256': 'linear_hash', 'Content-Length': '1', 'x-amz-glacier-version': '2012-06-01', 'Host': u'glacier.us-east-1.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Content-Range': 'bytes 1-2/*', 'x-amz-sha256-tree-hash': 'tree_hash', 'X-Amz-Date': '20170531T164828Z', 'Authorization': u'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/glacier/aws4_request,SignedHeaders=host;x-amz-content-sha256;x-amz-date;x-amz-glacier-version;x-amz-sha256-tree-hash,Signature=122132eb522f54ae3f49aaff66e3dd0f6dd5ddf749c18f95ead5b3c24ee75095'} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_upload_part_with_unicode_name (tests.unit.glacier.test_layer1.TestGlacierUploadPart) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/glacier/test_layer1.py", line 100, in test_upload_part_with_unicode_name (1,2), fake_data) File "/usr/lib/python2.7/dist-packages/boto/glacier/layer1.py", line 1279, in upload_part response_headers=response_headers) File "/usr/lib/python2.7/dist-packages/boto/glacier/layer1.py", line 114, in make_request data=data) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1071, in make_request retry_handler=retry_handler) File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/__init__.py", line 38, in _mexe_spy return self.original_mexe(request, *args, **kwargs) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 943, in _mexe request.body, request.headers) File "/usr/lib/python2.7/httplib.py", line 1042, in request self._send_request(method, url, body, headers) File "/usr/lib/python2.7/httplib.py", line 1082, in _send_request self.endheaders(body) File "/usr/lib/python2.7/httplib.py", line 1038, in endheaders self._send_output(message_body) File "/usr/lib/python2.7/httplib.py", line 880, in _send_output msg += message_body UnicodeDecodeError: 'ascii' codec can't decode byte 0xe2 in position 0: ordinal not in range(128) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: PUT boto: DEBUG: Path: https://glacier.us-east-1.amazonaws.com/-/vaults/unicode_vault_name/multipart-uploads/upload_id boto: DEBUG: Data: â boto: DEBUG: Headers: {'x-amz-content-sha256': 'linear_hash', 'Content-Range': 'bytes 1-2/*', 'x-amz-sha256-tree-hash': 'tree_hash', 'x-amz-glacier-version': '2012-06-01'} boto: DEBUG: Host: glacier.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=glacier.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT glacier.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=glacier.us-east-1.amazonaws.com, certificate hosts=['glacier.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: PUT /-/vaults/unicode_vault_name/multipart-uploads/upload_id host:glacier.us-east-1.amazonaws.com x-amz-content-sha256:linear_hash x-amz-date:20170531T164828Z x-amz-glacier-version:2012-06-01 x-amz-sha256-tree-hash:tree_hash host;x-amz-content-sha256;x-amz-date;x-amz-glacier-version;x-amz-sha256-tree-hash 30a5bfa58e128af9e5a4955725d8ad26d4d574a537b58b7dc6d357acad578572 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164828Z 20170531/us-east-1/glacier/aws4_request 21583f48de6c4e3c8e07f32e91b0644f809c65b6dc28c6f4fb893c56f272a961 boto: DEBUG: Signature: 122132eb522f54ae3f49aaff66e3dd0f6dd5ddf749c18f95ead5b3c24ee75095 boto: DEBUG: Final headers: {'x-amz-content-sha256': 'linear_hash', 'Content-Length': '1', 'x-amz-glacier-version': '2012-06-01', 'Host': u'glacier.us-east-1.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Content-Range': 'bytes 1-2/*', 'x-amz-sha256-tree-hash': 'tree_hash', 'X-Amz-Date': '20170531T164828Z', 'Authorization': u'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/glacier/aws4_request,SignedHeaders=host;x-amz-content-sha256;x-amz-date;x-amz-glacier-version;x-amz-sha256-tree-hash,Signature=122132eb522f54ae3f49aaff66e3dd0f6dd5ddf749c18f95ead5b3c24ee75095'} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_role_data_policy (tests.unit.iam.test_connection.TestCreateRole) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 239, in test_create_role_data_policy assume_role_policy_document={"hello": "policy"} File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1155, in create_role return self.get_response('CreateRole', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. f941b464-4620-11e7-a927-0d9a21890f37 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateRole', 'RoleName': 'a_name', 'Version': '2010-05-08', 'AssumeRolePolicyDocument': '{"hello": "policy"}'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164829Z host;x-amz-date 4543913e37d19072595ce58e0c7e8619ed2e9fa6d26bce15bbcc57fdbd85e7fa boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164829Z 20170531/us-east-1/iam/aws4_request 6f08fd3e0ddbfdd23e312432870257920fea0bc80bba4643b91d0d196170d328 boto: DEBUG: Signature: b2b46982e0ec3b7b42452aa6942262d031ae06a5a0fd8bfe8f0dfd8b19ffd1f8 boto: DEBUG: Final headers: {'Content-Length': '113', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164829Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=b2b46982e0ec3b7b42452aa6942262d031ae06a5a0fd8bfe8f0dfd8b19ffd1f8'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'f941b464-4620-11e7-a927-0d9a21890f37'), ('date', 'Wed, 31 May 2017 16:48:29 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. f941b464-4620-11e7-a927-0d9a21890f37 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_role_default (tests.unit.iam.test_connection.TestCreateRole) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 201, in test_create_role_default self.service_connection.create_role('a_name') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1155, in create_role return self.get_response('CreateRole', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. f97743a6-4620-11e7-afc7-e1dec95e77c3 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateRole', 'RoleName': 'a_name', 'Version': '2010-05-08', 'AssumeRolePolicyDocument': '{"Statement": [{"Action": ["sts:AssumeRole"], "Effect": "Allow", "Principal": {"Service": ["ec2.amazonaws.com"]}}]}'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164829Z host;x-amz-date ffa241e0ea28932592d512eb112829bcb215706847d9a34c4bbc65296010fb61 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164829Z 20170531/us-east-1/iam/aws4_request f3371affbfa8ae3c46c49fdf8107cd827df081cc42b2941f04b9b3d268030100 boto: DEBUG: Signature: e3d58da35f169fcb184f82f59812287f2fa149cfa2f436e45f6eb73371b686d3 boto: DEBUG: Final headers: {'Content-Length': '279', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164829Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=e3d58da35f169fcb184f82f59812287f2fa149cfa2f436e45f6eb73371b686d3'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'f97743a6-4620-11e7-afc7-e1dec95e77c3'), ('date', 'Wed, 31 May 2017 16:48:28 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. f97743a6-4620-11e7-afc7-e1dec95e77c3 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_role_default_cn_north (tests.unit.iam.test_connection.TestCreateRole) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 212, in test_create_role_default_cn_north self.service_connection.create_role('a_name') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1155, in create_role return self.get_response('CreateRole', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. fc9b1881-4620-11e7-bb97-e14b3e214c33 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.cn-north-1.amazonaws.com.cn/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.cn-north-1.amazonaws.com.cn boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateRole', 'RoleName': 'a_name', 'Version': '2010-05-08', 'AssumeRolePolicyDocument': '{"Statement": [{"Action": ["sts:AssumeRole"], "Effect": "Allow", "Principal": {"Service": ["ec2.amazonaws.com.cn"]}}]}'} boto: DEBUG: establishing HTTPS connection: host=iam.cn-north-1.amazonaws.com.cn, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.cn-north-1.amazonaws.com.cn:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.cn-north-1.amazonaws.com.cn, certificate hosts=['iam.amazonaws.com.cn', 'iam.cn-north-1.amazonaws.com.cn'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164834Z host;x-amz-date 1c6c8e4179bd50ed30dc075376b8644b7f1a0c0f09ca5736120ed60971282eac boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164834Z 20170531/cn-north-1/iam/aws4_request be50bbf3df70fad5d2c86401289c30ee0fe5cc89201a6da9444fb54e96697b25 boto: DEBUG: Signature: b4a1ea4a55ebe66edafd0a97bd8bff32666cbd90d070bf37fb22dc2645a00fd2 boto: DEBUG: Final headers: {'Content-Length': '282', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.cn-north-1.amazonaws.com.cn', 'X-Amz-Date': '20170531T164834Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/cn-north-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=b4a1ea4a55ebe66edafd0a97bd8bff32666cbd90d070bf37fb22dc2645a00fd2'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'fc9b1881-4620-11e7-bb97-e14b3e214c33'), ('date', 'Wed, 31 May 2017 16:48:34 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. fc9b1881-4620-11e7-bb97-e14b3e214c33 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_role_string_policy (tests.unit.iam.test_connection.TestCreateRole) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 225, in test_create_role_string_policy assume_role_policy_document='{"hello": "policy"}' File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1155, in create_role return self.get_response('CreateRole', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. fcea98cf-4620-11e7-a8d7-330154ff2b6e -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateRole', 'RoleName': 'a_name', 'Version': '2010-05-08', 'AssumeRolePolicyDocument': '{"hello": "policy"}'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164835Z host;x-amz-date 4543913e37d19072595ce58e0c7e8619ed2e9fa6d26bce15bbcc57fdbd85e7fa boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164835Z 20170531/us-east-1/iam/aws4_request 90e16c81daec4d3d6eeb9cdf0a313333e107cae31dec91fdd4047141b94fb2eb boto: DEBUG: Signature: 75ee37e09222d4c77501ca7ef821310152a239050549cb11f6d0613a4062bd46 boto: DEBUG: Final headers: {'Content-Length': '113', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164835Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=75ee37e09222d4c77501ca7ef821310152a239050549cb11f6d0613a4062bd46'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'fcea98cf-4620-11e7-a8d7-330154ff2b6e'), ('date', 'Wed, 31 May 2017 16:48:34 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. fcea98cf-4620-11e7-a8d7-330154ff2b6e --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_saml_provider (tests.unit.iam.test_connection.TestCreateSamlProvider) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 47, in test_create_saml_provider response = self.service_connection.create_saml_provider('document', 'name') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1436, in create_saml_provider return self.get_response('CreateSAMLProvider', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 400 Bad Request Sender ValidationError 1 validation error detected: Value 'document' at 'sAMLMetadataDocument' failed to satisfy constraint: Member must have length greater than or equal to 1000 fd1e0422-4620-11e7-a927-0d9a21890f37 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateSAMLProvider', 'SAMLMetadataDocument': 'document', 'Version': '2010-05-08', 'Name': 'name'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164835Z host;x-amz-date 546b907051ffb362517179551bc556196369fec9391bc3b2c192da49a0cfa0b3 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164835Z 20170531/us-east-1/iam/aws4_request 6f177086c5c527780fac1de830d609dd58500d276db4e232ff30dec73058b595 boto: DEBUG: Signature: d926d415970c69068f5ccae6e112a32686710d26ce97cd338170d8b12dde1947 boto: DEBUG: Final headers: {'Content-Length': '84', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164835Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=d926d415970c69068f5ccae6e112a32686710d26ce97cd338170d8b12dde1947'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'fd1e0422-4620-11e7-a927-0d9a21890f37'), ('date', 'Wed, 31 May 2017 16:48:35 GMT'), ('content-length', '402'), ('content-type', 'text/xml'), ('connection', 'close')] boto: DEBUG: Sender ValidationError 1 validation error detected: Value 'document' at 'sAMLMetadataDocument' failed to satisfy constraint: Member must have length greater than or equal to 1000 fd1e0422-4620-11e7-a927-0d9a21890f37 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_virtual_mfa_device (tests.unit.iam.test_connection.TestCreateVirtualMFADevice) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 386, in test_create_virtual_mfa_device response = self.service_connection.create_virtual_mfa_device('/', 'ExampleName') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1546, in create_virtual_mfa_device return self.get_response('CreateVirtualMFADevice', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. fd53e155-4620-11e7-afc7-e1dec95e77c3 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateVirtualMFADevice', 'Path': '/', 'Version': '2010-05-08', 'VirtualMFADeviceName': 'ExampleName'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164836Z host;x-amz-date b8e21364390567b8754e59c277278bc1c357373819eb495c95a25d5d3e15825d boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164836Z 20170531/us-east-1/iam/aws4_request e7b879e8a78f83c063c655768b1a52ba836c9fdb9c5b2abb540be722b78c8e50 boto: DEBUG: Signature: ea2720433dcc030d46bfa48e64961dd5d4784a6d8d11467cf0e319cc0c425e2e boto: DEBUG: Final headers: {'Content-Length': '90', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164836Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=ea2720433dcc030d46bfa48e64961dd5d4784a6d8d11467cf0e319cc0c425e2e'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'fd53e155-4620-11e7-afc7-e1dec95e77c3'), ('date', 'Wed, 31 May 2017 16:48:35 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. fd53e155-4620-11e7-afc7-e1dec95e77c3 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_account_password_policy (tests.unit.iam.test_connection.TestDeleteAccountPasswordPolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 475, in test_delete_account_password_policy response = self.service_connection.delete_account_password_policy() File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1564, in delete_account_password_policy return self.get_response('DeleteAccountPasswordPolicy', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. fd8b93a6-4620-11e7-a6a1-bdb36d1feb0a -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DeleteAccountPasswordPolicy', 'Version': '2010-05-08'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164836Z host;x-amz-date 1eec409daaa4400cb8b4ad26385412a0252c42f054f2342d515997afa32694e3 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164836Z 20170531/us-east-1/iam/aws4_request 72361e7f914a044b70db53e9ffccedf3fc78cf0ed38b7589ac534d5dadcca166 boto: DEBUG: Signature: c0c0a602bc4acbf797009c71a776efafc00b791d4faf7ca791eb900cddd662bc boto: DEBUG: Final headers: {'Content-Length': '53', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164836Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=c0c0a602bc4acbf797009c71a776efafc00b791d4faf7ca791eb900cddd662bc'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'fd8b93a6-4620-11e7-a6a1-bdb36d1feb0a'), ('date', 'Wed, 31 May 2017 16:48:35 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. fd8b93a6-4620-11e7-a6a1-bdb36d1feb0a --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_saml_provider (tests.unit.iam.test_connection.TestDeleteSamlProvider) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 167, in test_delete_saml_provider self.service_connection.delete_saml_provider('arn') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1500, in delete_saml_provider return self.get_response('DeleteSAMLProvider', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 400 Bad Request Sender ValidationError 1 validation error detected: Value 'arn' at 'sAMLProviderArn' failed to satisfy constraint: Member must have length greater than or equal to 20 fdc20c71-4620-11e7-a6a1-bdb36d1feb0a -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DeleteSAMLProvider', 'SAMLProviderArn': 'arn', 'Version': '2010-05-08'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164836Z host;x-amz-date 032ec381e5966b21d562eb72e17decd3ce2724d0ca1e45f06691d84486eea670 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164836Z 20170531/us-east-1/iam/aws4_request 6c9d6fa4108caf0700b312645faafb10a4c6e219dde97993ef0fb50ace7d587f boto: DEBUG: Signature: c44173e7ff39aa0660f5837b7c579220dca75c679d9ebf658cd9653131c139b6 boto: DEBUG: Final headers: {'Content-Length': '64', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164836Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=c44173e7ff39aa0660f5837b7c579220dca75c679d9ebf658cd9653131c139b6'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'fdc20c71-4620-11e7-a6a1-bdb36d1feb0a'), ('date', 'Wed, 31 May 2017 16:48:36 GMT'), ('content-length', '390'), ('content-type', 'text/xml'), ('connection', 'close')] boto: DEBUG: Sender ValidationError 1 validation error detected: Value 'arn' at 'sAMLProviderArn' failed to satisfy constraint: Member must have length greater than or equal to 20 fdc20c71-4620-11e7-a6a1-bdb36d1feb0a --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_generate_credential_report (tests.unit.iam.test_connection.TestGenerateCredentialReport) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 334, in test_generate_credential_report response = self.service_connection.generate_credential_report() File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1515, in generate_credential_report return self.get_response('GenerateCredentialReport', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. fdf774c1-4620-11e7-a6a1-bdb36d1feb0a -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'GenerateCredentialReport', 'Version': '2010-05-08'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164837Z host;x-amz-date f45cf203cdb0d99a2e1858ca4f32bcf0ca621b1ebe46b1daff7f9b1e9fe34671 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164837Z 20170531/us-east-1/iam/aws4_request dcb998bf08afaff7070640085b5bd54c91f375a63a020a362a6bb0df6c4972ba boto: DEBUG: Signature: 0a332a4624469d8ae7e0facfa97c3a746d6291a20bc35874843dbc2869db65b8 boto: DEBUG: Final headers: {'Content-Length': '50', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164837Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=0a332a4624469d8ae7e0facfa97c3a746d6291a20bc35874843dbc2869db65b8'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'fdf774c1-4620-11e7-a6a1-bdb36d1feb0a'), ('date', 'Wed, 31 May 2017 16:48:36 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. fdf774c1-4620-11e7-a6a1-bdb36d1feb0a --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_account_password_policy (tests.unit.iam.test_connection.TestGetAccountPasswordPolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 425, in test_get_account_password_policy response = self.service_connection.get_account_password_policy() File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1557, in get_account_password_policy return self.get_response('GetAccountPasswordPolicy', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. fe2d78d3-4620-11e7-9077-39112920e426 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'GetAccountPasswordPolicy', 'Version': '2010-05-08'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164837Z host;x-amz-date ea932dc167ba62f61056ffd881499668d7cf04f9c4ed7883675e860d28fff1e9 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164837Z 20170531/us-east-1/iam/aws4_request aace27f68769baa0b624a9c0a41e99ab790af083b757dce476e12c772c5eccd3 boto: DEBUG: Signature: 3a2d0a3fc81e1e846e6891d07a217d370f728abad0377013f1b2934fc17bb767 boto: DEBUG: Final headers: {'Content-Length': '50', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164837Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=3a2d0a3fc81e1e846e6891d07a217d370f728abad0377013f1b2934fc17bb767'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'fe2d78d3-4620-11e7-9077-39112920e426'), ('date', 'Wed, 31 May 2017 16:48:36 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. fe2d78d3-4620-11e7-9077-39112920e426 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_credential_report (tests.unit.iam.test_connection.TestGetCredentialReport) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 359, in test_get_credential_report response = self.service_connection.get_credential_report() File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1525, in get_credential_report return self.get_response('GetCredentialReport', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. fe63cb48-4620-11e7-9077-39112920e426 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'GetCredentialReport', 'Version': '2010-05-08'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164837Z host;x-amz-date fd3045db4acd629ed8a5fe7042ae7d75e3fc53c19684230fd6431337134051cd boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164837Z 20170531/us-east-1/iam/aws4_request 9aa08b083695c33a8e9aa17046d85bc90bc17f2e244fecb0d258a6332393272e boto: DEBUG: Signature: 82d2333ba24ea68e8f6b4ab8d9d5dcef6f5a6c6cabdd170968d9c5a02ff6b3ae boto: DEBUG: Final headers: {'Content-Length': '45', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164837Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=82d2333ba24ea68e8f6b4ab8d9d5dcef6f5a6c6cabdd170968d9c5a02ff6b3ae'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'fe63cb48-4620-11e7-9077-39112920e426'), ('date', 'Wed, 31 May 2017 16:48:37 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. fe63cb48-4620-11e7-9077-39112920e426 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_saml_provider (tests.unit.iam.test_connection.TestGetSamlProvider) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 121, in test_get_saml_provider self.service_connection.get_saml_provider('arn') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1457, in get_saml_provider return self.get_response('GetSAMLProvider', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 400 Bad Request Sender ValidationError 1 validation error detected: Value 'arn' at 'sAMLProviderArn' failed to satisfy constraint: Member must have length greater than or equal to 20 fe99f5b1-4620-11e7-afc7-e1dec95e77c3 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'GetSAMLProvider', 'SAMLProviderArn': 'arn', 'Version': '2010-05-08'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164838Z host;x-amz-date 023f4dd50814d5ed6adcf4a6b0c66c260760849eace4f0432b1ab4d1c3ee8b5e boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164838Z 20170531/us-east-1/iam/aws4_request d4f09da0268cb0800ee80c206b959eceed2c78fb716882bf8d6e09e534dd7e53 boto: DEBUG: Signature: 260e65428f89c6c337ad8efcf4e7ee459f3018523051447b34ab60ec11689456 boto: DEBUG: Final headers: {'Content-Length': '61', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164838Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=260e65428f89c6c337ad8efcf4e7ee459f3018523051447b34ab60ec11689456'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'fe99f5b1-4620-11e7-afc7-e1dec95e77c3'), ('date', 'Wed, 31 May 2017 16:48:37 GMT'), ('content-length', '390'), ('content-type', 'text/xml'), ('connection', 'close')] boto: DEBUG: Sender ValidationError 1 validation error detected: Value 'arn' at 'sAMLProviderArn' failed to satisfy constraint: Member must have length greater than or equal to 20 fe99f5b1-4620-11e7-afc7-e1dec95e77c3 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_signin_url_cn_north (tests.unit.iam.test_connection.TestGetSigninURL) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 287, in test_get_signin_url_cn_north url = self.service_connection.get_signin_url() File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1029, in get_signin_url alias = self.get_account_alias() File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1019, in get_account_alias list_marker='AccountAliases') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0054029f-4621-11e7-94f2-55f2c63b604b -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.cn-north-1.amazonaws.com.cn/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.cn-north-1.amazonaws.com.cn boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ListAccountAliases', 'Version': '2010-05-08'} boto: DEBUG: establishing HTTPS connection: host=iam.cn-north-1.amazonaws.com.cn, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.cn-north-1.amazonaws.com.cn:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.cn-north-1.amazonaws.com.cn, certificate hosts=['iam.amazonaws.com.cn', 'iam.cn-north-1.amazonaws.com.cn'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164841Z host;x-amz-date d9bb68c42bf3d906d2648555461cfd01b3fab16c87246ea45502016d362cd9a7 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164841Z 20170531/cn-north-1/iam/aws4_request 20264a83345803dc7b19324bd1d9f5e969fce37b77211ef561bb8bfca42a060b boto: DEBUG: Signature: 112d390369e75fe9f51411f3feeae80d688d69084982c7f86dd5862025cf2a63 boto: DEBUG: Final headers: {'Content-Length': '44', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.cn-north-1.amazonaws.com.cn', 'X-Amz-Date': '20170531T164841Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/cn-north-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=112d390369e75fe9f51411f3feeae80d688d69084982c7f86dd5862025cf2a63'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0054029f-4621-11e7-94f2-55f2c63b604b'), ('date', 'Wed, 31 May 2017 16:48:40 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0054029f-4621-11e7-94f2-55f2c63b604b --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_signin_url_default (tests.unit.iam.test_connection.TestGetSigninURL) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 270, in test_get_signin_url_default url = self.service_connection.get_signin_url() File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1029, in get_signin_url alias = self.get_account_alias() File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1019, in get_account_alias list_marker='AccountAliases') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 009f150d-4621-11e7-a927-0d9a21890f37 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ListAccountAliases', 'Version': '2010-05-08'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164841Z host;x-amz-date d9bb68c42bf3d906d2648555461cfd01b3fab16c87246ea45502016d362cd9a7 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164841Z 20170531/us-east-1/iam/aws4_request 20264a83345803dc7b19324bd1d9f5e969fce37b77211ef561bb8bfca42a060b boto: DEBUG: Signature: 98ca3190a56929a9fcf3f5548a5dc73664e24d7f27cd37dbed3c321803e954da boto: DEBUG: Final headers: {'Content-Length': '44', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164841Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=98ca3190a56929a9fcf3f5548a5dc73664e24d7f27cd37dbed3c321803e954da'} boto: DEBUG: Response headers: [('x-amzn-requestid', '009f150d-4621-11e7-a927-0d9a21890f37'), ('date', 'Wed, 31 May 2017 16:48:41 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 009f150d-4621-11e7-a927-0d9a21890f37 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_signin_url_s3 (tests.unit.iam.test_connection.TestGetSigninURL) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 278, in test_get_signin_url_s3 url = self.service_connection.get_signin_url(service='s3') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1029, in get_signin_url alias = self.get_account_alias() File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1019, in get_account_alias list_marker='AccountAliases') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 00d566af-4621-11e7-9077-39112920e426 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ListAccountAliases', 'Version': '2010-05-08'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164841Z host;x-amz-date d9bb68c42bf3d906d2648555461cfd01b3fab16c87246ea45502016d362cd9a7 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164841Z 20170531/us-east-1/iam/aws4_request 20264a83345803dc7b19324bd1d9f5e969fce37b77211ef561bb8bfca42a060b boto: DEBUG: Signature: 98ca3190a56929a9fcf3f5548a5dc73664e24d7f27cd37dbed3c321803e954da boto: DEBUG: Final headers: {'Content-Length': '44', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164841Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=98ca3190a56929a9fcf3f5548a5dc73664e24d7f27cd37dbed3c321803e954da'} boto: DEBUG: Response headers: [('x-amzn-requestid', '00d566af-4621-11e7-9077-39112920e426'), ('date', 'Wed, 31 May 2017 16:48:41 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 00d566af-4621-11e7-9077-39112920e426 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_list_saml_providers (tests.unit.iam.test_connection.TestListSamlProviders) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 88, in test_list_saml_providers response = self.service_connection.list_saml_providers() File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1443, in list_saml_providers return self.get_response('ListSAMLProviders', {}, list_marker='SAMLProviderList') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 01442eb2-4621-11e7-a927-0d9a21890f37 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ListSAMLProviders', 'Version': '2010-05-08'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164842Z host;x-amz-date 96f3df9ff12df26c874398ef8ede30910f468cb46648efa921e731c7dac741f1 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164842Z 20170531/us-east-1/iam/aws4_request fba4f80161bd42a446fc0b9ec513ae53a1360bc4538b6ca0196434c885221b83 boto: DEBUG: Signature: 2d40435a3f711b2a74bcaa0df447bd626dbae0323dc911a34ab1b585fbfe5491 boto: DEBUG: Final headers: {'Content-Length': '43', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164842Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=2d40435a3f711b2a74bcaa0df447bd626dbae0323dc911a34ab1b585fbfe5491'} boto: DEBUG: Response headers: [('x-amzn-requestid', '01442eb2-4621-11e7-a927-0d9a21890f37'), ('date', 'Wed, 31 May 2017 16:48:42 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 01442eb2-4621-11e7-a927-0d9a21890f37 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_update_account_password_policy (tests.unit.iam.test_connection.TestUpdateAccountPasswordPolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 451, in test_update_account_password_policy response = self.service_connection.update_account_password_policy(minimum_password_length=88) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1642, in update_account_password_policy return self.get_response('UpdateAccountPasswordPolicy', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 017a80d7-4621-11e7-a6a1-bdb36d1feb0a -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'UpdateAccountPasswordPolicy', 'MinimumPasswordLength': 88, 'Version': '2010-05-08'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164843Z host;x-amz-date 764582fb76355d8d28d87027dce8aea1e2573e00fff5b3fb5d05b2a104350ec9 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164843Z 20170531/us-east-1/iam/aws4_request 08f7ae265d3ed83473ab0f05a402236bae60519a9c42ec476110c89db4be0357 boto: DEBUG: Signature: a2a123d54be722c1f7231947705b797547dc44d89a75d31945c576f839393a8f boto: DEBUG: Final headers: {'Content-Length': '78', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164843Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=a2a123d54be722c1f7231947705b797547dc44d89a75d31945c576f839393a8f'} boto: DEBUG: Response headers: [('x-amzn-requestid', '017a80d7-4621-11e7-a6a1-bdb36d1feb0a'), ('date', 'Wed, 31 May 2017 16:48:42 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 017a80d7-4621-11e7-a6a1-bdb36d1feb0a --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_update_saml_provider (tests.unit.iam.test_connection.TestUpdateSamlProvider) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_connection.py", line 148, in test_update_saml_provider self.service_connection.update_saml_provider('arn', 'doc') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1482, in update_saml_provider return self.get_response('UpdateSAMLProvider', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 400 Bad Request Sender ValidationError 2 validation errors detected: Value 'doc' at 'sAMLMetadataDocument' failed to satisfy constraint: Member must have length greater than or equal to 1000; Value 'arn' at 'sAMLProviderArn' failed to satisfy constraint: Member must have length greater than or equal to 20 01b147e5-4621-11e7-85fd-f9d5bf8f637c -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'UpdateSAMLProvider', 'SAMLProviderArn': 'arn', 'SAMLMetadataDocument': 'doc', 'Version': '2010-05-08'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164843Z host;x-amz-date 4e5b566026cbf958056cdec2d322f75c0b3cb50326e3a68cc2b350ab71aea4eb boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164843Z 20170531/us-east-1/iam/aws4_request 406ce2848beea65af18b273f45e0fd90dbfde8e088d3fa761b6f922936577b24 boto: DEBUG: Signature: 81b415632c3400e0d6e8bc04eec70e22619423a9b5192d7590c0d14e9e219100 boto: DEBUG: Final headers: {'Content-Length': '89', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164843Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=81b415632c3400e0d6e8bc04eec70e22619423a9b5192d7590c0d14e9e219100'} boto: DEBUG: Response headers: [('x-amzn-requestid', '01b147e5-4621-11e7-85fd-f9d5bf8f637c'), ('date', 'Wed, 31 May 2017 16:48:43 GMT'), ('content-length', '514'), ('content-type', 'text/xml'), ('connection', 'close')] boto: DEBUG: Sender ValidationError 2 validation errors detected: Value 'doc' at 'sAMLMetadataDocument' failed to satisfy constraint: Member must have length greater than or equal to 1000; Value 'arn' at 'sAMLProviderArn' failed to satisfy constraint: Member must have length greater than or equal to 20 01b147e5-4621-11e7-85fd-f9d5bf8f637c --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_attach_group_policy (tests.unit.iam.test_policy.TestAttachGroupPolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_policy.py", line 532, in test_attach_group_policy 'Dev') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1872, in attach_group_policy return self.get_response('AttachGroupPolicy', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 01e6fe20-4621-11e7-9077-39112920e426 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'AttachGroupPolicy', 'GroupName': 'Dev', 'Version': '2010-05-08', 'PolicyArn': 'arn:aws:iam::123456789012:policy/S3-read-only-example-bucket'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164843Z host;x-amz-date f27731814767fe4c1f2d2f90a313c65458d7977da3715645bc998b9939f0ad25 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164843Z 20170531/us-east-1/iam/aws4_request b81190002f46e2a9fd9da0e6bbfdbe32dcb94211425e4915f48181070807975c boto: DEBUG: Signature: 7d9af295c2f3c5259dea182b0757e13a71f3619bec46932f3370f38fda814f2f boto: DEBUG: Final headers: {'Content-Length': '140', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164843Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=7d9af295c2f3c5259dea182b0757e13a71f3619bec46932f3370f38fda814f2f'} boto: DEBUG: Response headers: [('x-amzn-requestid', '01e6fe20-4621-11e7-9077-39112920e426'), ('date', 'Wed, 31 May 2017 16:48:43 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 01e6fe20-4621-11e7-9077-39112920e426 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_attach_role_policy (tests.unit.iam.test_policy.TestAttachRolePolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_policy.py", line 561, in test_attach_role_policy 'DevRole') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1884, in attach_role_policy return self.get_response('AttachRolePolicy', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 021d0281-4621-11e7-9077-39112920e426 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'AttachRolePolicy', 'RoleName': 'DevRole', 'Version': '2010-05-08', 'PolicyArn': 'arn:aws:iam::123456789012:policy/S3-read-only-example-bucket'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164844Z host;x-amz-date c02ecc72842e05ec468181dddebe9ed2c2236434b508242b00b9c9529ffda0d9 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164844Z 20170531/us-east-1/iam/aws4_request 0d991605c8a1ae2b74e316a9e6fccd96140b80b22b9054ebb6c8c7aac4bbe2ee boto: DEBUG: Signature: 38377715f33a097fd0ba95e05bddbfd973ce4aaae91e7af6254b401a39477881 boto: DEBUG: Final headers: {'Content-Length': '142', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164844Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=38377715f33a097fd0ba95e05bddbfd973ce4aaae91e7af6254b401a39477881'} boto: DEBUG: Response headers: [('x-amzn-requestid', '021d0281-4621-11e7-9077-39112920e426'), ('date', 'Wed, 31 May 2017 16:48:43 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 021d0281-4621-11e7-9077-39112920e426 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_attach_user_policy (tests.unit.iam.test_policy.TestAttachUserPolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_policy.py", line 590, in test_attach_user_policy 'Alice') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1896, in attach_user_policy return self.get_response('AttachUserPolicy', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 02529149-4621-11e7-a927-0d9a21890f37 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'UserName': 'Alice', 'Action': 'AttachUserPolicy', 'Version': '2010-05-08', 'PolicyArn': 'arn:aws:iam::123456789012:policy/S3-read-only-example-bucket'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164844Z host;x-amz-date 017bc6563e51ba81b5b3d7a19d52ed0ba0d12120d60fba93631a026faed42381 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164844Z 20170531/us-east-1/iam/aws4_request a0c1af463ea4bc66e98a639aadf0f363f48929acfe149e6c204baa5b7e0352ea boto: DEBUG: Signature: 196163a8f4cb9699c93e5d5aaed44ab78dc84c25fb87db6841996a1101b72b5b boto: DEBUG: Final headers: {'Content-Length': '140', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164844Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=196163a8f4cb9699c93e5d5aaed44ab78dc84c25fb87db6841996a1101b72b5b'} boto: DEBUG: Response headers: [('x-amzn-requestid', '02529149-4621-11e7-a927-0d9a21890f37'), ('date', 'Wed, 31 May 2017 16:48:44 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 02529149-4621-11e7-a927-0d9a21890f37 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_policy (tests.unit.iam.test_policy.TestCreatePolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_policy.py", line 75, in test_create_policy policy_doc) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1669, in create_policy return self.get_response('CreatePolicy', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 028c65c8-4621-11e7-a8d7-330154ff2b6e -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreatePolicy', 'PolicyName': 'S3-read-only-example-bucket', 'PolicyDocument': '\n{\n "Version": "2012-10-17",\n "Statement": [\n {\n "Sid": "Stmt1430948004000",\n "Effect": "Deny",\n "Action": [\n "s3:*"\n ],\n "Resource": [\n "*"\n ]\n }\n ]\n}\n ', 'Version': '2010-05-08', 'Path': '/'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164844Z host;x-amz-date 8f549f117e1b8a7eb0d7e4deb68bbea755b4edd724776d72a8a19a5ea384c1d3 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164844Z 20170531/us-east-1/iam/aws4_request 7530fefb4b22bc7db356109f85b6fceeaf29756afc4ad6a3068d02359e375e0a boto: DEBUG: Signature: 7dc3c206061736c7243e110f5071524c02bd1398f6325b705e50ba8f39a25c5f boto: DEBUG: Final headers: {'Content-Length': '795', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164844Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=7dc3c206061736c7243e110f5071524c02bd1398f6325b705e50ba8f39a25c5f'} boto: DEBUG: Response headers: [('x-amzn-requestid', '028c65c8-4621-11e7-a8d7-330154ff2b6e'), ('date', 'Wed, 31 May 2017 16:48:43 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 028c65c8-4621-11e7-a8d7-330154ff2b6e --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_policy_version (tests.unit.iam.test_policy.TestCreatePolicyVersion) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_policy.py", line 132, in test_create_policy_version set_as_default=True) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1694, in create_policy_version return self.get_response('CreatePolicyVersion', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 02bff943-4621-11e7-afc7-e1dec95e77c3 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreatePolicyVersion', 'PolicyDocument': '\n{\n "Version": "2012-10-17",\n "Statement": [\n {\n "Sid": "Stmt1430948004000",\n "Effect": "Deny",\n "Action": [\n "s3:*"\n ],\n "Resource": [\n "*"\n ]\n }\n ]\n}\n ', 'SetAsDefault': 'true', 'Version': '2010-05-08', 'PolicyArn': 'arn:aws:iam::123456789012:policy/S3-read-only-example-bucket'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164845Z host;x-amz-date 5b29b45a12d5f189122c1f13513d3a3567bca3af3d1e0bd96c3db28139a823d8 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164845Z 20170531/us-east-1/iam/aws4_request 8f9bb20bfb0d483360616c47959a3375410b94ad847f0c3d3054ca308201eda5 boto: DEBUG: Signature: 34e0651acc2c8985f3fb56080e82e202dc419e0dcc496e15512152f2ecf8de2a boto: DEBUG: Final headers: {'Content-Length': '855', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164845Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=34e0651acc2c8985f3fb56080e82e202dc419e0dcc496e15512152f2ecf8de2a'} boto: DEBUG: Response headers: [('x-amzn-requestid', '02bff943-4621-11e7-afc7-e1dec95e77c3'), ('date', 'Wed, 31 May 2017 16:48:44 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 02bff943-4621-11e7-afc7-e1dec95e77c3 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_policy (tests.unit.iam.test_policy.TestDeletePolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_policy.py", line 163, in test_delete_policy 'arn:aws:iam::123456789012:policy/S3-read-only-example-bucket') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1705, in delete_policy return self.get_response('DeletePolicy', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 02f7d211-4621-11e7-a6a1-bdb36d1feb0a -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DeletePolicy', 'Version': '2010-05-08', 'PolicyArn': 'arn:aws:iam::123456789012:policy/S3-read-only-example-bucket'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164845Z host;x-amz-date 87976ab16a1f433e658a05f6e8c7feb2e4e1a677eb283fde3ec349b19738307d boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164845Z 20170531/us-east-1/iam/aws4_request 2773516dbaf0f003b44e9ec4dbc3bdb4174a2bb8f5a2789ca20c2935112e367e boto: DEBUG: Signature: 29797c04e7e299e4cc9216c496c23dc75995a8beeb011a46f9392c340d1a7e82 boto: DEBUG: Final headers: {'Content-Length': '121', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164845Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=29797c04e7e299e4cc9216c496c23dc75995a8beeb011a46f9392c340d1a7e82'} boto: DEBUG: Response headers: [('x-amzn-requestid', '02f7d211-4621-11e7-a6a1-bdb36d1feb0a'), ('date', 'Wed, 31 May 2017 16:48:44 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 02f7d211-4621-11e7-a6a1-bdb36d1feb0a --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_policy_version (tests.unit.iam.test_policy.TestDeletePolicyVersion) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_policy.py", line 191, in test_delete_policy_version 'v1') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1720, in delete_policy_version return self.get_response('DeletePolicyVersion', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 032e4af5-4621-11e7-a8d7-330154ff2b6e -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DeletePolicyVersion', 'VersionId': 'v1', 'Version': '2010-05-08', 'PolicyArn': 'arn:aws:iam::123456789012:policy/S3-read-only-example-bucket'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164845Z host;x-amz-date 294a83d0cb1e3cbc8cf1bd818b712d5ccb4633aa54ba3c64d11d22b536a14a70 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164845Z 20170531/us-east-1/iam/aws4_request be3f0fe9b6d7c7314e8a10043d15ec444fedaadb19e914cc015a8332b37fcac8 boto: DEBUG: Signature: d37c4ced3656a4b65c0ff00d79359806aa38cd98ef491e050ac8d93cd940a816 boto: DEBUG: Final headers: {'Content-Length': '141', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164845Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=d37c4ced3656a4b65c0ff00d79359806aa38cd98ef491e050ac8d93cd940a816'} boto: DEBUG: Response headers: [('x-amzn-requestid', '032e4af5-4621-11e7-a8d7-330154ff2b6e'), ('date', 'Wed, 31 May 2017 16:48:44 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 032e4af5-4621-11e7-a8d7-330154ff2b6e --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_detach_group_policy (tests.unit.iam.test_policy.TestDetachGroupPolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_policy.py", line 619, in test_detach_group_policy 'Dev') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1908, in detach_group_policy return self.get_response('DetachGroupPolicy', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 03619076-4621-11e7-b059-4b53fccd88dc -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DetachGroupPolicy', 'GroupName': 'Dev', 'Version': '2010-05-08', 'PolicyArn': 'arn:aws:iam::123456789012:policy/S3-read-only-example-bucket'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164846Z host;x-amz-date 0ec85fc20c239a6cbcb9fa5f5a59dbf8af4a9c781babbf015d3efb3214545b31 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164846Z 20170531/us-east-1/iam/aws4_request 4da24dd6b5d11c30ab453e52f8519a65944a22037fc9e75425a46b1bd5e88816 boto: DEBUG: Signature: 39e33b1808917012a8f45c5b85a68755709c42321ad46b461d7683c39bbf3c8b boto: DEBUG: Final headers: {'Content-Length': '140', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164846Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=39e33b1808917012a8f45c5b85a68755709c42321ad46b461d7683c39bbf3c8b'} boto: DEBUG: Response headers: [('x-amzn-requestid', '03619076-4621-11e7-b059-4b53fccd88dc'), ('date', 'Wed, 31 May 2017 16:48:45 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 03619076-4621-11e7-b059-4b53fccd88dc --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_detach_role_policy (tests.unit.iam.test_policy.TestDetachRolePolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_policy.py", line 648, in test_detach_role_policy 'DevRole') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1920, in detach_role_policy return self.get_response('DetachRolePolicy', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0396f7db-4621-11e7-b059-4b53fccd88dc -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DetachRolePolicy', 'RoleName': 'DevRole', 'Version': '2010-05-08', 'PolicyArn': 'arn:aws:iam::123456789012:policy/S3-read-only-example-bucket'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164846Z host;x-amz-date 41b28cc78d9a7fd728151fc4d46e67034d0bd7f55b866799289fc1c67c8dfb47 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164846Z 20170531/us-east-1/iam/aws4_request 96126aa6b9fc6da7908d061b52f4f711d48d21c9935fe44bf2a64aefe8c51e9a boto: DEBUG: Signature: 3437a67746528dac7d72d256426b284ee3023390679a7ed4128d571f29004f8c boto: DEBUG: Final headers: {'Content-Length': '142', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164846Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=3437a67746528dac7d72d256426b284ee3023390679a7ed4128d571f29004f8c'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0396f7db-4621-11e7-b059-4b53fccd88dc'), ('date', 'Wed, 31 May 2017 16:48:46 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0396f7db-4621-11e7-b059-4b53fccd88dc --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_detach_user_policy (tests.unit.iam.test_policy.TestDetachUserPolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_policy.py", line 677, in test_detach_user_policy 'Alice') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1932, in detach_user_policy return self.get_response('DetachUserPolicy', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 03cd7176-4621-11e7-9077-39112920e426 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'UserName': 'Alice', 'Action': 'DetachUserPolicy', 'Version': '2010-05-08', 'PolicyArn': 'arn:aws:iam::123456789012:policy/S3-read-only-example-bucket'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164846Z host;x-amz-date f4a3288acce96016c5c0232f665e7ab53d091ccfdb52ca60aec64567ddddd4cb boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164846Z 20170531/us-east-1/iam/aws4_request 39eda1e675dc35700fe01507825f6c248b67ec2bfbb85d9ed2841cf31839a119 boto: DEBUG: Signature: f03f7e466762c06bbb7893cffe5cb336367483783edff642a44c06aaa54e8eb3 boto: DEBUG: Final headers: {'Content-Length': '140', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164846Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=f03f7e466762c06bbb7893cffe5cb336367483783edff642a44c06aaa54e8eb3'} boto: DEBUG: Response headers: [('x-amzn-requestid', '03cd7176-4621-11e7-9077-39112920e426'), ('date', 'Wed, 31 May 2017 16:48:46 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 03cd7176-4621-11e7-9077-39112920e426 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_policy (tests.unit.iam.test_policy.TestGetPolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_policy.py", line 232, in test_get_policy 'arn:aws:iam::123456789012:policy/S3-read-only-example-bucket') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1731, in get_policy return self.get_response('GetPolicy', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 040682a8-4621-11e7-85fd-f9d5bf8f637c -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'GetPolicy', 'Version': '2010-05-08', 'PolicyArn': 'arn:aws:iam::123456789012:policy/S3-read-only-example-bucket'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164847Z host;x-amz-date 5e63ad24d3e6efd4b856548f6dc4acebdd3f4e17982f4c298ca77b3dd060f675 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164847Z 20170531/us-east-1/iam/aws4_request 620180038502653ca5ca5072f4f890714168929061a4f56e055d8a2c477b1b3c boto: DEBUG: Signature: f5fdfb81ebad6cd778c7322e2561b1657de2d97da90ffde5fd9d0a74420dcfc0 boto: DEBUG: Final headers: {'Content-Length': '118', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164847Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=f5fdfb81ebad6cd778c7322e2561b1657de2d97da90ffde5fd9d0a74420dcfc0'} boto: DEBUG: Response headers: [('x-amzn-requestid', '040682a8-4621-11e7-85fd-f9d5bf8f637c'), ('date', 'Wed, 31 May 2017 16:48:47 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 040682a8-4621-11e7-85fd-f9d5bf8f637c --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_policy_version (tests.unit.iam.test_policy.TestGetPolicyVersion) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_policy.py", line 279, in test_get_policy_version 'v1') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1747, in get_policy_version return self.get_response('GetPolicyVersion', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 043b27d9-4621-11e7-a6a1-bdb36d1feb0a -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'GetPolicyVersion', 'VersionId': 'v1', 'Version': '2010-05-08', 'PolicyArn': 'arn:aws:iam::123456789012:policy/S3-read-only-example-bucket'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164847Z host;x-amz-date c02294f5b1934c5c9483a87af1c6ed39a27d8145eaabe6bd325411d46f810031 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164847Z 20170531/us-east-1/iam/aws4_request 636d9d818473e3b29f1754ea92831054d802880df4f4261f170eccb06d06ecb5 boto: DEBUG: Signature: 5c4493d49a045b63157d7326a694168509918ad6e6e5a83af68319429ef0ade4 boto: DEBUG: Final headers: {'Content-Length': '138', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164847Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=5c4493d49a045b63157d7326a694168509918ad6e6e5a83af68319429ef0ade4'} boto: DEBUG: Response headers: [('x-amzn-requestid', '043b27d9-4621-11e7-a6a1-bdb36d1feb0a'), ('date', 'Wed, 31 May 2017 16:48:46 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 043b27d9-4621-11e7-a6a1-bdb36d1feb0a --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_list_entities_for_policy (tests.unit.iam.test_policy.TestListEntitiesForPolicy) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_policy.py", line 488, in test_list_entities_for_policy 'arn:aws:iam::123456789012:policy/S3-read-only-example-bucket') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1860, in list_entities_for_policy 'PolicyRoles')) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0472b1a9-4621-11e7-85fd-f9d5bf8f637c -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ListEntitiesForPolicy', 'Version': '2010-05-08', 'PolicyArn': 'arn:aws:iam::123456789012:policy/S3-read-only-example-bucket'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164848Z host;x-amz-date fedec3d3f5959fe021bfec9f399c7d2ec8a9b6000a4ea7fc7f94e85b6872c9d5 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164848Z 20170531/us-east-1/iam/aws4_request 4f5b59afc8473b6d3fd4d0a8cdcd23e3fe3c6bc22f8860a35cb90fbecd90def6 boto: DEBUG: Signature: a9b91f42f97f22d205c0cc856678162f5097c1092365be16058645cc34728e9d boto: DEBUG: Final headers: {'Content-Length': '130', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164848Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=a9b91f42f97f22d205c0cc856678162f5097c1092365be16058645cc34728e9d'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0472b1a9-4621-11e7-85fd-f9d5bf8f637c'), ('date', 'Wed, 31 May 2017 16:48:47 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0472b1a9-4621-11e7-85fd-f9d5bf8f637c --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_list_policies (tests.unit.iam.test_policy.TestListPolicies) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_policy.py", line 356, in test_list_policies max_items=4) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1784, in list_policies list_marker='Policies') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 04a66cc0-4621-11e7-a927-0d9a21890f37 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ListPolicies', 'Version': '2010-05-08', 'MaxItems': 4} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164848Z host;x-amz-date f0d3fff6e00c2b6ddc89c5f12e54143c8327ba1824ec564bc60785f7b6e332ec boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164848Z 20170531/us-east-1/iam/aws4_request e20d3d0b3d848f4b7f89dfe1011b58c1100c35251b5b2f9fc171b930cdbda4b0 boto: DEBUG: Signature: 446a254c1b19b3cd9792ced7574ce690e4b229f24ffe01912725371284df384c boto: DEBUG: Final headers: {'Content-Length': '49', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164848Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=446a254c1b19b3cd9792ced7574ce690e4b229f24ffe01912725371284df384c'} boto: DEBUG: Response headers: [('x-amzn-requestid', '04a66cc0-4621-11e7-a927-0d9a21890f37'), ('date', 'Wed, 31 May 2017 16:48:48 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 04a66cc0-4621-11e7-a927-0d9a21890f37 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_list_policy_versions (tests.unit.iam.test_policy.TestListPolicyVersions) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_policy.py", line 409, in test_list_policy_versions max_items=3) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1809, in list_policy_versions list_marker='Versions') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 04db5eff-4621-11e7-b059-4b53fccd88dc -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ListPolicyVersions', 'Version': '2010-05-08', 'PolicyArn': 'arn:aws:iam::123456789012:policy/S3-read-only-example-bucket', 'MaxItems': 3} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164848Z host;x-amz-date 3afa2e5a208904e084806321c02532e8ee22ac7b2b4bde2fd24cb22caafb1dfe boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164848Z 20170531/us-east-1/iam/aws4_request 576ef1a92748b1f7247f75f966e7c765c6053c806b230c967a96e66bce2212e9 boto: DEBUG: Signature: 71f7ccdb75ae39c5e26bcfe5df0d6e3f886419788e5635f7c03660ab2c7fee9b boto: DEBUG: Final headers: {'Content-Length': '138', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164848Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=71f7ccdb75ae39c5e26bcfe5df0d6e3f886419788e5635f7c03660ab2c7fee9b'} boto: DEBUG: Response headers: [('x-amzn-requestid', '04db5eff-4621-11e7-b059-4b53fccd88dc'), ('date', 'Wed, 31 May 2017 16:48:48 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 04db5eff-4621-11e7-b059-4b53fccd88dc --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_set_default_policy_version (tests.unit.iam.test_policy.TestSetDefaultPolicyVersion) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/iam/test_policy.py", line 439, in test_set_default_policy_version 'v1') File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 1824, in set_default_policy_version return self.get_response('SetDefaultPolicyVersion', params) File "/usr/lib/python2.7/dist-packages/boto/iam/connection.py", line 102, in get_response raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 05118a63-4621-11e7-a927-0d9a21890f37 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://iam.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: iam.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'SetDefaultPolicyVersion', 'VersionId': 'v1', 'Version': '2010-05-08', 'PolicyArn': 'arn:aws:iam::123456789012:policy/S3-read-only-example-bucket'} boto: DEBUG: establishing HTTPS connection: host=iam.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT iam.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=iam.amazonaws.com, certificate hosts=['iam.amazonaws.com', 'iam-fips.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:iam.amazonaws.com x-amz-date:20170531T164849Z host;x-amz-date 674048272668f206746a78a830ead2f31c15af1d0af4f4333c92f5b31e42699a boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164849Z 20170531/us-east-1/iam/aws4_request 4d4557a795ade58577c699496d8171979bce6a6fd4689901deb256b52c32fd2d boto: DEBUG: Signature: d62e5e1725b707619e040f2a4e65aa0b66efe6c86721d98eee7c94656274d4ac boto: DEBUG: Final headers: {'Content-Length': '145', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'iam.amazonaws.com', 'X-Amz-Date': '20170531T164849Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/iam/aws4_request,SignedHeaders=host;x-amz-date,Signature=d62e5e1725b707619e040f2a4e65aa0b66efe6c86721d98eee7c94656274d4ac'} boto: DEBUG: Response headers: [('x-amzn-requestid', '05118a63-4621-11e7-a927-0d9a21890f37'), ('date', 'Wed, 31 May 2017 16:48:48 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 05118a63-4621-11e7-a927-0d9a21890f37 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_put_record_binary (tests.unit.kinesis.test_kinesis.TestKinesis) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/kinesis/test_kinesis.py", line 37, in test_put_record_binary b'\x00\x01\x02\x03\x04\x05', 'partition-key') File "/usr/lib/python2.7/dist-packages/boto/kinesis/layer1.py", line 664, in put_record body=json.dumps(params)) File "/usr/lib/python2.7/dist-packages/boto/kinesis/layer1.py", line 878, in make_request body=json_body) JSONResponseError: JSONResponseError: 400 Bad Request {u'message': u'The security token included in the request is invalid.', u'__type': u'UnrecognizedClientException'} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://kinesis.us-east-1.amazonaws.com/ boto: DEBUG: Data: {"PartitionKey": "partition-key", "StreamName": "stream-name", "Data": "AAECAwQF"} boto: DEBUG: Headers: {'Host': 'kinesis.us-east-1.amazonaws.com', 'Content-Type': 'application/x-amz-json-1.1', 'Content-Length': '82', 'X-Amz-Target': 'Kinesis_20131202.PutRecord'} boto: DEBUG: Host: kinesis.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=kinesis.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT kinesis.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=kinesis.us-east-1.amazonaws.com, certificate hosts=['kinesis.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:kinesis.us-east-1.amazonaws.com x-amz-date:20170531T164849Z x-amz-target:Kinesis_20131202.PutRecord host;x-amz-date;x-amz-target 944e6169c2a4e44b6b1bd6b7f30aa26e150db4eb242d06312100730ea73dac22 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164849Z 20170531/us-east-1/kinesis/aws4_request 1311a48e1e5cd5308cadddc34a0d466321cdfe0e7776d422dd5ae00b2413be0d boto: DEBUG: Signature: e400f4fbad825a20d1e5fe0c70f14b1ec84c18bcad9781afdfbb6dbfeaa79681 boto: DEBUG: Final headers: {'Content-Length': '82', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'kinesis.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164849Z', 'X-Amz-Target': 'Kinesis_20131202.PutRecord', 'Content-Type': 'application/x-amz-json-1.1', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/kinesis/aws4_request,SignedHeaders=host;x-amz-date;x-amz-target,Signature=e400f4fbad825a20d1e5fe0c70f14b1ec84c18bcad9781afdfbb6dbfeaa79681'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'f3a1c28a-814e-0ed7-a209-34bb9b5f079c'), ('content-length', '107'), ('x-amz-id-2', 'A0DrlU+0+CczSIP6TquAYL4eooZ5hOAhdk6YLn0/97xhtPg4QTgncZIgY+oUcBHiM4WnwS/TEKn4QKXQSGUtP1J46g/Al2BG'), ('server', 'Apache-Coyote/1.1'), ('connection', 'close'), ('date', 'Wed, 31 May 2017 16:48:48 GMT'), ('content-type', 'application/x-amz-json-1.1')] boto: DEBUG: [('x-amzn-requestid', 'f3a1c28a-814e-0ed7-a209-34bb9b5f079c'), ('content-length', '107'), ('x-amz-id-2', 'A0DrlU+0+CczSIP6TquAYL4eooZ5hOAhdk6YLn0/97xhtPg4QTgncZIgY+oUcBHiM4WnwS/TEKn4QKXQSGUtP1J46g/Al2BG'), ('server', 'Apache-Coyote/1.1'), ('connection', 'close'), ('date', 'Wed, 31 May 2017 16:48:48 GMT'), ('content-type', 'application/x-amz-json-1.1')] boto: DEBUG: {"__type":"UnrecognizedClientException","message":"The security token included in the request is invalid."} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_put_record_string (tests.unit.kinesis.test_kinesis.TestKinesis) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/kinesis/test_kinesis.py", line 48, in test_put_record_string 'data', 'partition-key') File "/usr/lib/python2.7/dist-packages/boto/kinesis/layer1.py", line 664, in put_record body=json.dumps(params)) File "/usr/lib/python2.7/dist-packages/boto/kinesis/layer1.py", line 878, in make_request body=json_body) JSONResponseError: JSONResponseError: 400 Bad Request {u'message': u'The security token included in the request is invalid.', u'__type': u'UnrecognizedClientException'} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://kinesis.us-east-1.amazonaws.com/ boto: DEBUG: Data: {"PartitionKey": "partition-key", "StreamName": "stream-name", "Data": "ZGF0YQ=="} boto: DEBUG: Headers: {'Host': 'kinesis.us-east-1.amazonaws.com', 'Content-Type': 'application/x-amz-json-1.1', 'Content-Length': '82', 'X-Amz-Target': 'Kinesis_20131202.PutRecord'} boto: DEBUG: Host: kinesis.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=kinesis.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT kinesis.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=kinesis.us-east-1.amazonaws.com, certificate hosts=['kinesis.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:kinesis.us-east-1.amazonaws.com x-amz-date:20170531T164849Z x-amz-target:Kinesis_20131202.PutRecord host;x-amz-date;x-amz-target bd39b5dd49bfa3d67f64b82833e9bc1fd7f07e53df125310c1dc600bbb084c84 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164849Z 20170531/us-east-1/kinesis/aws4_request 0e6696a34f1ff5a141e29e0c631d32d9d72854cfb3ffd996bc7fcdaa4245d5ec boto: DEBUG: Signature: 56dc1c3f4d1686335470e3ef97dd7c409fc9629b1f5133dd212deaadcb811567 boto: DEBUG: Final headers: {'Content-Length': '82', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'kinesis.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164849Z', 'X-Amz-Target': 'Kinesis_20131202.PutRecord', 'Content-Type': 'application/x-amz-json-1.1', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/kinesis/aws4_request,SignedHeaders=host;x-amz-date;x-amz-target,Signature=56dc1c3f4d1686335470e3ef97dd7c409fc9629b1f5133dd212deaadcb811567'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd23116a2-ebc4-b3cc-8399-e093f6216e4d'), ('content-length', '107'), ('x-amz-id-2', 'y4w0iW/YeJLfp7wX7yZn1VywEn0+QENnTOXcI6vdEDbuio9iCHoSMcINGwXslBICRKYbN9oD/mX3fVM6Db8Uk3GwOD3f71az'), ('server', 'Apache-Coyote/1.1'), ('connection', 'close'), ('date', 'Wed, 31 May 2017 16:48:49 GMT'), ('content-type', 'application/x-amz-json-1.1')] boto: DEBUG: [('x-amzn-requestid', 'd23116a2-ebc4-b3cc-8399-e093f6216e4d'), ('content-length', '107'), ('x-amz-id-2', 'y4w0iW/YeJLfp7wX7yZn1VywEn0+QENnTOXcI6vdEDbuio9iCHoSMcINGwXslBICRKYbN9oD/mX3fVM6Db8Uk3GwOD3f71az'), ('server', 'Apache-Coyote/1.1'), ('connection', 'close'), ('date', 'Wed, 31 May 2017 16:48:49 GMT'), ('content-type', 'application/x-amz-json-1.1')] boto: DEBUG: {"__type":"UnrecognizedClientException","message":"The security token included in the request is invalid."} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_put_records (tests.unit.kinesis.test_kinesis.TestKinesis) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/kinesis/test_kinesis.py", line 67, in test_put_records records=[record_binary, record_str]) File "/usr/lib/python2.7/dist-packages/boto/kinesis/layer1.py", line 752, in put_records body=json.dumps(params)) File "/usr/lib/python2.7/dist-packages/boto/kinesis/layer1.py", line 878, in make_request body=json_body) JSONResponseError: JSONResponseError: 400 Bad Request {u'message': u'The security token included in the request is invalid.', u'__type': u'UnrecognizedClientException'} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://kinesis.us-east-1.amazonaws.com/ boto: DEBUG: Data: {"Records": [{"PartitionKey": "partition-key", "Data": "AAECAwQF"}, {"PartitionKey": "partition-key", "Data": "ZGF0YQ=="}], "StreamName": "stream-name"} boto: DEBUG: Headers: {'Host': 'kinesis.us-east-1.amazonaws.com', 'Content-Type': 'application/x-amz-json-1.1', 'Content-Length': '152', 'X-Amz-Target': 'Kinesis_20131202.PutRecords'} boto: DEBUG: Host: kinesis.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=kinesis.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT kinesis.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=kinesis.us-east-1.amazonaws.com, certificate hosts=['kinesis.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:kinesis.us-east-1.amazonaws.com x-amz-date:20170531T164850Z x-amz-target:Kinesis_20131202.PutRecords host;x-amz-date;x-amz-target 1773b22400186817235fb6669949702b0a0d5320995508c2906fcb668d4bd96e boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164850Z 20170531/us-east-1/kinesis/aws4_request e9ce076ed4a882a84076dffed236c17333211a3661e68324bb0c8144a3b9e9f4 boto: DEBUG: Signature: 0278bb8b172b1acef5864a2fd710e656bc009bb354660080cf5a3fc1dddf2d95 boto: DEBUG: Final headers: {'Content-Length': '152', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'kinesis.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164850Z', 'X-Amz-Target': 'Kinesis_20131202.PutRecords', 'Content-Type': 'application/x-amz-json-1.1', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/kinesis/aws4_request,SignedHeaders=host;x-amz-date;x-amz-target,Signature=0278bb8b172b1acef5864a2fd710e656bc009bb354660080cf5a3fc1dddf2d95'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'c0338dbb-d14c-18f6-919b-7b894081f969'), ('content-length', '107'), ('x-amz-id-2', 'Jh8iCCbz004I9rmjqxxnS62j/KRf4c/c3eao6fPkJ2hUpQBpVxnWSeD92QJkQsZuyl48MvIHzf5BAldAjUv+Cxjwz+JLbzd0'), ('server', 'Apache-Coyote/1.1'), ('connection', 'close'), ('date', 'Wed, 31 May 2017 16:48:49 GMT'), ('content-type', 'application/x-amz-json-1.1')] boto: DEBUG: [('x-amzn-requestid', 'c0338dbb-d14c-18f6-919b-7b894081f969'), ('content-length', '107'), ('x-amz-id-2', 'Jh8iCCbz004I9rmjqxxnS62j/KRf4c/c3eao6fPkJ2hUpQBpVxnWSeD92QJkQsZuyl48MvIHzf5BAldAjUv+Cxjwz+JLbzd0'), ('server', 'Apache-Coyote/1.1'), ('connection', 'close'), ('date', 'Wed, 31 May 2017 16:48:49 GMT'), ('content-type', 'application/x-amz-json-1.1')] boto: DEBUG: {"__type":"UnrecognizedClientException","message":"The security token included in the request is invalid."} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: This test ensures that binary is base64 encoded when it is sent to ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/kms/test_kms.py", line 41, in test_binary_input self.service_connection.encrypt(key_id='foo', plaintext=data) File "/usr/lib/python2.7/dist-packages/boto/kms/layer1.py", line 412, in encrypt body=json.dumps(params)) File "/usr/lib/python2.7/dist-packages/boto/kms/layer1.py", line 820, in make_request body=json_body) JSONResponseError: JSONResponseError: 400 Bad Request {u'message': u'The security token included in the request is invalid.', u'__type': u'UnrecognizedClientException'} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://kms.us-east-1.amazonaws.com/ boto: DEBUG: Data: {"Plaintext": "AAECAwQF", "KeyId": "foo"} boto: DEBUG: Headers: {'Host': 'kms.us-east-1.amazonaws.com', 'Content-Type': 'application/x-amz-json-1.1', 'Content-Length': '41', 'X-Amz-Target': 'TrentService.Encrypt'} boto: DEBUG: Host: kms.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=kms.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT kms.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=kms.us-east-1.amazonaws.com, certificate hosts=['kms-a.us-east-1.amazonaws.com', 'kms-b.us-east-1.amazonaws.com', 'kms-c.us-east-1.amazonaws.com', 'kms-d.us-east-1.amazonaws.com', 'kms-e.us-east-1.amazonaws.com', 'kms-f.us-east-1.amazonaws.com', 'kms-g.us-east-1.amazonaws.com', 'kms.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:kms.us-east-1.amazonaws.com x-amz-date:20170531T164850Z x-amz-target:TrentService.Encrypt host;x-amz-date;x-amz-target 9424404b9cbb4fbc1287ff9d64c3ad73cecac6fc5be5478ac1ca7863555daff7 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164850Z 20170531/us-east-1/kms/aws4_request fe14d7aada11238fc8bfabd409d84db589ec798d433df3ace2a62b5774bd051a boto: DEBUG: Signature: 6cf80d4a405b1c4d7f9a1c49bc7cd51b42b6f5bdf9703558108a830dc28d2329 boto: DEBUG: Final headers: {'Content-Length': '41', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'kms.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164850Z', 'X-Amz-Target': 'TrentService.Encrypt', 'Content-Type': 'application/x-amz-json-1.1', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/kms/aws4_request,SignedHeaders=host;x-amz-date;x-amz-target,Signature=6cf80d4a405b1c4d7f9a1c49bc7cd51b42b6f5bdf9703558108a830dc28d2329'} boto: DEBUG: Response headers: [('x-amzn-requestid', '05fc3861-4621-11e7-8c99-d35eed0b9020'), ('content-length', '107'), ('server', 'Server'), ('connection', 'keep-alive'), ('date', 'Wed, 31 May 2017 16:48:50 GMT'), ('content-type', 'application/x-amz-json-1.1')] boto: DEBUG: {"__type":"UnrecognizedClientException","message":"The security token included in the request is invalid."} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: This test ensures that the output is base64 decoded before ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/kms/test_kms.py", line 62, in test_binary_ouput response = self.service_connection.decrypt(b'some arbitrary value') File "/usr/lib/python2.7/dist-packages/boto/kms/layer1.py", line 288, in decrypt body=json.dumps(params)) File "/usr/lib/python2.7/dist-packages/boto/kms/layer1.py", line 820, in make_request body=json_body) JSONResponseError: JSONResponseError: 400 Bad Request {u'message': u'The security token included in the request is invalid.', u'__type': u'UnrecognizedClientException'} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://kms.us-east-1.amazonaws.com/ boto: DEBUG: Data: {"CiphertextBlob": "c29tZSBhcmJpdHJhcnkgdmFsdWU="} boto: DEBUG: Headers: {'Host': 'kms.us-east-1.amazonaws.com', 'Content-Type': 'application/x-amz-json-1.1', 'Content-Length': '50', 'X-Amz-Target': 'TrentService.Decrypt'} boto: DEBUG: Host: kms.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=kms.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT kms.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=kms.us-east-1.amazonaws.com, certificate hosts=['kms-a.us-east-1.amazonaws.com', 'kms-b.us-east-1.amazonaws.com', 'kms-c.us-east-1.amazonaws.com', 'kms-d.us-east-1.amazonaws.com', 'kms-e.us-east-1.amazonaws.com', 'kms-f.us-east-1.amazonaws.com', 'kms-g.us-east-1.amazonaws.com', 'kms.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:kms.us-east-1.amazonaws.com x-amz-date:20170531T164850Z x-amz-target:TrentService.Decrypt host;x-amz-date;x-amz-target a86a291ca336151c63d3797bdbbf2acd76279c04fbd14ff81482723f65e493b3 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164850Z 20170531/us-east-1/kms/aws4_request 721365b2e6f26ec7a882caabf8dec9f0258ca407429186dd1a960730b7503b27 boto: DEBUG: Signature: 0f796ffa59c8a9e1bb0f2af429b709103614895b5efdaa76e127030e8c1860e4 boto: DEBUG: Final headers: {'Content-Length': '50', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'kms.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164850Z', 'X-Amz-Target': 'TrentService.Decrypt', 'Content-Type': 'application/x-amz-json-1.1', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/kms/aws4_request,SignedHeaders=host;x-amz-date;x-amz-target,Signature=0f796ffa59c8a9e1bb0f2af429b709103614895b5efdaa76e127030e8c1860e4'} boto: DEBUG: Response headers: [('x-amzn-requestid', '06371ea7-4621-11e7-9433-e73ed61292d2'), ('content-length', '107'), ('server', 'Server'), ('connection', 'keep-alive'), ('date', 'Wed, 31 May 2017 16:48:51 GMT'), ('content-type', 'application/x-amz-json-1.1')] boto: DEBUG: {"__type":"UnrecognizedClientException","message":"The security token included in the request is invalid."} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe (tests.unit.logs.test_layer1.TestDescribeLogs) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/logs/test_layer1.py", line 15, in test_describe api_response = self.service_connection.describe_log_groups() File "/usr/lib/python2.7/dist-packages/boto/logs/layer1.py", line 268, in describe_log_groups body=json.dumps(params)) File "/usr/lib/python2.7/dist-packages/boto/logs/layer1.py", line 576, in make_request body=json_body) JSONResponseError: JSONResponseError: 400 Bad Request {u'message': u'The security token included in the request is invalid.', u'__type': u'UnrecognizedClientException'} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://logs.us-east-1.amazonaws.com/ boto: DEBUG: Data: {} boto: DEBUG: Headers: {'Host': 'logs.us-east-1.amazonaws.com', 'Content-Type': 'application/x-amz-json-1.1', 'Content-Length': '2', 'X-Amz-Target': 'Logs_20140328.DescribeLogGroups'} boto: DEBUG: Host: logs.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=logs.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT logs.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=logs.us-east-1.amazonaws.com, certificate hosts=['logs.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:logs.us-east-1.amazonaws.com x-amz-date:20170531T164851Z x-amz-target:Logs_20140328.DescribeLogGroups host;x-amz-date;x-amz-target 44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164851Z 20170531/us-east-1/logs/aws4_request 19eac0b1da15e508ae1f9164d56b32be12d5367f0820dbe918800b2d333b53aa boto: DEBUG: Signature: 1c1407ec5c504960f2733a65f5d455fb8f49b1ec29a1050dfb14e14743e9bcef boto: DEBUG: Final headers: {'Content-Length': '2', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'logs.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164851Z', 'X-Amz-Target': 'Logs_20140328.DescribeLogGroups', 'Content-Type': 'application/x-amz-json-1.1', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/logs/aws4_request,SignedHeaders=host;x-amz-date;x-amz-target,Signature=1c1407ec5c504960f2733a65f5d455fb8f49b1ec29a1050dfb14e14743e9bcef'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0673d8e7-4621-11e7-9a92-df5568d03b7b'), ('date', 'Wed, 31 May 2017 16:48:51 GMT'), ('content-length', '107'), ('content-type', 'application/x-amz-json-1.1'), ('connection', 'close')] boto: DEBUG: {"__type":"UnrecognizedClientException","message":"The security token included in the request is invalid."} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_predict (tests.unit.machinelearning.test_machinelearning.TestMachineLearning) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/machinelearning/test_machinelearning.py", line 36, in test_predict predict_endpoint=ml_endpoint) File "/usr/lib/python2.7/dist-packages/boto/machinelearning/layer1.py", line 1274, in predict host=predict_host) File "/usr/lib/python2.7/dist-packages/boto/machinelearning/layer1.py", line 1396, in make_request override_num_retries=10) File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/__init__.py", line 38, in _mexe_spy return self.original_mexe(request, *args, **kwargs) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 913, in _mexe self.is_secure) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 705, in get_http_connection return self.new_http_connection(host, port, is_secure) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 747, in new_http_connection connection = self.proxy_ssl(host, is_secure and 443 or 80) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 816, in proxy_ssl resp.status, resp.reason)) error: [Errno -71] Error talking to HTTP proxy squid.internal:3128: 404 (Not Found) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://mymlmodel.amazonaws.com/ boto: DEBUG: Data: {"MLModelId": "foo", "Record": {"Foo": "bar"}, "PredictEndpoint": "mymlmodel.amazonaws.com"} boto: DEBUG: Headers: {'Host': 'mymlmodel.amazonaws.com', 'Content-Type': 'application/x-amz-json-1.1', 'Content-Length': '92', 'X-Amz-Target': 'AmazonML_20141212.Predict'} boto: DEBUG: Host: mymlmodel.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mymlmodel.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mymlmodel.amazonaws.com:443 HTTP/1.0 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_predict_with_scheme_in_endpoint (tests.unit.machinelearning.test_machinelearning.TestMachineLearning) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/machinelearning/test_machinelearning.py", line 44, in test_predict_with_scheme_in_endpoint predict_endpoint='https://' + ml_endpoint) File "/usr/lib/python2.7/dist-packages/boto/machinelearning/layer1.py", line 1274, in predict host=predict_host) File "/usr/lib/python2.7/dist-packages/boto/machinelearning/layer1.py", line 1396, in make_request override_num_retries=10) File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/__init__.py", line 38, in _mexe_spy return self.original_mexe(request, *args, **kwargs) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 913, in _mexe self.is_secure) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 705, in get_http_connection return self.new_http_connection(host, port, is_secure) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 747, in new_http_connection connection = self.proxy_ssl(host, is_secure and 443 or 80) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 816, in proxy_ssl resp.status, resp.reason)) error: [Errno -71] Error talking to HTTP proxy squid.internal:3128: 404 (Not Found) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://mymlmodel.amazonaws.com/ boto: DEBUG: Data: {"MLModelId": "foo", "Record": {"Foo": "bar"}, "PredictEndpoint": "mymlmodel.amazonaws.com"} boto: DEBUG: Headers: {'Host': 'mymlmodel.amazonaws.com', 'Content-Type': 'application/x-amz-json-1.1', 'Content-Length': '92', 'X-Amz-Target': 'AmazonML_20141212.Predict'} boto: DEBUG: Host: mymlmodel.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mymlmodel.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mymlmodel.amazonaws.com:443 HTTP/1.0 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_file_upload_url_success (tests.unit.mturk.test_connection.TestMTurkConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/mturk/test_connection.py", line 25, in test_get_file_upload_url_success rset = self.service_connection.get_file_upload_url('aid', 'qid') File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 456, in get_file_upload_url [('FileUploadURL', FileUploadURL)]) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 838, in _process_request return self._process_response(response, marker_elems) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 853, in _process_response raise MTurkRequestError(response.status, response.reason, body) MTurkRequestError: MTurkRequestError: 200 OK dc7a6382-eebd-4863-92eb-ce65cbad09a9AWS.NotAuthorizedThe identity contained in the request is not authorized to use this AWSAccessKeyId (1496249332301) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://mechanicalturk.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mechanicalturk.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'AssignmentId': 'aid', 'Operation': 'GetFileUploadURL', 'Version': '2014-08-15', 'QuestionIdentifier': 'qid'} boto: DEBUG: establishing HTTPS connection: host=mechanicalturk.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mechanicalturk.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=mechanicalturk.amazonaws.com, certificate hosts=['mechanicalturk.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: using _calc_signature_1 boto: DEBUG: query_string: AssignmentId=aid&AWSAccessKeyId=aws_access_key_id&Operation=GetFileUploadURL&QuestionIdentifier=qid&SignatureVersion=1&Timestamp=2017-05-31T16%3A48%3A52Z&Version=2014-08-15 Signature: ljDBu0aIyTykzVeTVyLG58WclAY= boto: DEBUG: Final headers: {'Content-Length': '213', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Host': 'mechanicalturk.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:52 GMT'), ('content-type', 'text/xml'), ('server', 'MTurk')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_locale_qualification_in (tests.unit.mturk.test_locale_qualification_in.TestMTurkPostingWithQualificationsIn) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/mturk/test_locale_qualification_in.py", line 49, in test_locale_qualification_in qualifications=qualifications) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 265, in create_hit return self._process_request('CreateHIT', params, [('HIT', HIT)]) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 838, in _process_request return self._process_response(response, marker_elems) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 853, in _process_response raise MTurkRequestError(response.status, response.reason, body) MTurkRequestError: MTurkRequestError: 200 OK 6271a661-f477-4537-b0d5-8ec17c3b7517AWS.NotAuthorizedThe identity contained in the request is not authorized to use this AWSAccessKeyId (1496249333056) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://mechanicalturk.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mechanicalturk.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'RequesterAnnotation': 'An annotation from boto external question test', 'Title': 'Boto External Question Test', 'QualificationRequirement.1.Comparator': 'In', 'Question': 'http://samplesite800', 'AssignmentDurationInSeconds': 360, 'QualificationRequirement.1.LocaleValue.2.Country': 'CA', 'Version': '2014-08-15', 'LifetimeInSeconds': 3900, 'AutoApprovalDelayInSeconds': 3600, 'Reward.1.Amount': '0.05', 'Description': None, 'MaxAssignments': 2, 'QualificationRequirement.1.LocaleValue.1.Subdivision': 'WA', 'Reward.1.CurrencyCode': 'USD', 'QualificationRequirement.1.QualificationTypeId': '00000000000000000071', 'Keywords': 'boto, test, doctest', 'Operation': 'CreateHIT', 'QualificationRequirement.1.LocaleValue.1.Country': 'US'} boto: DEBUG: establishing HTTPS connection: host=mechanicalturk.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mechanicalturk.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=mechanicalturk.amazonaws.com, certificate hosts=['mechanicalturk.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: using _calc_signature_1 boto: DEBUG: query_string: AssignmentDurationInSeconds=360&AutoApprovalDelayInSeconds=3600&AWSAccessKeyId=aws_access_key_id&Description=None&Keywords=boto%2C%20test%2C%20doctest&LifetimeInSeconds=3900&MaxAssignments=2&Operation=CreateHIT&QualificationRequirement.1.Comparator=In&QualificationRequirement.1.LocaleValue.1.Country=US&QualificationRequirement.1.LocaleValue.1.Subdivision=WA&QualificationRequirement.1.LocaleValue.2.Country=CA&QualificationRequirement.1.QualificationTypeId=00000000000000000071&Question=%3CExternalQuestion%20xmlns%3D%22http%3A//mechanicalturk.amazonaws.com/AWSMechanicalTurkDataSchemas/2006-07-14/ExternalQuestion.xsd%22%3E%3CExternalURL%3Ehttp%3A//samplesite%3C/ExternalURL%3E%3CFrameHeight%3E800%3C/FrameHeight%3E%3C/ExternalQuestion%3E&RequesterAnnotation=An%20annotation%20from%20boto%20external%20question%20test&Reward.1.Amount=0.05&Reward.1.CurrencyCode=USD&SignatureVersion=1&Timestamp=2017-05-31T16%3A48%3A52Z&Title=Boto%20External%20Question%20Test&Version=2014-08-15 Signature: zldPFShmdiMKSiC9beWOcOn5iuI= boto: DEBUG: Final headers: {'Content-Length': '1021', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Host': 'mechanicalturk.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:52 GMT'), ('content-type', 'text/xml'), ('server', 'MTurk')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_locale_qualification_notin_in (tests.unit.mturk.test_locale_qualification_in.TestMTurkPostingWithQualificationsIn) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/mturk/test_locale_qualification_in.py", line 104, in test_locale_qualification_notin_in qualifications=qualifications) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 265, in create_hit return self._process_request('CreateHIT', params, [('HIT', HIT)]) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 838, in _process_request return self._process_response(response, marker_elems) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 853, in _process_response raise MTurkRequestError(response.status, response.reason, body) MTurkRequestError: MTurkRequestError: 200 OK a933b649-9e6e-4d1f-b302-15ac575e5c59AWS.NotAuthorizedThe identity contained in the request is not authorized to use this AWSAccessKeyId (1496249333756) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://mechanicalturk.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mechanicalturk.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'RequesterAnnotation': 'An annotation from boto external question test', 'Title': 'Boto External Question Test', 'QualificationRequirement.1.Comparator': 'NotIn', 'Question': 'http://samplesite800', 'AssignmentDurationInSeconds': 360, 'QualificationRequirement.2.Comparator': 'In', 'QualificationRequirement.1.LocaleValue.2.Country': 'CA', 'Version': '2014-08-15', 'LifetimeInSeconds': 3900, 'AutoApprovalDelayInSeconds': 3600, 'Reward.1.Amount': '0.05', 'QualificationRequirement.2.LocaleValue.1.Country': 'US', 'Description': None, 'MaxAssignments': 2, 'QualificationRequirement.1.LocaleValue.1.Subdivision': 'WA', 'Reward.1.CurrencyCode': 'USD', 'QualificationRequirement.2.QualificationTypeId': '00000000000000000071', 'QualificationRequirement.1.QualificationTypeId': '00000000000000000071', 'Keywords': 'boto, test, doctest', 'QualificationRequirement.2.LocaleValue.1.Subdivision': 'CA', 'Operation': 'CreateHIT', 'QualificationRequirement.1.LocaleValue.1.Country': 'US'} boto: DEBUG: establishing HTTPS connection: host=mechanicalturk.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mechanicalturk.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=mechanicalturk.amazonaws.com, certificate hosts=['mechanicalturk.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: using _calc_signature_1 boto: DEBUG: query_string: AssignmentDurationInSeconds=360&AutoApprovalDelayInSeconds=3600&AWSAccessKeyId=aws_access_key_id&Description=None&Keywords=boto%2C%20test%2C%20doctest&LifetimeInSeconds=3900&MaxAssignments=2&Operation=CreateHIT&QualificationRequirement.1.Comparator=NotIn&QualificationRequirement.1.LocaleValue.1.Country=US&QualificationRequirement.1.LocaleValue.1.Subdivision=WA&QualificationRequirement.1.LocaleValue.2.Country=CA&QualificationRequirement.1.QualificationTypeId=00000000000000000071&QualificationRequirement.2.Comparator=In&QualificationRequirement.2.LocaleValue.1.Country=US&QualificationRequirement.2.LocaleValue.1.Subdivision=CA&QualificationRequirement.2.QualificationTypeId=00000000000000000071&Question=%3CExternalQuestion%20xmlns%3D%22http%3A//mechanicalturk.amazonaws.com/AWSMechanicalTurkDataSchemas/2006-07-14/ExternalQuestion.xsd%22%3E%3CExternalURL%3Ehttp%3A//samplesite%3C/ExternalURL%3E%3CFrameHeight%3E800%3C/FrameHeight%3E%3C/ExternalQuestion%3E&RequesterAnnotation=An%20annotation%20from%20boto%20external%20question%20test&Reward.1.Amount=0.05&Reward.1.CurrencyCode=USD&SignatureVersion=1&Timestamp=2017-05-31T16%3A48%3A53Z&Title=Boto%20External%20Question%20Test&Version=2014-08-15 Signature: XEehP3QO2fEh4F4bUcjyJ+zMGNA= boto: DEBUG: Final headers: {'Content-Length': '1243', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Host': 'mechanicalturk.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:53 GMT'), ('content-type', 'text/xml'), ('server', 'MTurk')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_locale_qualification_in_notin (tests.unit.mturk.test_locale_qualification_notin.TestMTurkPostingWithQualificationsNotin) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/mturk/test_locale_qualification_notin.py", line 104, in test_locale_qualification_in_notin qualifications=qualifications) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 265, in create_hit return self._process_request('CreateHIT', params, [('HIT', HIT)]) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 838, in _process_request return self._process_response(response, marker_elems) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 853, in _process_response raise MTurkRequestError(response.status, response.reason, body) MTurkRequestError: MTurkRequestError: 200 OK f96e9051-2c86-46c2-bc50-91608478bd7aAWS.NotAuthorizedThe identity contained in the request is not authorized to use this AWSAccessKeyId (1496249334767) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://mechanicalturk.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mechanicalturk.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'RequesterAnnotation': 'An annotation from boto external question test', 'Title': 'Boto External Question Test', 'QualificationRequirement.1.Comparator': 'In', 'Question': 'http://samplesite800', 'AssignmentDurationInSeconds': 360, 'QualificationRequirement.2.Comparator': 'NotIn', 'Version': '2014-08-15', 'AutoApprovalDelayInSeconds': 3600, 'LifetimeInSeconds': 3900, 'QualificationRequirement.2.LocaleValue.2.Country': 'CA', 'Reward.1.Amount': '0.05', 'QualificationRequirement.2.LocaleValue.1.Country': 'US', 'Description': None, 'MaxAssignments': 2, 'QualificationRequirement.1.LocaleValue.1.Subdivision': 'CA', 'Reward.1.CurrencyCode': 'USD', 'QualificationRequirement.2.QualificationTypeId': '00000000000000000071', 'QualificationRequirement.1.QualificationTypeId': '00000000000000000071', 'Keywords': 'boto, test, doctest', 'QualificationRequirement.2.LocaleValue.1.Subdivision': 'WA', 'Operation': 'CreateHIT', 'QualificationRequirement.1.LocaleValue.1.Country': 'US'} boto: DEBUG: establishing HTTPS connection: host=mechanicalturk.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mechanicalturk.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=mechanicalturk.amazonaws.com, certificate hosts=['mechanicalturk.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: using _calc_signature_1 boto: DEBUG: query_string: AssignmentDurationInSeconds=360&AutoApprovalDelayInSeconds=3600&AWSAccessKeyId=aws_access_key_id&Description=None&Keywords=boto%2C%20test%2C%20doctest&LifetimeInSeconds=3900&MaxAssignments=2&Operation=CreateHIT&QualificationRequirement.1.Comparator=In&QualificationRequirement.1.LocaleValue.1.Country=US&QualificationRequirement.1.LocaleValue.1.Subdivision=CA&QualificationRequirement.1.QualificationTypeId=00000000000000000071&QualificationRequirement.2.Comparator=NotIn&QualificationRequirement.2.LocaleValue.1.Country=US&QualificationRequirement.2.LocaleValue.1.Subdivision=WA&QualificationRequirement.2.LocaleValue.2.Country=CA&QualificationRequirement.2.QualificationTypeId=00000000000000000071&Question=%3CExternalQuestion%20xmlns%3D%22http%3A//mechanicalturk.amazonaws.com/AWSMechanicalTurkDataSchemas/2006-07-14/ExternalQuestion.xsd%22%3E%3CExternalURL%3Ehttp%3A//samplesite%3C/ExternalURL%3E%3CFrameHeight%3E800%3C/FrameHeight%3E%3C/ExternalQuestion%3E&RequesterAnnotation=An%20annotation%20from%20boto%20external%20question%20test&Reward.1.Amount=0.05&Reward.1.CurrencyCode=USD&SignatureVersion=1&Timestamp=2017-05-31T16%3A48%3A54Z&Title=Boto%20External%20Question%20Test&Version=2014-08-15 Signature: BWb1IKQ+S9jP91doGzthPMtgMhk= boto: DEBUG: Final headers: {'Content-Length': '1243', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Host': 'mechanicalturk.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:54 GMT'), ('content-type', 'text/xml'), ('server', 'MTurk')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_locale_qualification_notin (tests.unit.mturk.test_locale_qualification_notin.TestMTurkPostingWithQualificationsNotin) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/mturk/test_locale_qualification_notin.py", line 49, in test_locale_qualification_notin qualifications=qualifications) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 265, in create_hit return self._process_request('CreateHIT', params, [('HIT', HIT)]) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 838, in _process_request return self._process_response(response, marker_elems) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 853, in _process_response raise MTurkRequestError(response.status, response.reason, body) MTurkRequestError: MTurkRequestError: 200 OK 517bebda-8b8c-4a66-a20f-b5f5c486674eAWS.NotAuthorizedThe identity contained in the request is not authorized to use this AWSAccessKeyId (1496249335388) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://mechanicalturk.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mechanicalturk.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'RequesterAnnotation': 'An annotation from boto external question test', 'Title': 'Boto External Question Test', 'QualificationRequirement.1.Comparator': 'NotIn', 'Question': 'http://samplesite800', 'AssignmentDurationInSeconds': 360, 'QualificationRequirement.1.LocaleValue.2.Country': 'CA', 'Version': '2014-08-15', 'LifetimeInSeconds': 3900, 'AutoApprovalDelayInSeconds': 3600, 'Reward.1.Amount': '0.05', 'Description': None, 'MaxAssignments': 2, 'QualificationRequirement.1.LocaleValue.1.Subdivision': 'WA', 'Reward.1.CurrencyCode': 'USD', 'QualificationRequirement.1.QualificationTypeId': '00000000000000000071', 'Keywords': 'boto, test, doctest', 'Operation': 'CreateHIT', 'QualificationRequirement.1.LocaleValue.1.Country': 'US'} boto: DEBUG: establishing HTTPS connection: host=mechanicalturk.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mechanicalturk.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=mechanicalturk.amazonaws.com, certificate hosts=['mechanicalturk.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: using _calc_signature_1 boto: DEBUG: query_string: AssignmentDurationInSeconds=360&AutoApprovalDelayInSeconds=3600&AWSAccessKeyId=aws_access_key_id&Description=None&Keywords=boto%2C%20test%2C%20doctest&LifetimeInSeconds=3900&MaxAssignments=2&Operation=CreateHIT&QualificationRequirement.1.Comparator=NotIn&QualificationRequirement.1.LocaleValue.1.Country=US&QualificationRequirement.1.LocaleValue.1.Subdivision=WA&QualificationRequirement.1.LocaleValue.2.Country=CA&QualificationRequirement.1.QualificationTypeId=00000000000000000071&Question=%3CExternalQuestion%20xmlns%3D%22http%3A//mechanicalturk.amazonaws.com/AWSMechanicalTurkDataSchemas/2006-07-14/ExternalQuestion.xsd%22%3E%3CExternalURL%3Ehttp%3A//samplesite%3C/ExternalURL%3E%3CFrameHeight%3E800%3C/FrameHeight%3E%3C/ExternalQuestion%3E&RequesterAnnotation=An%20annotation%20from%20boto%20external%20question%20test&Reward.1.Amount=0.05&Reward.1.CurrencyCode=USD&SignatureVersion=1&Timestamp=2017-05-31T16%3A48%3A55Z&Title=Boto%20External%20Question%20Test&Version=2014-08-15 Signature: sycwtMWdweTusbQ7wSXghg8Jutk= boto: DEBUG: Final headers: {'Content-Length': '1024', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Host': 'mechanicalturk.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:54 GMT'), ('content-type', 'text/xml'), ('server', 'MTurk')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_qualification_doesnotexist (tests.unit.mturk.test_qualification_doesnotexist.TestMTurkPostingWithQualificationsDoesnotexist) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/mturk/test_qualification_doesnotexist.py", line 51, in test_qualification_doesnotexist qualifications=qualifications) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 265, in create_hit return self._process_request('CreateHIT', params, [('HIT', HIT)]) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 838, in _process_request return self._process_response(response, marker_elems) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 853, in _process_response raise MTurkRequestError(response.status, response.reason, body) MTurkRequestError: MTurkRequestError: 200 OK 5691b45a-0642-45df-ad64-34b283f4c2c2AWS.NotAuthorizedThe identity contained in the request is not authorized to use this AWSAccessKeyId (1496249336043) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://mechanicalturk.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mechanicalturk.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'RequesterAnnotation': 'An annotation from boto external question test', 'Version': '2014-08-15', 'Description': None, 'MaxAssignments': 2, 'Title': 'Boto External Question Test', 'QualificationRequirement.1.Comparator': 'DoesNotExist', 'Question': 'http://samplesite800', 'AssignmentDurationInSeconds': 360, 'Reward.1.CurrencyCode': 'USD', 'QualificationRequirement.1.QualificationTypeId': '333333333333333333333333333333', 'Keywords': 'boto, test, doctest', 'Operation': 'CreateHIT', 'Reward.1.Amount': '0.05', 'LifetimeInSeconds': 3900, 'AutoApprovalDelayInSeconds': 3600} boto: DEBUG: establishing HTTPS connection: host=mechanicalturk.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mechanicalturk.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=mechanicalturk.amazonaws.com, certificate hosts=['mechanicalturk.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: using _calc_signature_1 boto: DEBUG: query_string: AssignmentDurationInSeconds=360&AutoApprovalDelayInSeconds=3600&AWSAccessKeyId=aws_access_key_id&Description=None&Keywords=boto%2C%20test%2C%20doctest&LifetimeInSeconds=3900&MaxAssignments=2&Operation=CreateHIT&QualificationRequirement.1.Comparator=DoesNotExist&QualificationRequirement.1.QualificationTypeId=333333333333333333333333333333&Question=%3CExternalQuestion%20xmlns%3D%22http%3A//mechanicalturk.amazonaws.com/AWSMechanicalTurkDataSchemas/2006-07-14/ExternalQuestion.xsd%22%3E%3CExternalURL%3Ehttp%3A//samplesite%3C/ExternalURL%3E%3CFrameHeight%3E800%3C/FrameHeight%3E%3C/ExternalQuestion%3E&RequesterAnnotation=An%20annotation%20from%20boto%20external%20question%20test&Reward.1.Amount=0.05&Reward.1.CurrencyCode=USD&SignatureVersion=1&Timestamp=2017-05-31T16%3A48%3A55Z&Title=Boto%20External%20Question%20Test&Version=2014-08-15 Signature: 4cNst9GSbtokZQ7/c8FyzR/jXO8= boto: DEBUG: Final headers: {'Content-Length': '885', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Host': 'mechanicalturk.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:55 GMT'), ('content-type', 'text/xml'), ('server', 'MTurk')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_qualification_exists (tests.unit.mturk.test_qualification_exists.TestMTurkPostingWithQualificationsExists) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/mturk/test_qualification_exists.py", line 51, in test_qualification_exists qualifications=qualifications) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 265, in create_hit return self._process_request('CreateHIT', params, [('HIT', HIT)]) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 838, in _process_request return self._process_response(response, marker_elems) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 853, in _process_response raise MTurkRequestError(response.status, response.reason, body) MTurkRequestError: MTurkRequestError: 200 OK bdefeb96-cb2a-4cfc-aff9-f0566c56351aAWS.NotAuthorizedThe identity contained in the request is not authorized to use this AWSAccessKeyId (1496249336895) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://mechanicalturk.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mechanicalturk.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'RequesterAnnotation': 'An annotation from boto external question test', 'Version': '2014-08-15', 'Description': None, 'MaxAssignments': 2, 'Title': 'Boto External Question Test', 'QualificationRequirement.1.Comparator': 'Exists', 'Question': 'http://samplesite800', 'AssignmentDurationInSeconds': 360, 'Reward.1.CurrencyCode': 'USD', 'QualificationRequirement.1.QualificationTypeId': '333333333333333333333333333333', 'Keywords': 'boto, test, doctest', 'Operation': 'CreateHIT', 'Reward.1.Amount': '0.05', 'LifetimeInSeconds': 3900, 'AutoApprovalDelayInSeconds': 3600} boto: DEBUG: establishing HTTPS connection: host=mechanicalturk.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mechanicalturk.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=mechanicalturk.amazonaws.com, certificate hosts=['mechanicalturk.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: using _calc_signature_1 boto: DEBUG: query_string: AssignmentDurationInSeconds=360&AutoApprovalDelayInSeconds=3600&AWSAccessKeyId=aws_access_key_id&Description=None&Keywords=boto%2C%20test%2C%20doctest&LifetimeInSeconds=3900&MaxAssignments=2&Operation=CreateHIT&QualificationRequirement.1.Comparator=Exists&QualificationRequirement.1.QualificationTypeId=333333333333333333333333333333&Question=%3CExternalQuestion%20xmlns%3D%22http%3A//mechanicalturk.amazonaws.com/AWSMechanicalTurkDataSchemas/2006-07-14/ExternalQuestion.xsd%22%3E%3CExternalURL%3Ehttp%3A//samplesite%3C/ExternalURL%3E%3CFrameHeight%3E800%3C/FrameHeight%3E%3C/ExternalQuestion%3E&RequesterAnnotation=An%20annotation%20from%20boto%20external%20question%20test&Reward.1.Amount=0.05&Reward.1.CurrencyCode=USD&SignatureVersion=1&Timestamp=2017-05-31T16%3A48%3A56Z&Title=Boto%20External%20Question%20Test&Version=2014-08-15 Signature: nWVFk0SkmJDiThno3KJTeeP00NY= boto: DEBUG: Final headers: {'Content-Length': '875', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Host': 'mechanicalturk.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:56 GMT'), ('content-type', 'text/xml'), ('server', 'MTurk')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_qualification_qualtypewithscore_in (tests.unit.mturk.test_qualification_qualtypewithscore_in.TestMTurkPostingWithQualQualtypewithscoreIn) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/mturk/test_qualification_qualtypewithscore_in.py", line 52, in test_qualification_qualtypewithscore_in qualifications=qualifications) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 265, in create_hit return self._process_request('CreateHIT', params, [('HIT', HIT)]) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 838, in _process_request return self._process_response(response, marker_elems) File "/usr/lib/python2.7/dist-packages/boto/mturk/connection.py", line 853, in _process_response raise MTurkRequestError(response.status, response.reason, body) MTurkRequestError: MTurkRequestError: 200 OK 201f4c36-f0bd-41ea-9e32-4d583546915cAWS.NotAuthorizedThe identity contained in the request is not authorized to use this AWSAccessKeyId (1496249337291) -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://mechanicalturk.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mechanicalturk.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'RequesterAnnotation': 'An annotation from boto external question test', 'Title': 'Boto External Question Test', 'QualificationRequirement.1.Comparator': 'In', 'Question': 'http://samplesite800', 'AssignmentDurationInSeconds': 360, 'Version': '2014-08-15', 'LifetimeInSeconds': 3900, 'AutoApprovalDelayInSeconds': 3600, 'QualificationRequirement.1.IntegerValue.1': 100, 'QualificationRequirement.1.IntegerValue.3': 80, 'QualificationRequirement.1.IntegerValue.2': 90, 'Description': None, 'MaxAssignments': 2, 'Reward.1.CurrencyCode': 'USD', 'QualificationRequirement.1.QualificationTypeId': '333333333333333333333333333333', 'Keywords': 'boto, test, doctest', 'Operation': 'CreateHIT', 'Reward.1.Amount': '0.05'} boto: DEBUG: establishing HTTPS connection: host=mechanicalturk.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mechanicalturk.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=mechanicalturk.amazonaws.com, certificate hosts=['mechanicalturk.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: using _calc_signature_1 boto: DEBUG: query_string: AssignmentDurationInSeconds=360&AutoApprovalDelayInSeconds=3600&AWSAccessKeyId=aws_access_key_id&Description=None&Keywords=boto%2C%20test%2C%20doctest&LifetimeInSeconds=3900&MaxAssignments=2&Operation=CreateHIT&QualificationRequirement.1.Comparator=In&QualificationRequirement.1.IntegerValue.1=100&QualificationRequirement.1.IntegerValue.2=90&QualificationRequirement.1.IntegerValue.3=80&QualificationRequirement.1.QualificationTypeId=333333333333333333333333333333&Question=%3CExternalQuestion%20xmlns%3D%22http%3A//mechanicalturk.amazonaws.com/AWSMechanicalTurkDataSchemas/2006-07-14/ExternalQuestion.xsd%22%3E%3CExternalURL%3Ehttp%3A//samplesite%3C/ExternalURL%3E%3CFrameHeight%3E800%3C/FrameHeight%3E%3C/ExternalQuestion%3E&RequesterAnnotation=An%20annotation%20from%20boto%20external%20question%20test&Reward.1.Amount=0.05&Reward.1.CurrencyCode=USD&SignatureVersion=1&Timestamp=2017-05-31T16%3A48%3A57Z&Title=Boto%20External%20Question%20Test&Version=2014-08-15 Signature: zCt/SiOKpn67E8zpr9ThvQ48V/8= boto: DEBUG: Final headers: {'Content-Length': '1011', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Host': 'mechanicalturk.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:48:56 GMT'), ('content-type', 'text/xml'), ('server', 'MTurk')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_db_instance_param_group_instance (tests.unit.rds.test_connection.TestRDSCCreateDBInstance) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_connection.py", line 318, in test_create_db_instance_param_group_instance db_subnet_group_name='dbSubnetgroup01') File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 457, in create_dbinstance return self.get_object('CreateDBInstance', params, DBInstance) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0a486160-4621-11e7-82f0-43362c8c98e8 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Engine': 'MySQL5.1', 'DBParameterGroupName': 'default.mysql5.1', 'MasterUsername': 'master', 'MasterUserPassword': 'Password01', 'AutoMinorVersionUpgrade': 'true', 'Version': '2013-05-15', 'AllocatedStorage': 10, 'Action': 'CreateDBInstance', 'DBInstanceClass': 'db.m1.large', 'DBSubnetGroupName': 'dbSubnetgroup01', 'Port': 3306, 'DBInstanceIdentifier': 'SimCoProd01'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateDBInstance&AllocatedStorage=10&AutoMinorVersionUpgrade=true&DBInstanceClass=db.m1.large&DBInstanceIdentifier=SimCoProd01&DBParameterGroupName=default.mysql5.1&DBSubnetGroupName=dbSubnetgroup01&Engine=MySQL5.1&MasterUserPassword=Password01&MasterUsername=master&Port=3306&Version=2013-05-15 host:rds.amazonaws.com x-amz-date:20170531T164857Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164857Z 20170531/us-east-1/rds/aws4_request 2ad9035464acbaf0762f36dd771411e6c7f4297625af90cbbc5d008c6a26a287 boto: DEBUG: Signature: 1d0d7c005e64fc287f1d37962c9166ee9ea5e8375938bb17f8c350cb39e828f1 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=1d0d7c005e64fc287f1d37962c9166ee9ea5e8375938bb17f8c350cb39e828f1', 'X-Amz-Date': '20170531T164857Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0a486160-4621-11e7-82f0-43362c8c98e8'), ('date', 'Wed, 31 May 2017 16:48:57 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0a486160-4621-11e7-82f0-43362c8c98e8 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_db_instance_param_group_name (tests.unit.rds.test_connection.TestRDSCCreateDBInstance) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_connection.py", line 274, in test_create_db_instance_param_group_name backup_retention_period=0) File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 457, in create_dbinstance return self.get_object('CreateDBInstance', params, DBInstance) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0a7fc4bf-4621-11e7-8fa7-cb3bace64a59 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Engine': 'MySQL5.1', 'DBParameterGroupName': 'default.mysql5.1', 'MasterUsername': 'master', 'MasterUserPassword': 'Password01', 'AutoMinorVersionUpgrade': 'true', 'Version': '2013-05-15', 'AllocatedStorage': 10, 'Action': 'CreateDBInstance', 'DBInstanceClass': 'db.m1.large', 'BackupRetentionPeriod': 0, 'DBSubnetGroupName': 'dbSubnetgroup01', 'Port': 3306, 'DBInstanceIdentifier': 'SimCoProd01'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateDBInstance&AllocatedStorage=10&AutoMinorVersionUpgrade=true&BackupRetentionPeriod=0&DBInstanceClass=db.m1.large&DBInstanceIdentifier=SimCoProd01&DBParameterGroupName=default.mysql5.1&DBSubnetGroupName=dbSubnetgroup01&Engine=MySQL5.1&MasterUserPassword=Password01&MasterUsername=master&Port=3306&Version=2013-05-15 host:rds.amazonaws.com x-amz-date:20170531T164858Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164858Z 20170531/us-east-1/rds/aws4_request 3b40562cd6f4cf95c5d58106d30da5455db2c754e16c159b52759c74a9371853 boto: DEBUG: Signature: 437860c7bed9158b64121e95391d7278285f37c8e7d63010704190917b27d90c boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=437860c7bed9158b64121e95391d7278285f37c8e7d63010704190917b27d90c', 'X-Amz-Date': '20170531T164858Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0a7fc4bf-4621-11e7-8fa7-cb3bace64a59'), ('date', 'Wed, 31 May 2017 16:48:57 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0a7fc4bf-4621-11e7-8fa7-cb3bace64a59 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_db_instances (tests.unit.rds.test_connection.TestRDSConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_connection.py", line 137, in test_get_all_db_instances response = self.service_connection.get_all_dbinstances('instance_id') File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 136, in get_all_dbinstances [('DBInstance', DBInstance)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0ab8614c-4621-11e7-82f0-43362c8c98e8 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeDBInstances', 'Version': '2013-05-15', 'DBInstanceIdentifier': 'instance_id'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeDBInstances&DBInstanceIdentifier=instance_id&Version=2013-05-15 host:rds.amazonaws.com x-amz-date:20170531T164858Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164858Z 20170531/us-east-1/rds/aws4_request d6ebf4671e8297c0bdd652132994eb96e63b7919ff5230c88f8d663e5704878c boto: DEBUG: Signature: e1fbe030c09cceeec72575a662d37bc3aa57982bd4372f4f8eecbf06589044eb boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=e1fbe030c09cceeec72575a662d37bc3aa57982bd4372f4f8eecbf06589044eb', 'X-Amz-Date': '20170531T164858Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0ab8614c-4621-11e7-82f0-43362c8c98e8'), ('date', 'Wed, 31 May 2017 16:48:57 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0ab8614c-4621-11e7-82f0-43362c8c98e8 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_db_instance_vpc_sg_obj (tests.unit.rds.test_connection.TestRDSConnectionRestoreDBInstanceFromPointInTime) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_connection.py", line 488, in test_create_db_instance_vpc_sg_obj vpc_security_groups=vpc_security_groups) File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 457, in create_dbinstance return self.get_object('CreateDBInstance', params, DBInstance) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0aef9d9f-4621-11e7-96ba-99c2e160c8cc -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Engine': 'MySQL5.1', 'DBParameterGroupName': 'default.mysql5.1', 'MasterUsername': 'master', 'MasterUserPassword': 'Password01', 'AutoMinorVersionUpgrade': 'true', 'Version': '2013-05-15', 'DBInstanceIdentifier': 'SimCoProd01', 'AllocatedStorage': 10, 'Action': 'CreateDBInstance', 'DBInstanceClass': 'db.m1.large', 'DBSubnetGroupName': 'dbSubnetgroup01', 'Port': 3306, 'VpcSecurityGroupIds.member.1': 'sg-1', 'VpcSecurityGroupIds.member.2': 'sg-2'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateDBInstance&AllocatedStorage=10&AutoMinorVersionUpgrade=true&DBInstanceClass=db.m1.large&DBInstanceIdentifier=SimCoProd01&DBParameterGroupName=default.mysql5.1&DBSubnetGroupName=dbSubnetgroup01&Engine=MySQL5.1&MasterUserPassword=Password01&MasterUsername=master&Port=3306&Version=2013-05-15&VpcSecurityGroupIds.member.1=sg-1&VpcSecurityGroupIds.member.2=sg-2 host:rds.amazonaws.com x-amz-date:20170531T164858Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164858Z 20170531/us-east-1/rds/aws4_request 7643d3878b75325d498e2f421275eb8101c5a981fb754306c428bc9816185c80 boto: DEBUG: Signature: f7d01499d2709961a874d3ee3a814e7a119732f1b314e4bd63a36fa332e9eb03 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=f7d01499d2709961a874d3ee3a814e7a119732f1b314e4bd63a36fa332e9eb03', 'X-Amz-Date': '20170531T164858Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0aef9d9f-4621-11e7-96ba-99c2e160c8cc'), ('date', 'Wed, 31 May 2017 16:48:58 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0aef9d9f-4621-11e7-96ba-99c2e160c8cc --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_db_instance_vpc_sg_str (tests.unit.rds.test_connection.TestRDSConnectionRestoreDBInstanceFromPointInTime) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_connection.py", line 452, in test_create_db_instance_vpc_sg_str vpc_security_groups=vpc_security_groups) File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 457, in create_dbinstance return self.get_object('CreateDBInstance', params, DBInstance) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0b27c4d2-4621-11e7-b754-b7c5e5d03df3 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Engine': 'MySQL5.1', 'DBParameterGroupName': 'default.mysql5.1', 'MasterUsername': 'master', 'MasterUserPassword': 'Password01', 'AutoMinorVersionUpgrade': 'true', 'Version': '2013-05-15', 'DBInstanceIdentifier': 'SimCoProd01', 'AllocatedStorage': 10, 'Action': 'CreateDBInstance', 'DBInstanceClass': 'db.m1.large', 'DBSubnetGroupName': 'dbSubnetgroup01', 'Port': 3306, 'VpcSecurityGroupIds.member.1': 'sg-1', 'VpcSecurityGroupIds.member.2': 'sg-2'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateDBInstance&AllocatedStorage=10&AutoMinorVersionUpgrade=true&DBInstanceClass=db.m1.large&DBInstanceIdentifier=SimCoProd01&DBParameterGroupName=default.mysql5.1&DBSubnetGroupName=dbSubnetgroup01&Engine=MySQL5.1&MasterUserPassword=Password01&MasterUsername=master&Port=3306&Version=2013-05-15&VpcSecurityGroupIds.member.1=sg-1&VpcSecurityGroupIds.member.2=sg-2 host:rds.amazonaws.com x-amz-date:20170531T164859Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164859Z 20170531/us-east-1/rds/aws4_request c55e6a1396625c329b3980e808ede0f77c9fcfc927125427d4853ab0dedcb797 boto: DEBUG: Signature: 76f648237323bf1d915379db050dea872efe82be0f68b764385d26a04c5be0bf boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=76f648237323bf1d915379db050dea872efe82be0f68b764385d26a04c5be0bf', 'X-Amz-Date': '20170531T164859Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0b27c4d2-4621-11e7-b754-b7c5e5d03df3'), ('date', 'Wed, 31 May 2017 16:48:58 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0b27c4d2-4621-11e7-b754-b7c5e5d03df3 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_restore_dbinstance_from_point_in_time (tests.unit.rds.test_connection.TestRDSConnectionRestoreDBInstanceFromPointInTime) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_connection.py", line 400, in test_restore_dbinstance_from_point_in_time True) File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 1338, in restore_dbinstance_from_point_in_time params, DBInstance) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0b5fc40e-4621-11e7-9b58-a9b66ba57784 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'RestoreDBInstanceToPointInTime', 'SourceDBInstanceIdentifier': 'simcoprod01', 'Version': '2013-05-15', 'UseLatestRestorableTime': 'true', 'TargetDBInstanceIdentifier': 'restored-db'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=RestoreDBInstanceToPointInTime&SourceDBInstanceIdentifier=simcoprod01&TargetDBInstanceIdentifier=restored-db&UseLatestRestorableTime=true&Version=2013-05-15 host:rds.amazonaws.com x-amz-date:20170531T164859Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164859Z 20170531/us-east-1/rds/aws4_request 1959c534ed6bdfeb578e35ca86edc2fcea66732beb3499fe21c78f07aa670f5a boto: DEBUG: Signature: cb675fc32c04500f61332eb2e3bd3587b663b45ef91077981758eedea0617173 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=cb675fc32c04500f61332eb2e3bd3587b663b45ef91077981758eedea0617173', 'X-Amz-Date': '20170531T164859Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0b5fc40e-4621-11e7-9b58-a9b66ba57784'), ('date', 'Wed, 31 May 2017 16:48:59 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0b5fc40e-4621-11e7-9b58-a9b66ba57784 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_restore_dbinstance_from_point_in_time__db_subnet_group_name (tests.unit.rds.test_connection.TestRDSConnectionRestoreDBInstanceFromPointInTime) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_connection.py", line 428, in test_restore_dbinstance_from_point_in_time__db_subnet_group_name db_subnet_group_name='dbsubnetgroup') File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 1338, in restore_dbinstance_from_point_in_time params, DBInstance) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0b9357f8-4621-11e7-b754-b7c5e5d03df3 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'UseLatestRestorableTime': 'true', 'Version': '2013-05-15', 'Action': 'RestoreDBInstanceToPointInTime', 'DBSubnetGroupName': 'dbsubnetgroup', 'SourceDBInstanceIdentifier': 'simcoprod01', 'TargetDBInstanceIdentifier': 'restored-db'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=RestoreDBInstanceToPointInTime&DBSubnetGroupName=dbsubnetgroup&SourceDBInstanceIdentifier=simcoprod01&TargetDBInstanceIdentifier=restored-db&UseLatestRestorableTime=true&Version=2013-05-15 host:rds.amazonaws.com x-amz-date:20170531T164859Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164859Z 20170531/us-east-1/rds/aws4_request 74b82f8c888d3f4b4680dc8e9807d88894d5db7a9c1bf8a2fb2c18a204a6c158 boto: DEBUG: Signature: 1c76dba69100f63f4b9be19876f5481e33a30a29eb74aeb1ac8ed46cc1e84d11 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=1c76dba69100f63f4b9be19876f5481e33a30a29eb74aeb1ac8ed46cc1e84d11', 'X-Amz-Date': '20170531T164859Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0b9357f8-4621-11e7-b754-b7c5e5d03df3'), ('date', 'Wed, 31 May 2017 16:48:59 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0b9357f8-4621-11e7-b754-b7c5e5d03df3 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_logs_filtered (tests.unit.rds.test_connection.TestRDSLogFile) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_connection.py", line 621, in test_get_all_logs_filtered response = self.service_connection.get_all_logs('db_instance_1', max_records=100, marker='error/mysql-error.log', file_size=2000000, filename_contains='error', file_last_written=12345678) File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 1122, in get_all_logs [('DescribeDBLogFilesDetails',LogFile)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0bc9a99f-4621-11e7-80b9-e9c03ca19056 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeDBLogFiles', 'FilenameContains': 'error', 'MaxRecords': 100, 'Version': '2013-05-15', 'FileLastWritten': 12345678, 'FileSize': 2000000, 'Marker': 'error/mysql-error.log', 'DBInstanceIdentifier': 'db_instance_1'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeDBLogFiles&DBInstanceIdentifier=db_instance_1&FileLastWritten=12345678&FileSize=2000000&FilenameContains=error&Marker=error%2Fmysql-error.log&MaxRecords=100&Version=2013-05-15 host:rds.amazonaws.com x-amz-date:20170531T164900Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164900Z 20170531/us-east-1/rds/aws4_request 8b507686929161217d3a072cebe6c1535934fabafa711ade5cc97e303ee067fc boto: DEBUG: Signature: 66f5bb9001f402484a49d3a81f92637271116164ec0751c3ac36494e444572f5 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=66f5bb9001f402484a49d3a81f92637271116164ec0751c3ac36494e444572f5', 'X-Amz-Date': '20170531T164900Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0bc9a99f-4621-11e7-80b9-e9c03ca19056'), ('date', 'Wed, 31 May 2017 16:49:00 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0bc9a99f-4621-11e7-80b9-e9c03ca19056 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_logs_simple (tests.unit.rds.test_connection.TestRDSLogFile) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_connection.py", line 606, in test_get_all_logs_simple response = self.service_connection.get_all_logs('db1') File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 1122, in get_all_logs [('DescribeDBLogFilesDetails',LogFile)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0c002295-4621-11e7-b754-b7c5e5d03df3 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeDBLogFiles', 'Version': '2013-05-15', 'DBInstanceIdentifier': 'db1'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeDBLogFiles&DBInstanceIdentifier=db1&Version=2013-05-15 host:rds.amazonaws.com x-amz-date:20170531T164900Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164900Z 20170531/us-east-1/rds/aws4_request 6ab4f6438236e39ee7fe9105a395739d82e824192ca0a46d1c0c93d5101fd38c boto: DEBUG: Signature: 50ed65646f6e6c830fb9fbbe517e191e437631826a0369f79b65cbfb6f3850d2 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=50ed65646f6e6c830fb9fbbe517e191e437631826a0369f79b65cbfb6f3850d2', 'X-Amz-Date': '20170531T164900Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0c002295-4621-11e7-b754-b7c5e5d03df3'), ('date', 'Wed, 31 May 2017 16:48:59 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0c002295-4621-11e7-b754-b7c5e5d03df3 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_multi_args (tests.unit.rds.test_connection.TestRDSLogFileDownload) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_connection.py", line 724, in test_multi_args response = self.service_connection.get_log_file('db1', 'foo.log', marker='0:4485', number_of_lines=10) File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 1156, in get_log_file logfile = self.get_object('DownloadDBLogFilePortion', params, LogFileObject) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0c364df6-4621-11e7-b0f4-ef48af7a53e8 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'NumberOfLines': 10, 'LogFileName': 'foo.log', 'Action': 'DownloadDBLogFilePortion', 'Version': '2013-05-15', 'Marker': '0:4485', 'DBInstanceIdentifier': 'db1'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DownloadDBLogFilePortion&DBInstanceIdentifier=db1&LogFileName=foo.log&Marker=0%3A4485&NumberOfLines=10&Version=2013-05-15 host:rds.amazonaws.com x-amz-date:20170531T164901Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164901Z 20170531/us-east-1/rds/aws4_request b17c7606e2a18237ad93d07989cac6e83d11f0b82045ac5ab81838352e1a112f boto: DEBUG: Signature: 4e0737406bc1a1c7646e9049135f2824e3130d0939eefaa76c3827c69dbf96a1 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=4e0737406bc1a1c7646e9049135f2824e3130d0939eefaa76c3827c69dbf96a1', 'X-Amz-Date': '20170531T164901Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0c364df6-4621-11e7-b0f4-ef48af7a53e8'), ('date', 'Wed, 31 May 2017 16:49:00 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0c364df6-4621-11e7-b0f4-ef48af7a53e8 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_single_download (tests.unit.rds.test_connection.TestRDSLogFileDownload) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_connection.py", line 707, in test_single_download response = self.service_connection.get_log_file('db1', 'foo.log') File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 1156, in get_log_file logfile = self.get_object('DownloadDBLogFilePortion', params, LogFileObject) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0c6e26b9-4621-11e7-82f0-43362c8c98e8 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DownloadDBLogFilePortion', 'Version': '2013-05-15', 'DBInstanceIdentifier': 'db1', 'LogFileName': 'foo.log'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DownloadDBLogFilePortion&DBInstanceIdentifier=db1&LogFileName=foo.log&Version=2013-05-15 host:rds.amazonaws.com x-amz-date:20170531T164901Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164901Z 20170531/us-east-1/rds/aws4_request 5ddf9fc61d8bc237c134d5f675b78614ae8bdbcd46d40412180bfa36068cff81 boto: DEBUG: Signature: cc1c1859e3de411ae6a43d80e61c8611df6a782fecbba0fe59a0a7aaf43dde7e boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=cc1c1859e3de411ae6a43d80e61c8611df6a782fecbba0fe59a0a7aaf43dde7e', 'X-Amz-Date': '20170531T164901Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0c6e26b9-4621-11e7-82f0-43362c8c98e8'), ('date', 'Wed, 31 May 2017 16:49:00 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0c6e26b9-4621-11e7-82f0-43362c8c98e8 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe_option_group_options (tests.unit.rds.test_connection.TestRDSOptionGroupOptions) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_connection.py", line 770, in test_describe_option_group_options response = self.service_connection.describe_option_group_options() File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 1622, in describe_option_group_options ('OptionGroupOptions', OptionGroupOption) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0ca5d946-4621-11e7-8fa7-cb3bace64a59 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeOptionGroupOptions', 'MaxRecords': 100, 'Version': '2013-05-15'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeOptionGroupOptions&MaxRecords=100&Version=2013-05-15 host:rds.amazonaws.com x-amz-date:20170531T164901Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164901Z 20170531/us-east-1/rds/aws4_request c1c95447295849d67835ba51eed30dec3999485443cba32c864abf2b5b5d4470 boto: DEBUG: Signature: acc3217a696fd3156c25c35aa8df7295a255a9896d481588d3c348fa4affe9b2 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=acc3217a696fd3156c25c35aa8df7295a255a9896d481588d3c348fa4affe9b2', 'X-Amz-Date': '20170531T164901Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0ca5d946-4621-11e7-8fa7-cb3bace64a59'), ('date', 'Wed, 31 May 2017 16:49:01 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0ca5d946-4621-11e7-8fa7-cb3bace64a59 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe_option_groups (tests.unit.rds.test_connection.TestRDSOptionGroups) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_connection.py", line 542, in test_describe_option_groups response = self.service_connection.describe_option_groups() File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 1582, in describe_option_groups ('OptionGroup', OptionGroup) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0cdc03c2-4621-11e7-a9bc-75b6b8abf5fa -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeOptionGroups', 'MaxRecords': 100, 'Version': '2013-05-15'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeOptionGroups&MaxRecords=100&Version=2013-05-15 host:rds.amazonaws.com x-amz-date:20170531T164902Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164902Z 20170531/us-east-1/rds/aws4_request 5a43408986d172c87759c4e60086bc4c8c9f19995faa8db6d9f428cb38cb3573 boto: DEBUG: Signature: 59414e0c86ba4655e74c07469ee1aba06a4aeb58e9c4b7ba5e322fcc6cae2cd4 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=59414e0c86ba4655e74c07469ee1aba06a4aeb58e9c4b7ba5e322fcc6cae2cd4', 'X-Amz-Date': '20170531T164902Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0cdc03c2-4621-11e7-a9bc-75b6b8abf5fa'), ('date', 'Wed, 31 May 2017 16:49:02 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0cdc03c2-4621-11e7-a9bc-75b6b8abf5fa --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_copy_dbinstance (tests.unit.rds.test_snapshot.TestCopyDBSnapshot) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_snapshot.py", line 174, in test_copy_dbinstance response = self.service_connection.copy_dbsnapshot('myautomaticdbsnapshot', 'mycopieddbsnapshot') File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 1197, in copy_dbsnapshot return self.get_object('CopyDBSnapshot', params, DBSnapshot) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0d131a27-4621-11e7-8fa7-cb3bace64a59 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CopyDBSnapshot', 'SourceDBSnapshotIdentifier': 'myautomaticdbsnapshot', 'Version': '2013-05-15', 'TargetDBSnapshotIdentifier': 'mycopieddbsnapshot'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CopyDBSnapshot&SourceDBSnapshotIdentifier=myautomaticdbsnapshot&TargetDBSnapshotIdentifier=mycopieddbsnapshot&Version=2013-05-15 host:rds.amazonaws.com x-amz-date:20170531T164902Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164902Z 20170531/us-east-1/rds/aws4_request 8a19505b85911001cc026799d3fe5f2d8b978a558c07e8164f21458986dd4ec7 boto: DEBUG: Signature: e6d57b419bcdbab3e3d50bd868de1f9edb28a7f63acd3086a4f63e4eb7118ccc boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=e6d57b419bcdbab3e3d50bd868de1f9edb28a7f63acd3086a4f63e4eb7118ccc', 'X-Amz-Date': '20170531T164902Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0d131a27-4621-11e7-8fa7-cb3bace64a59'), ('date', 'Wed, 31 May 2017 16:49:01 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0d131a27-4621-11e7-8fa7-cb3bace64a59 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_dbinstance (tests.unit.rds.test_snapshot.TestCreateDBSnapshot) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_snapshot.py", line 132, in test_create_dbinstance response = self.service_connection.create_dbsnapshot('mydbsnapshot', 'simcoprod01') File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 1180, in create_dbsnapshot return self.get_object('CreateDBSnapshot', params, DBSnapshot) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0d4992b2-4621-11e7-a9bc-75b6b8abf5fa -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateDBSnapshot', 'DBSnapshotIdentifier': 'mydbsnapshot', 'Version': '2013-05-15', 'DBInstanceIdentifier': 'simcoprod01'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateDBSnapshot&DBInstanceIdentifier=simcoprod01&DBSnapshotIdentifier=mydbsnapshot&Version=2013-05-15 host:rds.amazonaws.com x-amz-date:20170531T164902Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164902Z 20170531/us-east-1/rds/aws4_request 184dbebfad5cf8b6ed3716407639f99e175ef11b409d321c1f3f317a3cd6b29e boto: DEBUG: Signature: 048e20a27975a28db1b4be85f39a2a259df4383353b26006741076fac565c896 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=048e20a27975a28db1b4be85f39a2a259df4383353b26006741076fac565c896', 'X-Amz-Date': '20170531T164902Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0d4992b2-4621-11e7-a9bc-75b6b8abf5fa'), ('date', 'Wed, 31 May 2017 16:49:02 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0d4992b2-4621-11e7-a9bc-75b6b8abf5fa --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_dbinstance (tests.unit.rds.test_snapshot.TestDeleteDBSnapshot) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_snapshot.py", line 216, in test_delete_dbinstance response = self.service_connection.delete_dbsnapshot('mysnapshot2') File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 1207, in delete_dbsnapshot return self.get_object('DeleteDBSnapshot', params, DBSnapshot) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0d81e0bb-4621-11e7-b879-ffdbdf2d4082 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DeleteDBSnapshot', 'DBSnapshotIdentifier': 'mysnapshot2', 'Version': '2013-05-15'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DeleteDBSnapshot&DBSnapshotIdentifier=mysnapshot2&Version=2013-05-15 host:rds.amazonaws.com x-amz-date:20170531T164903Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164903Z 20170531/us-east-1/rds/aws4_request f1178defc6da5f54d0fdb4370fdc2aa1e0264537a3a86497901e3c7cdf36684c boto: DEBUG: Signature: 948af45c199aada254924f8ba130dac6334c818fcd3d429c0d8e1d0078500e84 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=948af45c199aada254924f8ba130dac6334c818fcd3d429c0d8e1d0078500e84', 'X-Amz-Date': '20170531T164903Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0d81e0bb-4621-11e7-b879-ffdbdf2d4082'), ('date', 'Wed, 31 May 2017 16:49:03 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0d81e0bb-4621-11e7-b879-ffdbdf2d4082 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe_dbinstances_by_instance (tests.unit.rds.test_snapshot.TestDescribeDBSnapshots) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_snapshot.py", line 81, in test_describe_dbinstances_by_instance response = self.service_connection.get_all_dbsnapshots(instance_id='simcoprod01') File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 1077, in get_all_dbsnapshots [('DBSnapshot', DBSnapshot)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0dbb1938-4621-11e7-a9bc-75b6b8abf5fa -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeDBSnapshots', 'Version': '2013-05-15', 'DBInstanceIdentifier': 'simcoprod01'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeDBSnapshots&DBInstanceIdentifier=simcoprod01&Version=2013-05-15 host:rds.amazonaws.com x-amz-date:20170531T164903Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164903Z 20170531/us-east-1/rds/aws4_request 9161cbacddea988f4720a1cb12676e9d4d4f01fd76a4413713d7cf7912da343b boto: DEBUG: Signature: dd9ccd9940764cfb0184bb7077893c17bc71ca9245d8558be1e3b1474ae18e72 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=dd9ccd9940764cfb0184bb7077893c17bc71ca9245d8558be1e3b1474ae18e72', 'X-Amz-Date': '20170531T164903Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0dbb1938-4621-11e7-a9bc-75b6b8abf5fa'), ('date', 'Wed, 31 May 2017 16:49:03 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0dbb1938-4621-11e7-a9bc-75b6b8abf5fa --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_restore_dbinstance_from_dbsnapshot (tests.unit.rds.test_snapshot.TestRestoreDBInstanceFromDBSnapshot) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds/test_snapshot.py", line 277, in test_restore_dbinstance_from_dbsnapshot 'true') File "/usr/lib/python2.7/dist-packages/boto/rds/__init__.py", line 1273, in restore_dbinstance_from_dbsnapshot params, DBInstance) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 0df3b60e-4621-11e7-96ba-99c2e160c8cc -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://rds.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'MultiAZ': 'false', 'AvailabilityZone': 'us-east-1a', 'Version': '2013-05-15', 'DBSnapshotIdentifier': 'mydbsnapshot', 'Action': 'RestoreDBInstanceFromDBSnapshot', 'DBInstanceClass': 'db.m1.large', 'Port': '3306', 'DBInstanceIdentifier': 'myrestoreddbinstance', 'AutoMinorVersionUpgrade': 'true'} boto: DEBUG: establishing HTTPS connection: host=rds.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=RestoreDBInstanceFromDBSnapshot&AutoMinorVersionUpgrade=true&AvailabilityZone=us-east-1a&DBInstanceClass=db.m1.large&DBInstanceIdentifier=myrestoreddbinstance&DBSnapshotIdentifier=mydbsnapshot&MultiAZ=false&Port=3306&Version=2013-05-15 host:rds.amazonaws.com x-amz-date:20170531T164903Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164903Z 20170531/us-east-1/rds/aws4_request 39e43978a8c62d5771bf6596a11c420044ea881a1016704edb175250abac3e30 boto: DEBUG: Signature: dbbea2d0d65615145f6f8de287abc9dde327f1def4d194c9f94b67dce24d9aca boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'rds.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=dbbea2d0d65615145f6f8de287abc9dde327f1def4d194c9f94b67dce24d9aca', 'X-Amz-Date': '20170531T164903Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0df3b60e-4621-11e7-96ba-99c2e160c8cc'), ('date', 'Wed, 31 May 2017 16:49:03 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 0df3b60e-4621-11e7-96ba-99c2e160c8cc --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe_db_instances (tests.unit.rds2.test_connection.TestRDS2Connection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/rds2/test_connection.py", line 133, in test_describe_db_instances response = self.service_connection.describe_db_instances('instance_id') File "/usr/lib/python2.7/dist-packages/boto/rds2/layer1.py", line 1522, in describe_db_instances path='/', params=params) File "/usr/lib/python2.7/dist-packages/boto/rds2/layer1.py", line 3783, in _make_request body=json_body) JSONResponseError: JSONResponseError: 403 Forbidden {u'RequestId': u'0e2dd851-4621-11e7-a9bc-75b6b8abf5fa', u'Error': {u'Message': u'The security token included in the request is invalid.', u'Code': u'InvalidClientTokenId', u'Type': u'Sender'}} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://rds.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: rds.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeDBInstances', 'Version': '2013-09-09', 'ContentType': 'JSON', 'DBInstanceIdentifier': 'instance_id'} boto: DEBUG: establishing HTTPS connection: host=rds.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT rds.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=rds.us-east-1.amazonaws.com, certificate hosts=['rds.us-east-1.amazonaws.com', 'us-east-1.rds.amazonaws.com', 'rds.amazonaws.com', 'rds-fips.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:rds.us-east-1.amazonaws.com x-amz-date:20170531T164904Z host;x-amz-date 346bd4cbb510722509d0ef788b3218402406a8614019bbb76e76178ac312399b boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164904Z 20170531/us-east-1/rds/aws4_request c03d76210af6e579691343a1d499fb434aa7101e8b4b768e54f4f36499003c0e boto: DEBUG: Signature: 126b7d6ddbe44bca59c6a166c30d5200acaf551ba24349affbde2de059514f97 boto: DEBUG: Final headers: {'Content-Length': '95', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'rds.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164904Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/rds/aws4_request,SignedHeaders=host;x-amz-date,Signature=126b7d6ddbe44bca59c6a166c30d5200acaf551ba24349affbde2de059514f97'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0e2dd851-4621-11e7-a9bc-75b6b8abf5fa'), ('date', 'Wed, 31 May 2017 16:49:04 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"0e2dd851-4621-11e7-a9bc-75b6b8abf5fa"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_health_check_fqdn (tests.unit.route53.test_connection.TestCreateHealthCheckRoute53FQDN) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/route53/test_connection.py", line 679, in test_create_health_check_fqdn response = self.service_connection.create_health_check(hc) File "/usr/lib/python2.7/dist-packages/boto/route53/connection.py", line 310, in create_health_check raise exception.DNSServerError(response.status, response.reason, body) DNSServerError: DNSServerError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalid0e6f9c50-4621-11e7-9792-dd88844efc6a -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://route53.amazonaws.com/2013-04-01/healthcheck boto: DEBUG: Data: 86614f0f-aca7-4527-80c9-09009653f4fd 443 HTTPS /health_check example.com 30 3 boto: DEBUG: Headers: {'Content-Type': 'text/xml'} boto: DEBUG: Host: route53.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=route53.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT route53.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=route53.amazonaws.com, certificate hosts=['route53.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Content-Length': '574', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'route53.amazonaws.com', 'Date': 'Wed, 31 May 2017 16:49:04 GMT', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=vwT+Yrq6szhgF7i+boU+BDpSrJYst/PkZImywYQC6VE=', 'Content-Type': 'text/xml'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0e6f9c50-4621-11e7-9792-dd88844efc6a'), ('date', 'Wed, 31 May 2017 16:49:03 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Saw HTTP status: 403 boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid0e6f9c50-4621-11e7-9792-dd88844efc6a --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_health_check_ip_address (tests.unit.route53.test_connection.TestCreateHealthCheckRoute53IpAddress) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/route53/test_connection.py", line 606, in test_create_health_check_ip_address response = self.service_connection.create_health_check(hc) File "/usr/lib/python2.7/dist-packages/boto/route53/connection.py", line 310, in create_health_check raise exception.DNSServerError(response.status, response.reason, body) DNSServerError: DNSServerError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalid0ea6b1ad-4621-11e7-989f-9de6c9658e4c -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://route53.amazonaws.com/2013-04-01/healthcheck boto: DEBUG: Data: ce797885-686c-4f07-bde5-cdcdbd034211 74.125.228.81 443 HTTPS_STR_MATCH /health_check OK 30 3 boto: DEBUG: Headers: {'Content-Type': 'text/xml'} boto: DEBUG: Host: route53.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=route53.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT route53.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=route53.amazonaws.com, certificate hosts=['route53.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Content-Length': '587', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'route53.amazonaws.com', 'Date': 'Wed, 31 May 2017 16:49:05 GMT', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=g/CWmf0WT9W03dhZSDaQBGI4wQOGkJW4FUEB5uKe1rI=', 'Content-Type': 'text/xml'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0ea6b1ad-4621-11e7-989f-9de6c9658e4c'), ('date', 'Wed, 31 May 2017 16:49:04 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Saw HTTP status: 403 boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid0ea6b1ad-4621-11e7-989f-9de6c9658e4c --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_private_zone (tests.unit.route53.test_connection.TestCreatePrivateZoneRoute53) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/route53/test_connection.py", line 222, in test_create_private_zone vpc_region='us-east-1' File "/usr/lib/python2.7/dist-packages/boto/route53/connection.py", line 248, in create_hosted_zone body) DNSServerError: DNSServerError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalid0edd52ae-4621-11e7-8a7e-43b1d26074ac -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://route53.amazonaws.com/2013-04-01/hostedzone boto: DEBUG: Data: example.com. vpc-1a2b3c4d us-east-1 0f716f64-fb1d-4c42-ab1d-29f5fc48e4bf boto: DEBUG: Headers: {'Content-Type': 'text/xml'} boto: DEBUG: Host: route53.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=route53.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT route53.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=route53.amazonaws.com, certificate hosts=['route53.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Content-Length': '400', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'route53.amazonaws.com', 'Date': 'Wed, 31 May 2017 16:49:05 GMT', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=g/CWmf0WT9W03dhZSDaQBGI4wQOGkJW4FUEB5uKe1rI=', 'Content-Type': 'text/xml'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0edd52ae-4621-11e7-8a7e-43b1d26074ac'), ('date', 'Wed, 31 May 2017 16:49:04 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Saw HTTP status: 403 boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid0edd52ae-4621-11e7-8a7e-43b1d26074ac --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_hosted_zone (tests.unit.route53.test_connection.TestCreateZoneRoute53) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/route53/test_connection.py", line 163, in test_create_hosted_zone "a comment") File "/usr/lib/python2.7/dist-packages/boto/route53/connection.py", line 248, in create_hosted_zone body) DNSServerError: DNSServerError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalid0f155230-4621-11e7-b697-adc2a29dab58 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://route53.amazonaws.com/2013-04-01/hostedzone boto: DEBUG: Data: example.com. my_ref a comment boto: DEBUG: Headers: {'Content-Type': 'text/xml'} boto: DEBUG: Host: route53.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=route53.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT route53.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=route53.amazonaws.com, certificate hosts=['route53.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Content-Length': '293', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'route53.amazonaws.com', 'Date': 'Wed, 31 May 2017 16:49:05 GMT', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=g/CWmf0WT9W03dhZSDaQBGI4wQOGkJW4FUEB5uKe1rI=', 'Content-Type': 'text/xml'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0f155230-4621-11e7-b697-adc2a29dab58'), ('date', 'Wed, 31 May 2017 16:49:05 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Saw HTTP status: 403 boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid0f155230-4621-11e7-b697-adc2a29dab58 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_zone (tests.unit.route53.test_connection.TestCreateZoneRoute53) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/route53/test_connection.py", line 153, in test_create_zone response = self.service_connection.create_zone("example.com.") File "/usr/lib/python2.7/dist-packages/boto/route53/connection.py", line 534, in create_zone vpc_id=vpc_id, vpc_region=vpc_region) File "/usr/lib/python2.7/dist-packages/boto/route53/connection.py", line 248, in create_hosted_zone body) DNSServerError: DNSServerError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalid0f4e15db-4621-11e7-b2c0-51ac44591c21 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://route53.amazonaws.com/2013-04-01/hostedzone boto: DEBUG: Data: example.com. b14289ff-ef66-4d36-9686-be272edbc231 boto: DEBUG: Headers: {'Content-Type': 'text/xml'} boto: DEBUG: Host: route53.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=route53.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT route53.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=route53.amazonaws.com, certificate hosts=['route53.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Content-Length': '314', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'route53.amazonaws.com', 'Date': 'Wed, 31 May 2017 16:49:06 GMT', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=s1steOftETAdGVr2QeQLCncO0hU2I9TDitbmByk9Ha4=', 'Content-Type': 'text/xml'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0f4e15db-4621-11e7-b2c0-51ac44591c21'), ('date', 'Wed, 31 May 2017 16:49:06 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Saw HTTP status: 403 boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid0f4e15db-4621-11e7-b2c0-51ac44591c21 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_rr_sets (tests.unit.route53.test_connection.TestGetAllRRSetsRoute53) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/route53/test_connection.py", line 424, in test_get_all_rr_sets "example.com.") File "/usr/lib/python2.7/dist-packages/boto/route53/connection.py", line 445, in get_all_rrsets body) DNSServerError: DNSServerError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalid0f850480-4621-11e7-b697-adc2a29dab58 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://route53.amazonaws.com/2013-04-01/hostedzone/Z1111/rrset?type=A&name=example.com. boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: route53.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=route53.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT route53.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=route53.amazonaws.com, certificate hosts=['route53.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:06 GMT', 'Content-Length': '0', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=s1steOftETAdGVr2QeQLCncO0hU2I9TDitbmByk9Ha4=', 'Host': 'route53.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0f850480-4621-11e7-b697-adc2a29dab58'), ('date', 'Wed, 31 May 2017 16:49:06 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Saw HTTP status: 403 boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid0f850480-4621-11e7-b697-adc2a29dab58 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_checker_ip_ranges (tests.unit.route53.test_connection.TestGetCheckerIpRanges) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/route53/test_connection.py", line 636, in test_get_checker_ip_ranges response = self.service_connection.get_checker_ip_ranges() File "/usr/lib/python2.7/dist-packages/boto/route53/connection.py", line 355, in get_checker_ip_ranges body) DNSServerError: DNSServerError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalid0fbbcb41-4621-11e7-91f8-c596b13eb6ae -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://route53.amazonaws.com/2013-04-01/checkeripranges boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: route53.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=route53.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT route53.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=route53.amazonaws.com, certificate hosts=['route53.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:06 GMT', 'Content-Length': '0', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=s1steOftETAdGVr2QeQLCncO0hU2I9TDitbmByk9Ha4=', 'Host': 'route53.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0fbbcb41-4621-11e7-91f8-c596b13eb6ae'), ('date', 'Wed, 31 May 2017 16:49:06 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Saw HTTP status: 403 boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid0fbbcb41-4621-11e7-91f8-c596b13eb6ae --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_list_zones (tests.unit.route53.test_connection.TestGetHostedZoneRoute53) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/route53/test_connection.py", line 321, in test_list_zones response = self.service_connection.get_hosted_zone("Z1111") File "/usr/lib/python2.7/dist-packages/boto/route53/connection.py", line 154, in get_hosted_zone body) DNSServerError: DNSServerError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalid0ff5042d-4621-11e7-b2c0-51ac44591c21 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://route53.amazonaws.com/2013-04-01/hostedzone/Z1111 boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: route53.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=route53.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT route53.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=route53.amazonaws.com, certificate hosts=['route53.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:07 GMT', 'Content-Length': '0', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=aCfpDFROP3p1NpRmfXpj/yQ8DMNRbMeD0Q9xHY+H6Ao=', 'Host': 'route53.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '0ff5042d-4621-11e7-b2c0-51ac44591c21'), ('date', 'Wed, 31 May 2017 16:49:07 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Saw HTTP status: 403 boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid0ff5042d-4621-11e7-b2c0-51ac44591c21 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_zone (tests.unit.route53.test_connection.TestGetZoneRoute53) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/route53/test_connection.py", line 285, in test_get_zone response = self.service_connection.get_zone('example.com.') File "/usr/lib/python2.7/dist-packages/boto/route53/connection.py", line 546, in get_zone for zone in self.get_zones(): File "/usr/lib/python2.7/dist-packages/boto/route53/connection.py", line 559, in get_zones zones = self.get_all_hosted_zones() File "/usr/lib/python2.7/dist-packages/boto/route53/connection.py", line 126, in get_all_hosted_zones body) DNSServerError: DNSServerError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalid102bf2bd-4621-11e7-8a7e-43b1d26074ac -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://route53.amazonaws.com/2013-04-01/hostedzone boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: route53.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=route53.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT route53.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=route53.amazonaws.com, certificate hosts=['route53.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:07 GMT', 'Content-Length': '0', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=aCfpDFROP3p1NpRmfXpj/yQ8DMNRbMeD0Q9xHY+H6Ao=', 'Host': 'route53.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '102bf2bd-4621-11e7-8a7e-43b1d26074ac'), ('date', 'Wed, 31 May 2017 16:49:06 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Saw HTTP status: 403 boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid102bf2bd-4621-11e7-8a7e-43b1d26074ac --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_list_zones (tests.unit.route53.test_connection.TestGetZoneRoute53) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/route53/test_connection.py", line 273, in test_list_zones response = self.service_connection.get_all_hosted_zones() File "/usr/lib/python2.7/dist-packages/boto/route53/connection.py", line 126, in get_all_hosted_zones body) DNSServerError: DNSServerError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalid1063cae0-4621-11e7-91bd-7d990adde257 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://route53.amazonaws.com/2013-04-01/hostedzone boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: route53.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=route53.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT route53.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=route53.amazonaws.com, certificate hosts=['route53.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:08 GMT', 'Content-Length': '0', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=ZhUaXxG4hV98Um660FRXG2U0gfJb9+TaQr2cHNeEBd4=', 'Host': 'route53.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '1063cae0-4621-11e7-91bd-7d990adde257'), ('date', 'Wed, 31 May 2017 16:49:07 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Saw HTTP status: 403 boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid1063cae0-4621-11e7-91bd-7d990adde257 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_rr_sets (tests.unit.route53.test_connection.TestTruncatedGetAllRRSetsRoute53) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/route53/test_connection.py", line 556, in test_get_all_rr_sets response = self.service_connection.get_all_rrsets("Z1111", maxitems=3) File "/usr/lib/python2.7/dist-packages/boto/route53/connection.py", line 445, in get_all_rrsets body) DNSServerError: DNSServerError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalid117b2f2b-4621-11e7-b907-c9fbe828c97c -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://route53.amazonaws.com/2013-04-01/hostedzone/Z1111/rrset?maxitems=3 boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: route53.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=route53.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT route53.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=route53.amazonaws.com, certificate hosts=['route53.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:09 GMT', 'Content-Length': '0', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=wZqXGt/w15v98vRchlgyzyw+MfpH61JmNfAAUqP+pKY=', 'Host': 'route53.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '117b2f2b-4621-11e7-b907-c9fbe828c97c'), ('date', 'Wed, 31 May 2017 16:49:09 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Saw HTTP status: 403 boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid117b2f2b-4621-11e7-b907-c9fbe828c97c --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_bucket_acl_policy_namespace (tests.unit.s3.test_bucket.TestS3Bucket) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_bucket.py", line 231, in test_bucket_acl_policy_namespace bucket = self.service_connection.get_bucket('mybucket') File "/usr/lib/python2.7/dist-packages/boto/s3/connection.py", line 506, in get_bucket return self.head_bucket(bucket_name, headers=headers) File "/usr/lib/python2.7/dist-packages/boto/s3/connection.py", line 539, in head_bucket raise err S3ResponseError: S3ResponseError: 403 Forbidden -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: Method: HEAD boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: HEAD Wed, 31 May 2017 16:49:10 GMT /mybucket/ boto: DEBUG: Signature: AWS aws_access_key_id:vvVuUisz4vxy3zsrou9mbu1GHwM= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:10 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:vvVuUisz4vxy3zsrou9mbu1GHwM=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('date', 'Wed, 31 May 2017 16:49:10 GMT'), ('x-amz-id-2', 'LyXhJrzjiBtXgkq/e5vURjG3433xHDK0ibfVK9BdffthxxZ6IsfpkRkqMeBWVfQ/fhfg6lisGtc='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '679B980F9B409C31'), ('x-amz-bucket-region', 'us-east-1'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_bucket_basics (tests.unit.s3.test_bucket.TestS3Bucket) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_bucket.py", line 43, in test_bucket_basics bucket = self.service_connection.create_bucket('mybucket') File "/usr/lib/python2.7/dist-packages/boto/s3/connection.py", line 625, in create_bucket response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idC6E51DC5C951E069ohO+qtE0QLRSRbqa1a9x5wgiuPvHmjdzMGf8zD8IlgRIr6ZO0xRqk+OuToHonhDw8kNFUMpQ+eM= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: Method: PUT boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: PUT Wed, 31 May 2017 16:49:10 GMT /mybucket/ boto: DEBUG: Signature: AWS aws_access_key_id:2WDY+cEmZRwL+dkhAGGxY3LdUjw= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:10 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:2WDY+cEmZRwL+dkhAGGxY3LdUjw=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'ohO+qtE0QLRSRbqa1a9x5wgiuPvHmjdzMGf8zD8IlgRIr6ZO0xRqk+OuToHonhDw8kNFUMpQ+eM='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'C6E51DC5C951E069'), ('date', 'Wed, 31 May 2017 16:49:10 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_bucket_copy_key_no_validate (tests.unit.s3.test_bucket.TestS3Bucket) ---------------------------------------------------------------------- Traceback (most recent call last): File "/usr/lib/python2.7/dist-packages/mock/mock.py", line 1305, in patched return func(*args, **keywargs) File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_bucket.py", line 130, in test_bucket_copy_key_no_validate bucket = self.service_connection.create_bucket('mybucket') File "/usr/lib/python2.7/dist-packages/boto/s3/connection.py", line 625, in create_bucket response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id3A2290BF22AE1243zK/1j5djyF0e7YbrvlbZm0u9vJCas3BViGKQ1iinKtlwkQRAPcam82+i7y8OKFP6b51uPaoX0NI= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: Method: PUT boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: PUT Wed, 31 May 2017 16:49:10 GMT /mybucket/ boto: DEBUG: Signature: AWS aws_access_key_id:2WDY+cEmZRwL+dkhAGGxY3LdUjw= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:10 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:2WDY+cEmZRwL+dkhAGGxY3LdUjw=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'zK/1j5djyF0e7YbrvlbZm0u9vJCas3BViGKQ1iinKtlwkQRAPcam82+i7y8OKFP6b51uPaoX0NI='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '3A2290BF22AE1243'), ('date', 'Wed, 31 May 2017 16:49:10 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_bucket_create_bucket (tests.unit.s3.test_bucket.TestS3Bucket) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_bucket.py", line 25, in test_bucket_create_bucket bucket = self.service_connection.create_bucket('mybucket_create') File "/usr/lib/python2.7/dist-packages/boto/s3/connection.py", line 625, in create_bucket response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id4F8C4154347B853CTQByo4t8fUgAk8+SoUymcSwZRoQ8OAfelG6DTY3DsilqrQptanVBWuIeafhR/Ty4pGdn/ko5A3I= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket_create/ boto: DEBUG: Method: PUT boto: DEBUG: Path: https://mybucket_create.s3.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket_create.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket_create.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket_create.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: PUT Wed, 31 May 2017 16:49:11 GMT /mybucket_create/ boto: DEBUG: Signature: AWS aws_access_key_id:XizXg6Fpac/sRcLwIaNTjdLVCyU= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:11 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:XizXg6Fpac/sRcLwIaNTjdLVCyU=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'TQByo4t8fUgAk8+SoUymcSwZRoQ8OAfelG6DTY3DsilqrQptanVBWuIeafhR/Ty4pGdn/ko5A3I='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '4F8C4154347B853C'), ('date', 'Wed, 31 May 2017 16:49:10 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_bucket_create_eu_central_1_location (tests.unit.s3.test_bucket.TestS3Bucket) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_bucket.py", line 32, in test_bucket_create_eu_central_1_location location=Location.EUCentral1 File "/usr/lib/python2.7/dist-packages/boto/s3/connection.py", line 625, in create_bucket response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id88398A4C9F13D7A4muyIRPvOm5bU8zqeQzmf2+mp+Oq8ciV0AgMMObN3HsDOPAOBe6OJqm5EqqyTybx7JW/7k5aSso4= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/eu_central_1_bucket/ boto: DEBUG: Method: PUT boto: DEBUG: Path: https://eu_central_1_bucket.s3.amazonaws.com/ boto: DEBUG: Data: eu-central-1 boto: DEBUG: Headers: {} boto: DEBUG: Host: eu_central_1_bucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=eu_central_1_bucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT eu_central_1_bucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: PUT Wed, 31 May 2017 16:49:11 GMT /eu_central_1_bucket/ boto: DEBUG: Signature: AWS aws_access_key_id:PjOMImDaff1HjjHMDBO6PCwc7J4= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:11 GMT', 'Content-Length': '108', 'Authorization': u'AWS aws_access_key_id:PjOMImDaff1HjjHMDBO6PCwc7J4=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'muyIRPvOm5bU8zqeQzmf2+mp+Oq8ciV0AgMMObN3HsDOPAOBe6OJqm5EqqyTybx7JW/7k5aSso4='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('connection', 'close'), ('x-amz-request-id', '88398A4C9F13D7A4'), ('date', 'Wed, 31 May 2017 16:49:10 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_bucket_delete_key_missing_name (tests.unit.s3.test_bucket.TestS3Bucket) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_bucket.py", line 63, in test_bucket_delete_key_missing_name bucket = self.service_connection.create_bucket('mybucket') File "/usr/lib/python2.7/dist-packages/boto/s3/connection.py", line 625, in create_bucket response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idEEF518E76CF55216Q8Id0M6mqhf8JL8BEdSkFipRSg7cFd2gR+dIbvsAelMZaClYWXPXG0dmQKzk+QGPb7ykvZN12Jk= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: Method: PUT boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: PUT Wed, 31 May 2017 16:49:11 GMT /mybucket/ boto: DEBUG: Signature: AWS aws_access_key_id:K2paloV1cBpabe5zUvEZdZO1JIQ= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:11 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:K2paloV1cBpabe5zUvEZdZO1JIQ=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'Q8Id0M6mqhf8JL8BEdSkFipRSg7cFd2gR+dIbvsAelMZaClYWXPXG0dmQKzk+QGPb7ykvZN12Jk='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'EEF518E76CF55216'), ('date', 'Wed, 31 May 2017 16:49:11 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_bucket_encoding (tests.unit.s3.test_bucket.TestS3Bucket) ---------------------------------------------------------------------- Traceback (most recent call last): File "/usr/lib/python2.7/dist-packages/mock/mock.py", line 1305, in patched return func(*args, **keywargs) File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_bucket.py", line 148, in test_bucket_encoding bucket = self.service_connection.get_bucket('mybucket') File "/usr/lib/python2.7/dist-packages/boto/s3/connection.py", line 506, in get_bucket return self.head_bucket(bucket_name, headers=headers) File "/usr/lib/python2.7/dist-packages/boto/s3/connection.py", line 539, in head_bucket raise err S3ResponseError: S3ResponseError: 403 Forbidden -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: Method: HEAD boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: HEAD Wed, 31 May 2017 16:49:12 GMT /mybucket/ boto: DEBUG: Signature: AWS aws_access_key_id:/swl1WKe858ra/pH87KyQ4D6x4U= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:12 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:/swl1WKe858ra/pH87KyQ4D6x4U=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('date', 'Wed, 31 May 2017 16:49:11 GMT'), ('x-amz-id-2', 'rtELXdhCA07ZtPoT4vlsJiDRKnuIwUoFmbjdGnGjThXsX2vUQAu8p8ksXolJu/uY/0CA6TXLKv4='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '0B66F318082B9758'), ('x-amz-bucket-region', 'us-east-1'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_bucket_get_key_no_validate (tests.unit.s3.test_bucket.TestS3Bucket) ---------------------------------------------------------------------- Traceback (most recent call last): File "/usr/lib/python2.7/dist-packages/mock/mock.py", line 1305, in patched return func(*args, **keywargs) File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_bucket.py", line 196, in test_bucket_get_key_no_validate bucket = self.service_connection.get_bucket('mybucket') File "/usr/lib/python2.7/dist-packages/boto/s3/connection.py", line 506, in get_bucket return self.head_bucket(bucket_name, headers=headers) File "/usr/lib/python2.7/dist-packages/boto/s3/connection.py", line 539, in head_bucket raise err S3ResponseError: S3ResponseError: 403 Forbidden -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: Method: HEAD boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: HEAD Wed, 31 May 2017 16:49:12 GMT /mybucket/ boto: DEBUG: Signature: AWS aws_access_key_id:/swl1WKe858ra/pH87KyQ4D6x4U= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:12 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:/swl1WKe858ra/pH87KyQ4D6x4U=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('date', 'Wed, 31 May 2017 16:49:12 GMT'), ('x-amz-id-2', '0g1pJcdn2GqrfxBhYZ+Stm7qQZNaMa4Ay0NTvkJAWDt3klvIWQY3xa14S/Ex75fz7obEL1mcAy0='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '984125D913C0D696'), ('x-amz-bucket-region', 'us-east-1'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_bucket_kwargs_misspelling (tests.unit.s3.test_bucket.TestS3Bucket) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_bucket.py", line 70, in test_bucket_kwargs_misspelling bucket = self.service_connection.create_bucket('mybucket') File "/usr/lib/python2.7/dist-packages/boto/s3/connection.py", line 625, in create_bucket response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idE12EA4B39DA89DC1vmXO54PhBgpnpfUTx+Zx927WtVFMOtv9Ddpvoj8Xt6TIA+Ht3iDaJTJDh8AWNGSecEfL96ry39A= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: Method: PUT boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: PUT Wed, 31 May 2017 16:49:13 GMT /mybucket/ boto: DEBUG: Signature: AWS aws_access_key_id:tlMtprieMgXJd6SCSkVS7UZNIt8= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:13 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:tlMtprieMgXJd6SCSkVS7UZNIt8=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'vmXO54PhBgpnpfUTx+Zx927WtVFMOtv9Ddpvoj8Xt6TIA+Ht3iDaJTJDh8AWNGSecEfL96ry39A='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'E12EA4B39DA89DC1'), ('date', 'Wed, 31 May 2017 16:49:13 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_bucket_new_key (tests.unit.s3.test_bucket.TestS3Bucket) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_bucket.py", line 48, in test_bucket_new_key bucket = self.service_connection.create_bucket('mybucket') File "/usr/lib/python2.7/dist-packages/boto/s3/connection.py", line 625, in create_bucket response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id4491AA99FBBBAD3EJ8ny25JZbVMRILgvGWtHd8/zHMhPKVAI9DJvb+M75b77YbpYsS/3ltVT7cUf58XG9yhA8LXq3SM= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: Method: PUT boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: PUT Wed, 31 May 2017 16:49:13 GMT /mybucket/ boto: DEBUG: Signature: AWS aws_access_key_id:tlMtprieMgXJd6SCSkVS7UZNIt8= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:13 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:tlMtprieMgXJd6SCSkVS7UZNIt8=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'J8ny25JZbVMRILgvGWtHd8/zHMhPKVAI9DJvb+M75b77YbpYsS/3ltVT7cUf58XG9yhA8LXq3SM='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '4491AA99FBBBAD3E'), ('date', 'Wed, 31 May 2017 16:49:13 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_bucket_new_key_missing_name (tests.unit.s3.test_bucket.TestS3Bucket) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_bucket.py", line 56, in test_bucket_new_key_missing_name bucket = self.service_connection.create_bucket('mybucket') File "/usr/lib/python2.7/dist-packages/boto/s3/connection.py", line 625, in create_bucket response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id5DC88B34830053CACnrrkiEdzPPiH0gXlPhG30eS2yj1fDczlgEBHHteXmw7HmR4Ffjnk4jQpie0946n+rJepAly7Vc= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: Method: PUT boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: PUT Wed, 31 May 2017 16:49:13 GMT /mybucket/ boto: DEBUG: Signature: AWS aws_access_key_id:tlMtprieMgXJd6SCSkVS7UZNIt8= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:13 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:tlMtprieMgXJd6SCSkVS7UZNIt8=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'CnrrkiEdzPPiH0gXlPhG30eS2yj1fDczlgEBHHteXmw7HmR4Ffjnk4jQpie0946n+rJepAly7Vc='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '5DC88B34830053CA'), ('date', 'Wed, 31 May 2017 16:49:13 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_head_bucket_success (tests.unit.s3.test_connection.TestHeadBucket) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_connection.py", line 298, in test_head_bucket_success buck = self.service_connection.head_bucket('my-test-bucket') File "/usr/lib/python2.7/dist-packages/boto/s3/connection.py", line 539, in head_bucket raise err S3ResponseError: S3ResponseError: 403 Forbidden -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/my-test-bucket/ boto: DEBUG: Method: HEAD boto: DEBUG: Path: https://my-test-bucket.s3.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: my-test-bucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=my-test-bucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT my-test-bucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: HEAD Wed, 31 May 2017 16:49:15 GMT /my-test-bucket/ boto: DEBUG: Signature: AWS aws_access_key_id:+OMfYcLRKYlYqU5rSediwOkYsWA= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:15 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:+OMfYcLRKYlYqU5rSediwOkYsWA=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('date', 'Wed, 31 May 2017 16:49:14 GMT'), ('x-amz-id-2', 'jgSK0Z+y0obg/FrbOsfyj05rlAjq7dvzl9l7bV1bhECzAZuTJrYKXcVyhFxIn9eIXxdKBv/xChM='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'D7A2E49E1050B9E8'), ('x-amz-bucket-region', 'us-east-1'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_unicode_calling_format (tests.unit.s3.test_connection.TestUnicodeCallingFormat) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_connection.py", line 286, in test_unicode_calling_format self.service_connection.get_all_buckets() File "/usr/lib/python2.7/dist-packages/boto/s3/connection.py", line 444, in get_all_buckets response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idFA99B42C95895541EgzM5sWwztErTlOc4R1XBB05Oi7lhySXhaCyI3zW/930dUmspMWoVf3SmsoNDT4aly9+p1Est48= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/ boto: DEBUG: Method: GET boto: DEBUG: Path: https://s3.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:15 GMT / boto: DEBUG: Signature: AWS aws_access_key_id:rhauViy7PsJDhmVbcIznn3KZhFk= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:15 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:rhauViy7PsJDhmVbcIznn3KZhFk=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'EgzM5sWwztErTlOc4R1XBB05Oi7lhySXhaCyI3zW/930dUmspMWoVf3SmsoNDT4aly9+p1Est48='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'FA99B42C95895541'), ('date', 'Wed, 31 May 2017 16:49:15 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_change_storage_class (tests.unit.s3.test_key.TestS3Key) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_key.py", line 109, in test_change_storage_class k = b.get_key('fookey') File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 193, in get_key key, resp = self._get_key_internal(key_name, headers, query_args_l) File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 231, in _get_key_internal response.status, response.reason, '') S3ResponseError: S3ResponseError: 403 Forbidden -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/fookey boto: DEBUG: auth_path=/mybucket/fookey boto: DEBUG: Method: HEAD boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/fookey boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: HEAD Wed, 31 May 2017 16:49:15 GMT /mybucket/fookey boto: DEBUG: Signature: AWS aws_access_key_id:wuuKpvMsSYGxpRVJMfbj4QccKIU= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:15 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:wuuKpvMsSYGxpRVJMfbj4QccKIU=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'PnBxX2TIsM+kHv3zQCYUILpr2l7M7sngvsP2GIZu31r0GBrDW4jPKM3x6OM2DdU/Ag5bYN7os2I='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'C30D490DA5C785EB'), ('date', 'Wed, 31 May 2017 16:49:15 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_change_storage_class_new_bucket (tests.unit.s3.test_key.TestS3Key) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_key.py", line 133, in test_change_storage_class_new_bucket k = b.get_key('fookey') File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 193, in get_key key, resp = self._get_key_internal(key_name, headers, query_args_l) File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 231, in _get_key_internal response.status, response.reason, '') S3ResponseError: S3ResponseError: 403 Forbidden -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/fookey boto: DEBUG: auth_path=/mybucket/fookey boto: DEBUG: Method: HEAD boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/fookey boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: HEAD Wed, 31 May 2017 16:49:16 GMT /mybucket/fookey boto: DEBUG: Signature: AWS aws_access_key_id:/baoaSBEmfV37wWDMpYcSMtGKBU= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:16 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:/baoaSBEmfV37wWDMpYcSMtGKBU=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'FYHMvnxRbvvz4NeQhj/MgOkeP9x+3JmRUWjBkPmXVtFi5McXqlWeSK3SlrwwZv3Dw66FdnnVfVI='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'BCA5F7EA00BB8ADA'), ('date', 'Wed, 31 May 2017 16:49:15 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_key_return_key (tests.unit.s3.test_key.TestS3Key) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_key.py", line 78, in test_delete_key_return_key key = b.delete_key('fookey') File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 761, in delete_key query_args_l=None) File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 780, in _delete_key_internal response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id34A202015B58C3E8J9XsqToelu1bUaACEKtbfnFgerxbGNQktIUvT7TDlPcQq+LS/gTl9kI6e3TfztBZeLXe72D6Jd8= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/fookey boto: DEBUG: auth_path=/mybucket/fookey boto: DEBUG: Method: DELETE boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/fookey boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: DELETE Wed, 31 May 2017 16:49:16 GMT /mybucket/fookey boto: DEBUG: Signature: AWS aws_access_key_id:GdPg3Uz1BRBYOUK/7eFS9t9BxrA= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:16 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:GdPg3Uz1BRBYOUK/7eFS9t9BxrA=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'J9XsqToelu1bUaACEKtbfnFgerxbGNQktIUvT7TDlPcQq+LS/gTl9kI6e3TfztBZeLXe72D6Jd8='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '34A202015B58C3E8'), ('date', 'Wed, 31 May 2017 16:49:16 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_restore_completed (tests.unit.s3.test_key.TestS3Key) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_key.py", line 71, in test_restore_completed k = b.get_key('myglacierkey') File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 193, in get_key key, resp = self._get_key_internal(key_name, headers, query_args_l) File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 231, in _get_key_internal response.status, response.reason, '') S3ResponseError: S3ResponseError: 403 Forbidden -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/myglacierkey boto: DEBUG: auth_path=/mybucket/myglacierkey boto: DEBUG: Method: HEAD boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/myglacierkey boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: HEAD Wed, 31 May 2017 16:49:16 GMT /mybucket/myglacierkey boto: DEBUG: Signature: AWS aws_access_key_id:vgsFqEezvYLUqWy2bRVMKuoYzgY= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:16 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:vgsFqEezvYLUqWy2bRVMKuoYzgY=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', '6IXgJpEQTAlDkxaHz0Rs7i8Qm5YYYuwRUT9NaxjTsnTcw/iHD7zvRjcPC8onn3o6ijyMBRGjpZw='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '24C8477A3CDCE11B'), ('date', 'Wed, 31 May 2017 16:49:16 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_restore_header_with_ongoing_restore (tests.unit.s3.test_key.TestS3Key) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_key.py", line 60, in test_restore_header_with_ongoing_restore k = b.get_key('myglacierkey') File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 193, in get_key key, resp = self._get_key_internal(key_name, headers, query_args_l) File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 231, in _get_key_internal response.status, response.reason, '') S3ResponseError: S3ResponseError: 403 Forbidden -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/myglacierkey boto: DEBUG: auth_path=/mybucket/myglacierkey boto: DEBUG: Method: HEAD boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/myglacierkey boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: HEAD Wed, 31 May 2017 16:49:17 GMT /mybucket/myglacierkey boto: DEBUG: Signature: AWS aws_access_key_id:B0HO9uTrzKdlr1nURexGBDCXUYw= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:17 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:B0HO9uTrzKdlr1nURexGBDCXUYw=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'gNViJ7oaf/SXWbOMjVTpAUivlwouKwyEqU25BQ/THFRq2pxDDI0RU6tptOFV9VFGyFRkTj9i1xU='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'C341F065B1368898'), ('date', 'Wed, 31 May 2017 16:49:17 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_storage_class (tests.unit.s3.test_key.TestS3Key) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_key.py", line 84, in test_storage_class k = b.get_key('fookey') File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 193, in get_key key, resp = self._get_key_internal(key_name, headers, query_args_l) File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 231, in _get_key_internal response.status, response.reason, '') S3ResponseError: S3ResponseError: 403 Forbidden -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/fookey boto: DEBUG: auth_path=/mybucket/fookey boto: DEBUG: Method: HEAD boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/fookey boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: HEAD Wed, 31 May 2017 16:49:17 GMT /mybucket/fookey boto: DEBUG: Signature: AWS aws_access_key_id:avbGHOeKiys9n8LfZe/UNvgsI3Y= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:17 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:avbGHOeKiys9n8LfZe/UNvgsI3Y=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'CRSq1ViPXyK0aD/wtC/jO1JEx8zaQ0gVGVeHVuxk5iZgkc3crZnWh9UnbyOv0sdYn3bQGJ5ndrI='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'A3C16283D2B64D99'), ('date', 'Wed, 31 May 2017 16:49:17 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_when_no_restore_header_present (tests.unit.s3.test_key.TestS3Key) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_key.py", line 51, in test_when_no_restore_header_present k = b.get_key('myglacierkey') File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 193, in get_key key, resp = self._get_key_internal(key_name, headers, query_args_l) File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 231, in _get_key_internal response.status, response.reason, '') S3ResponseError: S3ResponseError: 403 Forbidden -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/myglacierkey boto: DEBUG: auth_path=/mybucket/myglacierkey boto: DEBUG: Method: HEAD boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/myglacierkey boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: HEAD Wed, 31 May 2017 16:49:18 GMT /mybucket/myglacierkey boto: DEBUG: Signature: AWS aws_access_key_id:Ivhdv29Fbq5AUWknjXvS7smeC3I= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:18 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:Ivhdv29Fbq5AUWknjXvS7smeC3I=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', '7kpwB/Pj7q3AcFhJ0pwgnJZjVIxcC4iCrzGDOnX0mf3heS6yJvfalZZ6s+3KCVy0Mu5WLD+j8uo='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '10F3E7C444667429'), ('date', 'Wed, 31 May 2017 16:49:17 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_lifecycle_response_contains_all_rules (tests.unit.s3.test_lifecycle.TestS3LifeCycle) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 81, in test_lifecycle_response_contains_all_rules self.assertEqual(len(self._get_bucket_lifecycle_config()), 3) File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 78, in _get_bucket_lifecycle_config return bucket.get_lifecycle_config() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1388, in get_lifecycle_config response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id9696D8CC8828FE87HsBUcJlwCrLLYfnRwhF4vrk/TGmK/E7rMfEuKFV6GCTXKnjpeGyVbpuvYT7z9rRjMg0yHJ8SS60= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?lifecycle boto: DEBUG: auth_path=/mybucket/?lifecycle boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?lifecycle boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:19 GMT /mybucket/?lifecycle boto: DEBUG: Signature: AWS aws_access_key_id:FqrDTbyt2oVR5Eye/CkKgqvBZ0s= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:19 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:FqrDTbyt2oVR5Eye/CkKgqvBZ0s=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'HsBUcJlwCrLLYfnRwhF4vrk/TGmK/E7rMfEuKFV6GCTXKnjpeGyVbpuvYT7z9rRjMg0yHJ8SS60='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '9696D8CC8828FE87'), ('date', 'Wed, 31 May 2017 16:49:19 GMT'), ('content-type', 'application/xml')] boto: DEBUG: InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id9696D8CC8828FE87HsBUcJlwCrLLYfnRwhF4vrk/TGmK/E7rMfEuKFV6GCTXKnjpeGyVbpuvYT7z9rRjMg0yHJ8SS60= --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_parse_expiration_date (tests.unit.s3.test_lifecycle.TestS3LifeCycle) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 108, in test_parse_expiration_date rule = self._get_bucket_lifecycle_config()[1] File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 78, in _get_bucket_lifecycle_config return bucket.get_lifecycle_config() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1388, in get_lifecycle_config response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id3D309019204741D3cBDc4+eDbNJKQGNtTl5Ot2tkV1a/I6RmF/dnWw9V6g9zYaLZIskfaCmrGLUruC91M6BUfhuy5GY= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?lifecycle boto: DEBUG: auth_path=/mybucket/?lifecycle boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?lifecycle boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:20 GMT /mybucket/?lifecycle boto: DEBUG: Signature: AWS aws_access_key_id:zXT1SqJWnEJx8HIfhb6l7a9ULZM= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:20 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:zXT1SqJWnEJx8HIfhb6l7a9ULZM=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'cBDc4+eDbNJKQGNtTl5Ot2tkV1a/I6RmF/dnWw9V6g9zYaLZIskfaCmrGLUruC91M6BUfhuy5GY='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '3D309019204741D3'), ('date', 'Wed, 31 May 2017 16:49:19 GMT'), ('content-type', 'application/xml')] boto: DEBUG: InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id3D309019204741D3cBDc4+eDbNJKQGNtTl5Ot2tkV1a/I6RmF/dnWw9V6g9zYaLZIskfaCmrGLUruC91M6BUfhuy5GY= --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_parse_expiration_days (tests.unit.s3.test_lifecycle.TestS3LifeCycle) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 104, in test_parse_expiration_days rule = self._get_bucket_lifecycle_config()[0] File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 78, in _get_bucket_lifecycle_config return bucket.get_lifecycle_config() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1388, in get_lifecycle_config response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id09A6B80117E68324s2H4Svq5vgoZjnVlp6H45E9+QkTZ/BLHNo6/MFCU0NZIL2Gu/XGtlWmLbHj4iVxTS8Xi0ngSBgQ= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?lifecycle boto: DEBUG: auth_path=/mybucket/?lifecycle boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?lifecycle boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:20 GMT /mybucket/?lifecycle boto: DEBUG: Signature: AWS aws_access_key_id:zXT1SqJWnEJx8HIfhb6l7a9ULZM= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:20 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:zXT1SqJWnEJx8HIfhb6l7a9ULZM=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 's2H4Svq5vgoZjnVlp6H45E9+QkTZ/BLHNo6/MFCU0NZIL2Gu/XGtlWmLbHj4iVxTS8Xi0ngSBgQ='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '09A6B80117E68324'), ('date', 'Wed, 31 May 2017 16:49:20 GMT'), ('content-type', 'application/xml')] boto: DEBUG: InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id09A6B80117E68324s2H4Svq5vgoZjnVlp6H45E9+QkTZ/BLHNo6/MFCU0NZIL2Gu/XGtlWmLbHj4iVxTS8Xi0ngSBgQ= --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_parse_expiration_not_required (tests.unit.s3.test_lifecycle.TestS3LifeCycle) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 112, in test_parse_expiration_not_required rule = self._get_bucket_lifecycle_config()[2] File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 78, in _get_bucket_lifecycle_config return bucket.get_lifecycle_config() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1388, in get_lifecycle_config response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idDBF2A156C1F57EE6HuOzfatsHiFQPLbUoUqoFdcePunQ2cc0vK8VHXQ+MnFInFBlVQ5ExYxvpXwspJZjj5KGd69Czg0= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?lifecycle boto: DEBUG: auth_path=/mybucket/?lifecycle boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?lifecycle boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:20 GMT /mybucket/?lifecycle boto: DEBUG: Signature: AWS aws_access_key_id:zXT1SqJWnEJx8HIfhb6l7a9ULZM= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:20 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:zXT1SqJWnEJx8HIfhb6l7a9ULZM=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'HuOzfatsHiFQPLbUoUqoFdcePunQ2cc0vK8VHXQ+MnFInFBlVQ5ExYxvpXwspJZjj5KGd69Czg0='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'DBF2A156C1F57EE6'), ('date', 'Wed, 31 May 2017 16:49:20 GMT'), ('content-type', 'application/xml')] boto: DEBUG: InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idDBF2A156C1F57EE6HuOzfatsHiFQPLbUoUqoFdcePunQ2cc0vK8VHXQ+MnFInFBlVQ5ExYxvpXwspJZjj5KGd69Czg0= --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_parse_lifecycle_disabled (tests.unit.s3.test_lifecycle.TestS3LifeCycle) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 100, in test_parse_lifecycle_disabled rule = self._get_bucket_lifecycle_config()[1] File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 78, in _get_bucket_lifecycle_config return bucket.get_lifecycle_config() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1388, in get_lifecycle_config response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idDFA7E4A77E949116IjkHPdPYKsM0+iuUaPIQtzDpbqwSiDEM3U6LOWp5KQSjHx6CSIJLKkaq5/3TO5WfhGCNa/W6SRw= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?lifecycle boto: DEBUG: auth_path=/mybucket/?lifecycle boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?lifecycle boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:21 GMT /mybucket/?lifecycle boto: DEBUG: Signature: AWS aws_access_key_id:9/6Kxs9+IJrAMWIJxiu8QRnH5bw= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:21 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:9/6Kxs9+IJrAMWIJxiu8QRnH5bw=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'IjkHPdPYKsM0+iuUaPIQtzDpbqwSiDEM3U6LOWp5KQSjHx6CSIJLKkaq5/3TO5WfhGCNa/W6SRw='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'DFA7E4A77E949116'), ('date', 'Wed, 31 May 2017 16:49:21 GMT'), ('content-type', 'application/xml')] boto: DEBUG: InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idDFA7E4A77E949116IjkHPdPYKsM0+iuUaPIQtzDpbqwSiDEM3U6LOWp5KQSjHx6CSIJLKkaq5/3TO5WfhGCNa/W6SRw= --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_parse_lifecycle_enabled (tests.unit.s3.test_lifecycle.TestS3LifeCycle) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 96, in test_parse_lifecycle_enabled rule = self._get_bucket_lifecycle_config()[0] File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 78, in _get_bucket_lifecycle_config return bucket.get_lifecycle_config() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1388, in get_lifecycle_config response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id490955FCE8C89C77q8XuOE1Wr4aa55L3HIFUxtrCKAgZr+CxuHpjj84WL7t2TZVbX/itYX+fIb0VCWtXL7Nc88IhnD8= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?lifecycle boto: DEBUG: auth_path=/mybucket/?lifecycle boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?lifecycle boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:21 GMT /mybucket/?lifecycle boto: DEBUG: Signature: AWS aws_access_key_id:9/6Kxs9+IJrAMWIJxiu8QRnH5bw= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:21 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:9/6Kxs9+IJrAMWIJxiu8QRnH5bw=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'q8XuOE1Wr4aa55L3HIFUxtrCKAgZr+CxuHpjj84WL7t2TZVbX/itYX+fIb0VCWtXL7Nc88IhnD8='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '490955FCE8C89C77'), ('date', 'Wed, 31 May 2017 16:49:20 GMT'), ('content-type', 'application/xml')] boto: DEBUG: InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id490955FCE8C89C77q8XuOE1Wr4aa55L3HIFUxtrCKAgZr+CxuHpjj84WL7t2TZVbX/itYX+fIb0VCWtXL7Nc88IhnD8= --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_parse_lifecycle_id (tests.unit.s3.test_lifecycle.TestS3LifeCycle) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 84, in test_parse_lifecycle_id rule = self._get_bucket_lifecycle_config()[0] File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 78, in _get_bucket_lifecycle_config return bucket.get_lifecycle_config() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1388, in get_lifecycle_config response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idAF5335868F8CAFF8peRCzuTnBxcKw6O3DXuBnR/KRfVK0gG1tSZCY4nE7TFnD/stkFOUnnXgroCtLOJZ6hMBPdoWm64= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?lifecycle boto: DEBUG: auth_path=/mybucket/?lifecycle boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?lifecycle boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:21 GMT /mybucket/?lifecycle boto: DEBUG: Signature: AWS aws_access_key_id:9/6Kxs9+IJrAMWIJxiu8QRnH5bw= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:21 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:9/6Kxs9+IJrAMWIJxiu8QRnH5bw=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'peRCzuTnBxcKw6O3DXuBnR/KRfVK0gG1tSZCY4nE7TFnD/stkFOUnnXgroCtLOJZ6hMBPdoWm64='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'AF5335868F8CAFF8'), ('date', 'Wed, 31 May 2017 16:49:21 GMT'), ('content-type', 'application/xml')] boto: DEBUG: InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idAF5335868F8CAFF8peRCzuTnBxcKw6O3DXuBnR/KRfVK0gG1tSZCY4nE7TFnD/stkFOUnnXgroCtLOJZ6hMBPdoWm64= --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_parse_lifecycle_no_prefix (tests.unit.s3.test_lifecycle.TestS3LifeCycle) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 92, in test_parse_lifecycle_no_prefix rule = self._get_bucket_lifecycle_config()[2] File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 78, in _get_bucket_lifecycle_config return bucket.get_lifecycle_config() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1388, in get_lifecycle_config response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idD62F6EF0F5AD1DD0QBz5GOTKHLArR2yyAkZyO60ZKoyTvulwUR2mtadAkl9DEUKkzDqFx9umlhIuZydC86ra/Hdn910= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?lifecycle boto: DEBUG: auth_path=/mybucket/?lifecycle boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?lifecycle boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:22 GMT /mybucket/?lifecycle boto: DEBUG: Signature: AWS aws_access_key_id:cZ0CCioF94evQ0uOCBXYSD5TrtM= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:22 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:cZ0CCioF94evQ0uOCBXYSD5TrtM=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'QBz5GOTKHLArR2yyAkZyO60ZKoyTvulwUR2mtadAkl9DEUKkzDqFx9umlhIuZydC86ra/Hdn910='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'D62F6EF0F5AD1DD0'), ('date', 'Wed, 31 May 2017 16:49:21 GMT'), ('content-type', 'application/xml')] boto: DEBUG: InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idD62F6EF0F5AD1DD0QBz5GOTKHLArR2yyAkZyO60ZKoyTvulwUR2mtadAkl9DEUKkzDqFx9umlhIuZydC86ra/Hdn910= --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_parse_lifecycle_prefix (tests.unit.s3.test_lifecycle.TestS3LifeCycle) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 88, in test_parse_lifecycle_prefix rule = self._get_bucket_lifecycle_config()[0] File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 78, in _get_bucket_lifecycle_config return bucket.get_lifecycle_config() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1388, in get_lifecycle_config response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idCBC80C6870F94CA5Znj27u01fsYQhKURzeMJoeq9Ymx69u2RPHXxsCJg+96UEgTQPqKgFaQ4ZW5ijWXpOii7VxoIwbw= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?lifecycle boto: DEBUG: auth_path=/mybucket/?lifecycle boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?lifecycle boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:22 GMT /mybucket/?lifecycle boto: DEBUG: Signature: AWS aws_access_key_id:cZ0CCioF94evQ0uOCBXYSD5TrtM= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:22 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:cZ0CCioF94evQ0uOCBXYSD5TrtM=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'Znj27u01fsYQhKURzeMJoeq9Ymx69u2RPHXxsCJg+96UEgTQPqKgFaQ4ZW5ijWXpOii7VxoIwbw='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'CBC80C6870F94CA5'), ('date', 'Wed, 31 May 2017 16:49:21 GMT'), ('content-type', 'application/xml')] boto: DEBUG: InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idCBC80C6870F94CA5Znj27u01fsYQhKURzeMJoeq9Ymx69u2RPHXxsCJg+96UEgTQPqKgFaQ4ZW5ijWXpOii7VxoIwbw= --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_parse_multiple_lifecycle_rules (tests.unit.s3.test_lifecycle.TestS3LifeCycle) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 148, in test_parse_multiple_lifecycle_rules transition = self._get_bucket_lifecycle_config()[2].transition File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 78, in _get_bucket_lifecycle_config return bucket.get_lifecycle_config() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1388, in get_lifecycle_config response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idDB920C1275B00E98okw3mhLYMOtvXgrxVO7Sk+2X99aelX9xwVxp6m/iOuVLujc7+CW4tBgwcy0cojwHsOe1zO+DKH8= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?lifecycle boto: DEBUG: auth_path=/mybucket/?lifecycle boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?lifecycle boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:22 GMT /mybucket/?lifecycle boto: DEBUG: Signature: AWS aws_access_key_id:cZ0CCioF94evQ0uOCBXYSD5TrtM= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:22 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:cZ0CCioF94evQ0uOCBXYSD5TrtM=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'okw3mhLYMOtvXgrxVO7Sk+2X99aelX9xwVxp6m/iOuVLujc7+CW4tBgwcy0cojwHsOe1zO+DKH8='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'DB920C1275B00E98'), ('date', 'Wed, 31 May 2017 16:49:22 GMT'), ('content-type', 'application/xml')] boto: DEBUG: InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idDB920C1275B00E98okw3mhLYMOtvXgrxVO7Sk+2X99aelX9xwVxp6m/iOuVLujc7+CW4tBgwcy0cojwHsOe1zO+DKH8= --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_parse_storage_class_deprecated (tests.unit.s3.test_lifecycle.TestS3LifeCycle) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 144, in test_parse_storage_class_deprecated transition = self._get_bucket_lifecycle_config()[1].transition File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 78, in _get_bucket_lifecycle_config return bucket.get_lifecycle_config() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1388, in get_lifecycle_config response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idC2A0755939F71D42Hig/w2IV17+FyiXoLOxxXlyqdG4Q0DJaEGX3BUVzhrGvm4NllveSGLMit1ncS+GeWfgkeqTXPJE= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?lifecycle boto: DEBUG: auth_path=/mybucket/?lifecycle boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?lifecycle boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:23 GMT /mybucket/?lifecycle boto: DEBUG: Signature: AWS aws_access_key_id:bt8wRL/K5zOYhlowUQ6RIsmS44A= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:23 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:bt8wRL/K5zOYhlowUQ6RIsmS44A=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'Hig/w2IV17+FyiXoLOxxXlyqdG4Q0DJaEGX3BUVzhrGvm4NllveSGLMit1ncS+GeWfgkeqTXPJE='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'C2A0755939F71D42'), ('date', 'Wed, 31 May 2017 16:49:22 GMT'), ('content-type', 'application/xml')] boto: DEBUG: InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idC2A0755939F71D42Hig/w2IV17+FyiXoLOxxXlyqdG4Q0DJaEGX3BUVzhrGvm4NllveSGLMit1ncS+GeWfgkeqTXPJE= --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_parse_storage_class_glacier (tests.unit.s3.test_lifecycle.TestS3LifeCycle) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 140, in test_parse_storage_class_glacier transition = self._get_bucket_lifecycle_config()[0].transition[0] File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 78, in _get_bucket_lifecycle_config return bucket.get_lifecycle_config() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1388, in get_lifecycle_config response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id29F8A9859FDA3FE1C8QMYeCCPFr++HWHDxDJXMeHd0KBE5ggWN0AGQsskpuinD6/0lIB5R7028/FzMfSG/hKAOW46oo= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?lifecycle boto: DEBUG: auth_path=/mybucket/?lifecycle boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?lifecycle boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:23 GMT /mybucket/?lifecycle boto: DEBUG: Signature: AWS aws_access_key_id:bt8wRL/K5zOYhlowUQ6RIsmS44A= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:23 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:bt8wRL/K5zOYhlowUQ6RIsmS44A=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'C8QMYeCCPFr++HWHDxDJXMeHd0KBE5ggWN0AGQsskpuinD6/0lIB5R7028/FzMfSG/hKAOW46oo='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '29F8A9859FDA3FE1'), ('date', 'Wed, 31 May 2017 16:49:22 GMT'), ('content-type', 'application/xml')] boto: DEBUG: InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id29F8A9859FDA3FE1C8QMYeCCPFr++HWHDxDJXMeHd0KBE5ggWN0AGQsskpuinD6/0lIB5R7028/FzMfSG/hKAOW46oo= --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_parse_storage_class_standard_ia (tests.unit.s3.test_lifecycle.TestS3LifeCycle) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 136, in test_parse_storage_class_standard_ia transition = self._get_bucket_lifecycle_config()[1].transition[0] File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 78, in _get_bucket_lifecycle_config return bucket.get_lifecycle_config() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1388, in get_lifecycle_config response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id954DF9DE19D67ECFvOyO0LaPpTpNjOUdbjJdoWVLiQmqvM3aGxop2YmH/kZGH2SYcj6Aw3zF8xGJp0Ch07waCZYxlc0= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?lifecycle boto: DEBUG: auth_path=/mybucket/?lifecycle boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?lifecycle boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:24 GMT /mybucket/?lifecycle boto: DEBUG: Signature: AWS aws_access_key_id:O5HQmFck8frMosS2kxIcxoEHEIM= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:24 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:O5HQmFck8frMosS2kxIcxoEHEIM=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'vOyO0LaPpTpNjOUdbjJdoWVLiQmqvM3aGxop2YmH/kZGH2SYcj6Aw3zF8xGJp0Ch07waCZYxlc0='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '954DF9DE19D67ECF'), ('date', 'Wed, 31 May 2017 16:49:23 GMT'), ('content-type', 'application/xml')] boto: DEBUG: InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id954DF9DE19D67ECFvOyO0LaPpTpNjOUdbjJdoWVLiQmqvM3aGxop2YmH/kZGH2SYcj6Aw3zF8xGJp0Ch07waCZYxlc0= --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_parse_transition_date (tests.unit.s3.test_lifecycle.TestS3LifeCycle) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 126, in test_parse_transition_date transition = self._get_bucket_lifecycle_config()[1].transition[0] File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 78, in _get_bucket_lifecycle_config return bucket.get_lifecycle_config() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1388, in get_lifecycle_config response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id5B54B5BD6F84F3F9aDB28iC3+1w72i/vEFOD9GohmHY4Y16jQgEQn3vt9Ao5g8W+EBZJGs8u4kTocgfkluOua0rwiGY= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?lifecycle boto: DEBUG: auth_path=/mybucket/?lifecycle boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?lifecycle boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:24 GMT /mybucket/?lifecycle boto: DEBUG: Signature: AWS aws_access_key_id:O5HQmFck8frMosS2kxIcxoEHEIM= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:24 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:O5HQmFck8frMosS2kxIcxoEHEIM=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'aDB28iC3+1w72i/vEFOD9GohmHY4Y16jQgEQn3vt9Ao5g8W+EBZJGs8u4kTocgfkluOua0rwiGY='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '5B54B5BD6F84F3F9'), ('date', 'Wed, 31 May 2017 16:49:23 GMT'), ('content-type', 'application/xml')] boto: DEBUG: InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id5B54B5BD6F84F3F9aDB28iC3+1w72i/vEFOD9GohmHY4Y16jQgEQn3vt9Ao5g8W+EBZJGs8u4kTocgfkluOua0rwiGY= --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_parse_transition_date_deprecated (tests.unit.s3.test_lifecycle.TestS3LifeCycle) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 131, in test_parse_transition_date_deprecated transition = self._get_bucket_lifecycle_config()[1].transition File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 78, in _get_bucket_lifecycle_config return bucket.get_lifecycle_config() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1388, in get_lifecycle_config response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id9F021B72C17B242E+MDMZ+Pc2Cor/W+wwrAqk+Q4kCmvDBkggWPT5mkZcLE9heb5wG2LdO0DKJSXbqEV7W8NKcjJiI4= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?lifecycle boto: DEBUG: auth_path=/mybucket/?lifecycle boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?lifecycle boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:24 GMT /mybucket/?lifecycle boto: DEBUG: Signature: AWS aws_access_key_id:O5HQmFck8frMosS2kxIcxoEHEIM= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:24 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:O5HQmFck8frMosS2kxIcxoEHEIM=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', '+MDMZ+Pc2Cor/W+wwrAqk+Q4kCmvDBkggWPT5mkZcLE9heb5wG2LdO0DKJSXbqEV7W8NKcjJiI4='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '9F021B72C17B242E'), ('date', 'Wed, 31 May 2017 16:49:24 GMT'), ('content-type', 'application/xml')] boto: DEBUG: InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id9F021B72C17B242E+MDMZ+Pc2Cor/W+wwrAqk+Q4kCmvDBkggWPT5mkZcLE9heb5wG2LdO0DKJSXbqEV7W8NKcjJiI4= --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_parse_transition_days (tests.unit.s3.test_lifecycle.TestS3LifeCycle) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 116, in test_parse_transition_days transition = self._get_bucket_lifecycle_config()[0].transition[0] File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 78, in _get_bucket_lifecycle_config return bucket.get_lifecycle_config() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1388, in get_lifecycle_config response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idA0FC12B99E5F8DC3bf0O/DzjmZ+lh9CVAVvY1W5h9/WtldpTKJ//t+kOiN1cqr1LacwCZ7V8wLUaCWYsr6Nw2Ln2Ds4= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?lifecycle boto: DEBUG: auth_path=/mybucket/?lifecycle boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?lifecycle boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:25 GMT /mybucket/?lifecycle boto: DEBUG: Signature: AWS aws_access_key_id:sr4zVR7es5opPA8KeA4JzJX+36c= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:25 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:sr4zVR7es5opPA8KeA4JzJX+36c=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'bf0O/DzjmZ+lh9CVAVvY1W5h9/WtldpTKJ//t+kOiN1cqr1LacwCZ7V8wLUaCWYsr6Nw2Ln2Ds4='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'A0FC12B99E5F8DC3'), ('date', 'Wed, 31 May 2017 16:49:24 GMT'), ('content-type', 'application/xml')] boto: DEBUG: InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idA0FC12B99E5F8DC3bf0O/DzjmZ+lh9CVAVvY1W5h9/WtldpTKJ//t+kOiN1cqr1LacwCZ7V8wLUaCWYsr6Nw2Ln2Ds4= --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_parse_transition_days_deprecated (tests.unit.s3.test_lifecycle.TestS3LifeCycle) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 121, in test_parse_transition_days_deprecated transition = self._get_bucket_lifecycle_config()[0].transition File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_lifecycle.py", line 78, in _get_bucket_lifecycle_config return bucket.get_lifecycle_config() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1388, in get_lifecycle_config response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id007003C06E99DCF0I99loGW8mqQU9fhGY18yjmtKDcd9AmE6wnlfa4twIppCxamq98jWrjNHOcaz4swHNXumVdIslOc= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?lifecycle boto: DEBUG: auth_path=/mybucket/?lifecycle boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?lifecycle boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:25 GMT /mybucket/?lifecycle boto: DEBUG: Signature: AWS aws_access_key_id:sr4zVR7es5opPA8KeA4JzJX+36c= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:25 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:sr4zVR7es5opPA8KeA4JzJX+36c=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'I99loGW8mqQU9fhGY18yjmtKDcd9AmE6wnlfa4twIppCxamq98jWrjNHOcaz4swHNXumVdIslOc='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', '007003C06E99DCF0'), ('date', 'Wed, 31 May 2017 16:49:24 GMT'), ('content-type', 'application/xml')] boto: DEBUG: InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_id007003C06E99DCF0I99loGW8mqQU9fhGY18yjmtKDcd9AmE6wnlfa4twIppCxamq98jWrjNHOcaz4swHNXumVdIslOc= --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_parse_tagging_response (tests.unit.s3.test_tagging.TestS3Tagging) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_tagging.py", line 30, in test_parse_tagging_response api_response = b.get_tags() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1827, in get_tags response = self.get_xml_tags() File "/usr/lib/python2.7/dist-packages/boto/s3/bucket.py", line 1844, in get_xml_tags response.status, response.reason, body) S3ResponseError: S3ResponseError: 403 Forbidden InvalidAccessKeyIdThe AWS Access Key Id you provided does not exist in our records.aws_access_key_idEA51585A1BA78CAAsgoIddLu1iFgZMwEXBl5nPquGN/n0U8EASo4ecDgNtorZh7RZbVniN0AyDp6TF8p4ZlytfZ+EdI= -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/mybucket/ boto: DEBUG: path=/?tagging boto: DEBUG: auth_path=/mybucket/?tagging boto: DEBUG: Method: GET boto: DEBUG: Path: https://mybucket.s3.amazonaws.com/?tagging boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: mybucket.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=mybucket.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT mybucket.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: GET Wed, 31 May 2017 16:49:25 GMT /mybucket/?tagging boto: DEBUG: Signature: AWS aws_access_key_id:VuWy++y3bOmD3OPx7hRkOFWaGFI= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:25 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:VuWy++y3bOmD3OPx7hRkOFWaGFI=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'sgoIddLu1iFgZMwEXBl5nPquGN/n0U8EASo4ecDgNtorZh7RZbVniN0AyDp6TF8p4ZlytfZ+EdI='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'EA51585A1BA78CAA'), ('date', 'Wed, 31 May 2017 16:49:25 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_ses_get_identity_dkim_list (tests.unit.ses.test_identity.TestSESIdentity) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ses/test_identity.py", line 71, in test_ses_get_identity_dkim_list .get_identity_dkim_attributes(['test@amazon.com', 'secondtest@amazon.com']) File "/usr/lib/python2.7/dist-packages/boto/ses/connection.py", line 451, in get_identity_dkim_attributes return self._make_request('GetIdentityDkimAttributes', params) File "/usr/lib/python2.7/dist-packages/boto/ses/connection.py", line 119, in _make_request self._handle_error(response, body) File "/usr/lib/python2.7/dist-packages/boto/ses/connection.py", line 177, in _handle_error raise ExceptionToRaise(response.status, exc_reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid 1b3914a3-4621-11e7-94c5-5dafcf23af23 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://email.us-east-1.amazonaws.com/ boto: DEBUG: Data: Action=GetIdentityDkimAttributes&Identities.member.2=secondtest%40amazon.com&Identities.member.1=test%40amazon.com boto: DEBUG: Headers: {'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8'} boto: DEBUG: Host: email.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=email.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT email.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=email.us-east-1.amazonaws.com, certificate hosts=['email.us-east-1.amazonaws.com', 'email.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Content-Length': '114', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'email.us-east-1.amazonaws.com', 'Date': 'Wed, 31 May 2017 16:49:26 GMT', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=Ogz6Q3poB9EWInm8Jt0SOB3NuQlAhhlZ8Du0B05LL+w=', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8'} boto: DEBUG: Response headers: [('x-amzn-requestid', '1b3914a3-4621-11e7-94c5-5dafcf23af23'), ('date', 'Wed, 31 May 2017 16:49:25 GMT'), ('content-length', '304'), ('content-type', 'text/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_ses_set_identity_feedback_forwarding_enabled_true (tests.unit.ses.test_identity.TestSESSetIdentityFeedbackForwardingEnabled) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ses/test_identity.py", line 169, in test_ses_set_identity_feedback_forwarding_enabled_true forwarding_enabled=True) File "/usr/lib/python2.7/dist-packages/boto/ses/connection.py", line 564, in set_identity_feedback_forwarding_enabled 'ForwardingEnabled': 'true' if forwarding_enabled else 'false' File "/usr/lib/python2.7/dist-packages/boto/ses/connection.py", line 119, in _make_request self._handle_error(response, body) File "/usr/lib/python2.7/dist-packages/boto/ses/connection.py", line 177, in _handle_error raise ExceptionToRaise(response.status, exc_reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid 1b7692a1-4621-11e7-b4ac-3f87eb99941a -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://email.us-east-1.amazonaws.com/ boto: DEBUG: Data: Action=SetIdentityFeedbackForwardingEnabled&ForwardingEnabled=true&Identity=user%40example.com boto: DEBUG: Headers: {'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8'} boto: DEBUG: Host: email.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=email.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT email.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=email.us-east-1.amazonaws.com, certificate hosts=['email.us-east-1.amazonaws.com', 'email.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Content-Length': '94', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'email.us-east-1.amazonaws.com', 'Date': 'Wed, 31 May 2017 16:49:26 GMT', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=Ogz6Q3poB9EWInm8Jt0SOB3NuQlAhhlZ8Du0B05LL+w=', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8'} boto: DEBUG: Response headers: [('x-amzn-requestid', '1b7692a1-4621-11e7-b4ac-3f87eb99941a'), ('date', 'Wed, 31 May 2017 16:49:26 GMT'), ('content-length', '304'), ('content-type', 'text/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_ses_set_identity_notification_topic_enabled_false (tests.unit.ses.test_identity.TestSESSetIdentityFeedbackForwardingEnabled) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ses/test_identity.py", line 183, in test_ses_set_identity_notification_topic_enabled_false forwarding_enabled=False) File "/usr/lib/python2.7/dist-packages/boto/ses/connection.py", line 564, in set_identity_feedback_forwarding_enabled 'ForwardingEnabled': 'true' if forwarding_enabled else 'false' File "/usr/lib/python2.7/dist-packages/boto/ses/connection.py", line 119, in _make_request self._handle_error(response, body) File "/usr/lib/python2.7/dist-packages/boto/ses/connection.py", line 177, in _handle_error raise ExceptionToRaise(response.status, exc_reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid 1babfa8a-4621-11e7-a404-713ddbdf279f -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://email.us-east-1.amazonaws.com/ boto: DEBUG: Data: Action=SetIdentityFeedbackForwardingEnabled&ForwardingEnabled=false&Identity=user%40example.com boto: DEBUG: Headers: {'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8'} boto: DEBUG: Host: email.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=email.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT email.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=email.us-east-1.amazonaws.com, certificate hosts=['email.us-east-1.amazonaws.com', 'email.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Content-Length': '95', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'email.us-east-1.amazonaws.com', 'Date': 'Wed, 31 May 2017 16:49:26 GMT', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=Ogz6Q3poB9EWInm8Jt0SOB3NuQlAhhlZ8Du0B05LL+w=', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8'} boto: DEBUG: Response headers: [('x-amzn-requestid', '1babfa8a-4621-11e7-a404-713ddbdf279f'), ('date', 'Wed, 31 May 2017 16:49:26 GMT'), ('content-length', '304'), ('content-type', 'text/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_ses_set_identity_notification_topic_bounce (tests.unit.ses.test_identity.TestSESSetIdentityNotificationTopic) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ses/test_identity.py", line 124, in test_ses_set_identity_notification_topic_bounce sns_topic='arn:aws:sns:us-east-1:123456789012:example') File "/usr/lib/python2.7/dist-packages/boto/ses/connection.py", line 548, in set_identity_notification_topic return self._make_request('SetIdentityNotificationTopic', params) File "/usr/lib/python2.7/dist-packages/boto/ses/connection.py", line 119, in _make_request self._handle_error(response, body) File "/usr/lib/python2.7/dist-packages/boto/ses/connection.py", line 177, in _handle_error raise ExceptionToRaise(response.status, exc_reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid 1be29a53-4621-11e7-83de-9fddb1c76884 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://email.us-east-1.amazonaws.com/ boto: DEBUG: Data: Action=SetIdentityNotificationTopic&NotificationType=Bounce&Identity=user%40example.com&SnsTopic=arn%3Aaws%3Asns%3Aus-east-1%3A123456789012%3Aexample boto: DEBUG: Headers: {'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8'} boto: DEBUG: Host: email.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=email.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT email.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=email.us-east-1.amazonaws.com, certificate hosts=['email.us-east-1.amazonaws.com', 'email.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Content-Length': '149', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'email.us-east-1.amazonaws.com', 'Date': 'Wed, 31 May 2017 16:49:27 GMT', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=zvO6wJS2GMmxkWVw7yoxyNJgRP6c+dmyp3Y8SyXpgCw=', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8'} boto: DEBUG: Response headers: [('x-amzn-requestid', '1be29a53-4621-11e7-83de-9fddb1c76884'), ('date', 'Wed, 31 May 2017 16:49:26 GMT'), ('content-length', '304'), ('content-type', 'text/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_ses_set_identity_notification_topic_complaint (tests.unit.ses.test_identity.TestSESSetIdentityNotificationTopic) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/ses/test_identity.py", line 139, in test_ses_set_identity_notification_topic_complaint sns_topic='arn:aws:sns:us-east-1:123456789012:example') File "/usr/lib/python2.7/dist-packages/boto/ses/connection.py", line 548, in set_identity_notification_topic return self._make_request('SetIdentityNotificationTopic', params) File "/usr/lib/python2.7/dist-packages/boto/ses/connection.py", line 119, in _make_request self._handle_error(response, body) File "/usr/lib/python2.7/dist-packages/boto/ses/connection.py", line 177, in _handle_error raise ExceptionToRaise(response.status, exc_reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid 1c1c6f2c-4621-11e7-a313-3543ee2859a1 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://email.us-east-1.amazonaws.com/ boto: DEBUG: Data: Action=SetIdentityNotificationTopic&NotificationType=Complaint&Identity=user%40example.com&SnsTopic=arn%3Aaws%3Asns%3Aus-east-1%3A123456789012%3Aexample boto: DEBUG: Headers: {'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8'} boto: DEBUG: Host: email.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=email.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT email.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=email.us-east-1.amazonaws.com, certificate hosts=['email.us-east-1.amazonaws.com', 'email.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Content-Length': '152', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'email.us-east-1.amazonaws.com', 'Date': 'Wed, 31 May 2017 16:49:27 GMT', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=zvO6wJS2GMmxkWVw7yoxyNJgRP6c+dmyp3Y8SyXpgCw=', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8'} boto: DEBUG: Response headers: [('x-amzn-requestid', '1c1c6f2c-4621-11e7-a313-3543ee2859a1'), ('date', 'Wed, 31 May 2017 16:49:27 GMT'), ('content-length', '304'), ('content-type', 'text/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_platform_application (tests.unit.sns.test_connection.TestSNSConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sns/test_connection.py", line 138, in test_create_platform_application 'PlatformCredential': 'a private key' File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 487, in create_platform_application params=params) File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 765, in _make_request raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"232c282e-5612-505b-9260-7986a04a1cad"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://sns.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: sns.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreatePlatformApplication', 'Platform': 'APNS', 'Attributes.entry.2.value': 'a ssl certificate', 'Version': '2010-03-31', 'ContentType': 'JSON', 'Name': 'MyApp', 'Attributes.entry.1.key': 'PlatformCredential', 'Attributes.entry.2.key': 'PlatformPrincipal', 'Attributes.entry.1.value': 'a private key'} boto: DEBUG: establishing HTTPS connection: host=sns.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT sns.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=sns.us-east-1.amazonaws.com, certificate hosts=['sns.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreatePlatformApplication&Attributes.entry.1.key=PlatformCredential&Attributes.entry.1.value=a%20private%20key&Attributes.entry.2.key=PlatformPrincipal&Attributes.entry.2.value=a%20ssl%20certificate&ContentType=JSON&Name=MyApp&Platform=APNS&Version=2010-03-31 host:sns.us-east-1.amazonaws.com x-amz-date:20170531T164928Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164928Z 20170531/us-east-1/sns/aws4_request b01f432a45382bd1ab35649e419f135021617f82dacc145043326d724b5e53d1 boto: DEBUG: Signature: dbfedf7ea5866fc879d81ecfbdfe7dadf18a7441209b62308e48a4f73688479a boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'sns.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sns/aws4_request,SignedHeaders=host;x-amz-date,Signature=dbfedf7ea5866fc879d81ecfbdfe7dadf18a7441209b62308e48a4f73688479a', 'X-Amz-Date': '20170531T164928Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '232c282e-5612-505b-9260-7986a04a1cad'), ('date', 'Wed, 31 May 2017 16:49:27 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"232c282e-5612-505b-9260-7986a04a1cad"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_platform_endpoint (tests.unit.sns.test_connection.TestSNSConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sns/test_connection.py", line 174, in test_create_platform_endpoint attributes={'Enabled': False}) File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 682, in create_platform_endpoint params=params) File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 765, in _make_request raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"74244a01-21b5-5e18-8469-1ba9d7ed9d58"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://sns.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: sns.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Token': 'abcde12345', 'Version': '2010-03-31', 'ContentType': 'JSON', 'Attributes.entry.1.key': 'Enabled', 'Action': 'CreatePlatformEndpoint', 'Attributes.entry.1.value': False, 'PlatformApplicationArn': 'arn:myapp', 'CustomUserData': 'john'} boto: DEBUG: establishing HTTPS connection: host=sns.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT sns.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=sns.us-east-1.amazonaws.com, certificate hosts=['sns.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreatePlatformEndpoint&Attributes.entry.1.key=Enabled&Attributes.entry.1.value=False&ContentType=JSON&CustomUserData=john&PlatformApplicationArn=arn%3Amyapp&Token=abcde12345&Version=2010-03-31 host:sns.us-east-1.amazonaws.com x-amz-date:20170531T164928Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164928Z 20170531/us-east-1/sns/aws4_request bf68487eb67baea0053001a14c70bfa25f444712cb8348c06f272675908c2bd1 boto: DEBUG: Signature: 029594ae087b06b18f2b586242b377f95a57f7a0f76af7d919d4da0b8e4fb59c boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'sns.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sns/aws4_request,SignedHeaders=host;x-amz-date,Signature=029594ae087b06b18f2b586242b377f95a57f7a0f76af7d919d4da0b8e4fb59c', 'X-Amz-Date': '20170531T164928Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '74244a01-21b5-5e18-8469-1ba9d7ed9d58'), ('date', 'Wed, 31 May 2017 16:49:28 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"74244a01-21b5-5e18-8469-1ba9d7ed9d58"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_publish_with_attributes (tests.unit.sns.test_connection.TestSNSConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sns/test_connection.py", line 261, in test_publish_with_attributes 'string_value': 'Bob' File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 290, in publish return self._make_request('Publish', params, '/', 'POST') File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 765, in _make_request raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"5ca413bc-f49a-5543-9bc9-421402c3c1c2"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://sns.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: sns.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'MessageAttributes.entry.1.Value.DataType': 'Number', 'MessageAttributes.entry.1.Value.StringValue': '42', 'MessageAttributes.entry.2.Value.DataType': 'String', 'MessageAttributes.entry.2.Name': 'name2', 'Version': '2010-03-31', 'MessageStructure': 'json', 'MessageAttributes.entry.2.Value.StringValue': 'Bob', 'TargetArn': 'target_arn', 'Action': 'Publish', 'ContentType': 'JSON', 'MessageAttributes.entry.1.Name': 'name1', 'Message': '{"GCM": {"data": "goes here"}, "default": "Ignored."}', 'Subject': 'subject'} boto: DEBUG: establishing HTTPS connection: host=sns.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT sns.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=sns.us-east-1.amazonaws.com, certificate hosts=['sns.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:sns.us-east-1.amazonaws.com x-amz-date:20170531T164929Z host;x-amz-date 84d8e41950c615e37ace1677b2f47a48691bb299e85cda2b8012769f9fb4305b boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164929Z 20170531/us-east-1/sns/aws4_request c04280a38cca21fa4f52a3eef1ca32561ef7fe23dc9689fe30451ca64d3374b2 boto: DEBUG: Signature: 342c31ec3b55cbb340fe84b6b3e9b701882278593039fa833c0d3197fbec9a91 boto: DEBUG: Final headers: {'Content-Length': '482', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'sns.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164929Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sns/aws4_request,SignedHeaders=host;x-amz-date,Signature=342c31ec3b55cbb340fe84b6b3e9b701882278593039fa833c0d3197fbec9a91'} boto: DEBUG: Response headers: [('x-amzn-requestid', '5ca413bc-f49a-5543-9bc9-421402c3c1c2'), ('date', 'Wed, 31 May 2017 16:49:28 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"5ca413bc-f49a-5543-9bc9-421402c3c1c2"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_publish_with_json (tests.unit.sns.test_connection.TestSNSConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sns/test_connection.py", line 218, in test_publish_with_json target_arn='target_arn' File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 290, in publish return self._make_request('Publish', params, '/', 'POST') File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 765, in _make_request raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"6bf8e58a-722c-53ec-8023-b4228475f4bf"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://sns.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: sns.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'ContentType': 'JSON', 'Version': '2010-03-31', 'MessageStructure': 'json', 'Action': 'Publish', 'TargetArn': 'target_arn', 'Message': '{"default": "Ignored.", "GCM": {"data": "goes here"}}', 'Subject': 'subject'} boto: DEBUG: establishing HTTPS connection: host=sns.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT sns.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=sns.us-east-1.amazonaws.com, certificate hosts=['sns.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:sns.us-east-1.amazonaws.com x-amz-date:20170531T164929Z host;x-amz-date 423d033f87e4698ebd9257e161146808516ea2b5aa8582f632b98b5166ce7cbe boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164929Z 20170531/us-east-1/sns/aws4_request 7ef36610527c169bc73e55f3b1d065aab8ea2b39322b883e0b3800e6f311049d boto: DEBUG: Signature: 2956addc522c97c915562b60285eaa160f17b65d9f61b959ddc423440c95177f boto: DEBUG: Final headers: {'Content-Length': '217', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'sns.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164929Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sns/aws4_request,SignedHeaders=host;x-amz-date,Signature=2956addc522c97c915562b60285eaa160f17b65d9f61b959ddc423440c95177f'} boto: DEBUG: Response headers: [('x-amzn-requestid', '6bf8e58a-722c-53ec-8023-b4228475f4bf'), ('date', 'Wed, 31 May 2017 16:49:29 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"6bf8e58a-722c-53ec-8023-b4228475f4bf"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_publish_with_kwargs (tests.unit.sns.test_connection.TestSNSConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sns/test_connection.py", line 109, in test_publish_with_kwargs subject='subject') File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 290, in publish return self._make_request('Publish', params, '/', 'POST') File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 765, in _make_request raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"5319755a-498f-5618-bbce-24f2bfd66309"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://sns.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: sns.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'ContentType': 'JSON', 'Version': '2010-03-31', 'Action': 'Publish', 'Message': 'message', 'TopicArn': 'topic', 'Subject': 'subject'} boto: DEBUG: establishing HTTPS connection: host=sns.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT sns.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=sns.us-east-1.amazonaws.com, certificate hosts=['sns.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:sns.us-east-1.amazonaws.com x-amz-date:20170531T164929Z host;x-amz-date b39f9163a1cee9526b9cb4fff601d185430ec5da9b695e9a52d6fbb69950e06d boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164929Z 20170531/us-east-1/sns/aws4_request 0a315ba96f07d9826414fa5a7b51edd8e4b29f3216e2bbaf5aa4cb46ba8a76b3 boto: DEBUG: Signature: 11a1d6a290a0c3987e81ee1da593460ae5fb0a8978eb6bc701632b424d737dff boto: DEBUG: Final headers: {'Content-Length': '97', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'sns.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164929Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sns/aws4_request,SignedHeaders=host;x-amz-date,Signature=11a1d6a290a0c3987e81ee1da593460ae5fb0a8978eb6bc701632b424d737dff'} boto: DEBUG: Response headers: [('x-amzn-requestid', '5319755a-498f-5618-bbce-24f2bfd66309'), ('date', 'Wed, 31 May 2017 16:49:29 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"5319755a-498f-5618-bbce-24f2bfd66309"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_publish_with_positional_args (tests.unit.sns.test_connection.TestSNSConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sns/test_connection.py", line 96, in test_publish_with_positional_args self.service_connection.publish('topic', 'message', 'subject') File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 290, in publish return self._make_request('Publish', params, '/', 'POST') File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 765, in _make_request raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"f682a1df-11d4-565d-b648-f077e78e27e9"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://sns.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: sns.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'ContentType': 'JSON', 'Version': '2010-03-31', 'Action': 'Publish', 'Message': 'message', 'TopicArn': 'topic', 'Subject': 'subject'} boto: DEBUG: establishing HTTPS connection: host=sns.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT sns.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=sns.us-east-1.amazonaws.com, certificate hosts=['sns.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:sns.us-east-1.amazonaws.com x-amz-date:20170531T164930Z host;x-amz-date b39f9163a1cee9526b9cb4fff601d185430ec5da9b695e9a52d6fbb69950e06d boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164930Z 20170531/us-east-1/sns/aws4_request b66c09a1de8bdc8c9ed1bfef702a84112001ce0bff12b8065ac8c2f4569e8de6 boto: DEBUG: Signature: 4ab868caee6699e76675094ea6774acc54b1264f7917cd241a2bb0e9291de1ba boto: DEBUG: Final headers: {'Content-Length': '97', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'sns.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164930Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sns/aws4_request,SignedHeaders=host;x-amz-date,Signature=4ab868caee6699e76675094ea6774acc54b1264f7917cd241a2bb0e9291de1ba'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'f682a1df-11d4-565d-b648-f077e78e27e9'), ('date', 'Wed, 31 May 2017 16:49:30 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"f682a1df-11d4-565d-b648-f077e78e27e9"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_publish_with_target_arn (tests.unit.sns.test_connection.TestSNSConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sns/test_connection.py", line 122, in test_publish_with_target_arn subject='subject') File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 290, in publish return self._make_request('Publish', params, '/', 'POST') File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 765, in _make_request raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"325ca7dc-dbe6-56e8-98d8-f6742dbc4d96"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://sns.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: sns.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'ContentType': 'JSON', 'Version': '2010-03-31', 'Action': 'Publish', 'TargetArn': 'target_arn', 'Message': 'message', 'Subject': 'subject'} boto: DEBUG: establishing HTTPS connection: host=sns.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT sns.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=sns.us-east-1.amazonaws.com, certificate hosts=['sns.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:sns.us-east-1.amazonaws.com x-amz-date:20170531T164930Z host;x-amz-date 4e9b72c1e89295eb89e399985da42cb17dd7ebcfb7042e5eb8965011f89e30e6 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164930Z 20170531/us-east-1/sns/aws4_request 8606799fc8477d30737d6307681358e1322ce278852fc05f0bfb2ea293fd640d boto: DEBUG: Signature: 01f771a04cf7f5aaaf944956ed7882a3f8b4666ac96baff800769aad5a2c45b8 boto: DEBUG: Final headers: {'Content-Length': '103', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'sns.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164930Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sns/aws4_request,SignedHeaders=host;x-amz-date,Signature=01f771a04cf7f5aaaf944956ed7882a3f8b4666ac96baff800769aad5a2c45b8'} boto: DEBUG: Response headers: [('x-amzn-requestid', '325ca7dc-dbe6-56e8-98d8-f6742dbc4d96'), ('date', 'Wed, 31 May 2017 16:49:30 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"325ca7dc-dbe6-56e8-98d8-f6742dbc4d96"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_publish_with_utf8_message (tests.unit.sns.test_connection.TestSNSConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sns/test_connection.py", line 233, in test_publish_with_utf8_message self.service_connection.publish('topic', message, subject) File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 290, in publish return self._make_request('Publish', params, '/', 'POST') File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 765, in _make_request raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"3097cace-4224-5918-8494-9b66b47f873a"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://sns.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: sns.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'ContentType': 'JSON', 'Version': '2010-03-31', 'Action': 'Publish', 'Message': 'We \xe2\x99\xa5 utf-8', 'TopicArn': 'topic', 'Subject': 'We \xe2\x99\xa5 utf-8'} boto: DEBUG: establishing HTTPS connection: host=sns.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT sns.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=sns.us-east-1.amazonaws.com, certificate hosts=['sns.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:sns.us-east-1.amazonaws.com x-amz-date:20170531T164930Z host;x-amz-date d115a8da5c0c06950749173b5d1ca2e51ff469a6d8a9e7d24ace9f19d7820bca boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164930Z 20170531/us-east-1/sns/aws4_request 4194bb56ff9f4259a01091ad60259ea779b66b046ce32adb4cfc824d1b827a40 boto: DEBUG: Signature: 490ff10d75dc30f5cf11d1e034649a06bb5c520d6fac5791d5c85d07d27648c4 boto: DEBUG: Final headers: {'Content-Length': '127', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'sns.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164930Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sns/aws4_request,SignedHeaders=host;x-amz-date,Signature=490ff10d75dc30f5cf11d1e034649a06bb5c520d6fac5791d5c85d07d27648c4'} boto: DEBUG: Response headers: [('x-amzn-requestid', '3097cace-4224-5918-8494-9b66b47f873a'), ('date', 'Wed, 31 May 2017 16:49:30 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"3097cace-4224-5918-8494-9b66b47f873a"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_set_endpoint_attributes (tests.unit.sns.test_connection.TestSNSConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sns/test_connection.py", line 190, in test_set_endpoint_attributes 'Enabled': False}) File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 735, in set_endpoint_attributes params=params) File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 765, in _make_request raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"093f1da7-a589-515c-beb0-4c0f53d273e7"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://sns.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: sns.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'SetEndpointAttributes', 'Attributes.entry.2.value': False, 'EndpointArn': 'arn:myendpoint', 'ContentType': 'JSON', 'Version': '2010-03-31', 'Attributes.entry.1.key': 'CustomUserData', 'Attributes.entry.2.key': 'Enabled', 'Attributes.entry.1.value': 'john'} boto: DEBUG: establishing HTTPS connection: host=sns.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT sns.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=sns.us-east-1.amazonaws.com, certificate hosts=['sns.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=SetEndpointAttributes&Attributes.entry.1.key=CustomUserData&Attributes.entry.1.value=john&Attributes.entry.2.key=Enabled&Attributes.entry.2.value=False&ContentType=JSON&EndpointArn=arn%3Amyendpoint&Version=2010-03-31 host:sns.us-east-1.amazonaws.com x-amz-date:20170531T164931Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164931Z 20170531/us-east-1/sns/aws4_request 1ff486313c001b4ac6b4ba6ebea1f59a06e5046058b09bde84cb3ba9772779bf boto: DEBUG: Signature: 9d8bcce50034f6f4d62983f3cf7cefe033a22d571435f6c2ecc7c7019c1f5af5 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'sns.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sns/aws4_request,SignedHeaders=host;x-amz-date,Signature=9d8bcce50034f6f4d62983f3cf7cefe033a22d571435f6c2ecc7c7019c1f5af5', 'X-Amz-Date': '20170531T164931Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '093f1da7-a589-515c-beb0-4c0f53d273e7'), ('date', 'Wed, 31 May 2017 16:49:30 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"093f1da7-a589-515c-beb0-4c0f53d273e7"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_set_platform_application_attributes (tests.unit.sns.test_connection.TestSNSConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sns/test_connection.py", line 157, in test_set_platform_application_attributes 'PlatformCredential': 'a private key'}) File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 534, in set_platform_application_attributes params=params) File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 765, in _make_request raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"ecb78f76-7748-5307-8792-dede8113a233"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://sns.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: sns.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'SetPlatformApplicationAttributes', 'Attributes.entry.2.value': 'a ssl certificate', 'Version': '2010-03-31', 'ContentType': 'JSON', 'Attributes.entry.1.key': 'PlatformCredential', 'Attributes.entry.2.key': 'PlatformPrincipal', 'Attributes.entry.1.value': 'a private key', 'PlatformApplicationArn': 'arn:myapp'} boto: DEBUG: establishing HTTPS connection: host=sns.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT sns.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=sns.us-east-1.amazonaws.com, certificate hosts=['sns.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=SetPlatformApplicationAttributes&Attributes.entry.1.key=PlatformCredential&Attributes.entry.1.value=a%20private%20key&Attributes.entry.2.key=PlatformPrincipal&Attributes.entry.2.value=a%20ssl%20certificate&ContentType=JSON&PlatformApplicationArn=arn%3Amyapp&Version=2010-03-31 host:sns.us-east-1.amazonaws.com x-amz-date:20170531T164931Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164931Z 20170531/us-east-1/sns/aws4_request dc8350cba67488f74196579b001d3cf4fef9799d17798e2441113a286897e3b6 boto: DEBUG: Signature: 213894a1edb6c7cc4be0d87401a3f78b409239f300c085aa85ba28b220b9f80d boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'sns.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sns/aws4_request,SignedHeaders=host;x-amz-date,Signature=213894a1edb6c7cc4be0d87401a3f78b409239f300c085aa85ba28b220b9f80d', 'X-Amz-Date': '20170531T164931Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'ecb78f76-7748-5307-8792-dede8113a233'), ('date', 'Wed, 31 May 2017 16:49:31 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"ecb78f76-7748-5307-8792-dede8113a233"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_sqs_with_existing_policy (tests.unit.sns.test_connection.TestSNSConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sns/test_connection.py", line 55, in test_sqs_with_existing_policy self.service_connection.subscribe_sqs_queue('topic_arn', queue) File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 349, in subscribe_sqs_queue resp = self.subscribe(topic, 'sqs', q_arn) File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 320, in subscribe return self._make_request('Subscribe', params) File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 765, in _make_request raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"989855b3-6445-5d2a-8744-041b92197bf3"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://sns.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: sns.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Endpoint': 'arn:aws:sqs:us-east-1:idnum:queuename', 'Protocol': 'sqs', 'Version': '2010-03-31', 'Action': 'Subscribe', 'ContentType': 'JSON', 'TopicArn': 'topic_arn'} boto: DEBUG: establishing HTTPS connection: host=sns.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT sns.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=sns.us-east-1.amazonaws.com, certificate hosts=['sns.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=Subscribe&ContentType=JSON&Endpoint=arn%3Aaws%3Asqs%3Aus-east-1%3Aidnum%3Aqueuename&Protocol=sqs&TopicArn=topic_arn&Version=2010-03-31 host:sns.us-east-1.amazonaws.com x-amz-date:20170531T164932Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164932Z 20170531/us-east-1/sns/aws4_request 2316a89072608d48bb348e671664e5944c87d8511860830679ba4317aa921ccc boto: DEBUG: Signature: 935af5261fa063b07694f5291d9d71f8adea01dceda9e227be13a952e572aaf3 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'sns.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sns/aws4_request,SignedHeaders=host;x-amz-date,Signature=935af5261fa063b07694f5291d9d71f8adea01dceda9e227be13a952e572aaf3', 'X-Amz-Date': '20170531T164932Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '989855b3-6445-5d2a-8744-041b92197bf3'), ('date', 'Wed, 31 May 2017 16:49:32 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"989855b3-6445-5d2a-8744-041b92197bf3"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_sqs_with_no_previous_policy (tests.unit.sns.test_connection.TestSNSConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sns/test_connection.py", line 80, in test_sqs_with_no_previous_policy self.service_connection.subscribe_sqs_queue('topic_arn', queue) File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 349, in subscribe_sqs_queue resp = self.subscribe(topic, 'sqs', q_arn) File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 320, in subscribe return self._make_request('Subscribe', params) File "/usr/lib/python2.7/dist-packages/boto/sns/connection.py", line 765, in _make_request raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"a298446f-c29e-5a63-80e4-15c734c2a015"} -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://sns.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: sns.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Endpoint': 'arn:aws:sqs:us-east-1:idnum:queuename', 'Protocol': 'sqs', 'Version': '2010-03-31', 'Action': 'Subscribe', 'ContentType': 'JSON', 'TopicArn': 'topic_arn'} boto: DEBUG: establishing HTTPS connection: host=sns.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT sns.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=sns.us-east-1.amazonaws.com, certificate hosts=['sns.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=Subscribe&ContentType=JSON&Endpoint=arn%3Aaws%3Asqs%3Aus-east-1%3Aidnum%3Aqueuename&Protocol=sqs&TopicArn=topic_arn&Version=2010-03-31 host:sns.us-east-1.amazonaws.com x-amz-date:20170531T164932Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164932Z 20170531/us-east-1/sns/aws4_request 2316a89072608d48bb348e671664e5944c87d8511860830679ba4317aa921ccc boto: DEBUG: Signature: 935af5261fa063b07694f5291d9d71f8adea01dceda9e227be13a952e572aaf3 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'sns.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sns/aws4_request,SignedHeaders=host;x-amz-date,Signature=935af5261fa063b07694f5291d9d71f8adea01dceda9e227be13a952e572aaf3', 'X-Amz-Date': '20170531T164932Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'a298446f-c29e-5a63-80e4-15c734c2a015'), ('date', 'Wed, 31 May 2017 16:49:31 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: DEBUG: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"a298446f-c29e-5a63-80e4-15c734c2a015"} --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_auth_region_name_is_automatically_updated (tests.unit.sqs.test_connection.SQSAuthParams) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sqs/test_connection.py", line 92, in test_auth_region_name_is_automatically_updated self.service_connection.create_queue('my_queue') File "/usr/lib/python2.7/dist-packages/boto/sqs/connection.py", line 96, in create_queue return self.get_object('CreateQueue', params, Queue) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) SQSError: SQSError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalid.7c602e0d-bea1-5d01-8bb1-7fa548fc2f76 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://us-west-2.queue.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: us-west-2.queue.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateQueue', 'Version': '2012-11-05', 'QueueName': 'my_queue'} boto: DEBUG: establishing HTTPS connection: host=us-west-2.queue.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT us-west-2.queue.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=us-west-2.queue.amazonaws.com, certificate hosts=['sqs.us-west-2.amazonaws.com', 'us-west-2.queue.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateQueue&QueueName=my_queue&Version=2012-11-05 host:us-west-2.queue.amazonaws.com x-amz-date:20170531T164933Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164933Z 20170531/us-west-2/sqs/aws4_request a37ab3b1fc18addf4f250cb87724e103b244a674e2758ce8670eaf11105bf966 boto: DEBUG: Signature: aeef00761f29fa1aa920c77efc73f84e28d114cbd9424907447e20d73c8a857c boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'us-west-2.queue.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-west-2/sqs/aws4_request,SignedHeaders=host;x-amz-date,Signature=aeef00761f29fa1aa920c77efc73f84e28d114cbd9424907447e20d73c8a857c', 'X-Amz-Date': '20170531T164933Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '7c602e0d-bea1-5d01-8bb1-7fa548fc2f76'), ('content-length', '311'), ('server', 'Server'), ('connection', 'close'), ('date', 'Wed, 31 May 2017 16:49:33 GMT'), ('content-type', 'text/xml')] boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid.7c602e0d-bea1-5d01-8bb1-7fa548fc2f76 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_auth_service_name_override (tests.unit.sqs.test_connection.SQSAuthParams) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sqs/test_connection.py", line 63, in test_auth_service_name_override self.service_connection.create_queue('my_queue') File "/usr/lib/python2.7/dist-packages/boto/sqs/connection.py", line 96, in create_queue return self.get_object('CreateQueue', params, Queue) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) SQSError: SQSError: 403 Forbidden SenderSignatureDoesNotMatchCredential should be scoped to correct service: 'sqs'. f7fbe8fa-4332-5a58-88e6-b952b56f0aff -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://queue.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: queue.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateQueue', 'Version': '2012-11-05', 'QueueName': 'my_queue'} boto: DEBUG: establishing HTTPS connection: host=queue.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT queue.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=queue.amazonaws.com, certificate hosts=['sqs.us-east-1.amazonaws.com', 'queue.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateQueue&QueueName=my_queue&Version=2012-11-05 host:queue.amazonaws.com x-amz-date:20170531T164933Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164933Z 20170531/us-east-1/service_override/aws4_request aef6f13c95939fd3be4cba10546e2d3ed18f8848f819b3f5caf0d5dba4f9b34b boto: DEBUG: Signature: 0edd70f8b5ce6976fbd8d7ebfc65d3ccfb22a987b43424ab1970632b9044851a boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'queue.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/service_override/aws4_request,SignedHeaders=host;x-amz-date,Signature=0edd70f8b5ce6976fbd8d7ebfc65d3ccfb22a987b43424ab1970632b9044851a', 'X-Amz-Date': '20170531T164933Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'f7fbe8fa-4332-5a58-88e6-b952b56f0aff'), ('content-length', '313'), ('server', 'Server'), ('connection', 'close'), ('date', 'Wed, 31 May 2017 16:49:33 GMT'), ('content-type', 'text/xml')] boto: DEBUG: SenderSignatureDoesNotMatchCredential should be scoped to correct service: 'sqs'. f7fbe8fa-4332-5a58-88e6-b952b56f0aff --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_class_attribute_can_set_service_name (tests.unit.sqs.test_connection.SQSAuthParams) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sqs/test_connection.py", line 74, in test_class_attribute_can_set_service_name self.service_connection.create_queue('my_queue') File "/usr/lib/python2.7/dist-packages/boto/sqs/connection.py", line 96, in create_queue return self.get_object('CreateQueue', params, Queue) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) SQSError: SQSError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalid.d4daa1e4-1d42-54b1-87fd-f04ceb1c1d20 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://queue.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: queue.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateQueue', 'Version': '2012-11-05', 'QueueName': 'my_queue'} boto: DEBUG: establishing HTTPS connection: host=queue.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT queue.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=queue.amazonaws.com, certificate hosts=['sqs.us-east-1.amazonaws.com', 'queue.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateQueue&QueueName=my_queue&Version=2012-11-05 host:queue.amazonaws.com x-amz-date:20170531T164934Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164934Z 20170531/us-east-1/sqs/aws4_request c43fce476588be84108087f7d47c11d4594d55776f73d986c07e90a1e590cf24 boto: DEBUG: Signature: 8fb33859e9be7feb44d9302e5690e9931639ce3cdb76beac4cd111becc7b71af boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'queue.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sqs/aws4_request,SignedHeaders=host;x-amz-date,Signature=8fb33859e9be7feb44d9302e5690e9931639ce3cdb76beac4cd111becc7b71af', 'X-Amz-Date': '20170531T164934Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd4daa1e4-1d42-54b1-87fd-f04ceb1c1d20'), ('content-length', '311'), ('server', 'Server'), ('connection', 'close'), ('date', 'Wed, 31 May 2017 16:49:34 GMT'), ('content-type', 'text/xml')] boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid.d4daa1e4-1d42-54b1-87fd-f04ceb1c1d20 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_queue_with_owner_account_id_returns_queue (tests.unit.sqs.test_connection.SQSAuthParams) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sqs/test_connection.py", line 111, in test_get_queue_with_owner_account_id_returns_queue self.service_connection.create_queue('my_queue') File "/usr/lib/python2.7/dist-packages/boto/sqs/connection.py", line 96, in create_queue return self.get_object('CreateQueue', params, Queue) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) SQSError: SQSError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalid.a241e71f-347e-58c3-a7de-b6b7c22045f1 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://queue.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: queue.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateQueue', 'Version': '2012-11-05', 'QueueName': 'my_queue'} boto: DEBUG: establishing HTTPS connection: host=queue.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT queue.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=queue.amazonaws.com, certificate hosts=['sqs.us-east-1.amazonaws.com', 'queue.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateQueue&QueueName=my_queue&Version=2012-11-05 host:queue.amazonaws.com x-amz-date:20170531T164934Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164934Z 20170531/us-east-1/sqs/aws4_request c43fce476588be84108087f7d47c11d4594d55776f73d986c07e90a1e590cf24 boto: DEBUG: Signature: 8fb33859e9be7feb44d9302e5690e9931639ce3cdb76beac4cd111becc7b71af boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'queue.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sqs/aws4_request,SignedHeaders=host;x-amz-date,Signature=8fb33859e9be7feb44d9302e5690e9931639ce3cdb76beac4cd111becc7b71af', 'X-Amz-Date': '20170531T164934Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'a241e71f-347e-58c3-a7de-b6b7c22045f1'), ('content-length', '311'), ('server', 'Server'), ('connection', 'close'), ('date', 'Wed, 31 May 2017 16:49:34 GMT'), ('content-type', 'text/xml')] boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid.a241e71f-347e-58c3-a7de-b6b7c22045f1 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_message_attribute_response (tests.unit.sqs.test_connection.SQSMessageAttributesParsing) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sqs/test_connection.py", line 186, in test_message_attribute_response message = self.service_connection.receive_message(queue)[0] File "/usr/lib/python2.7/dist-packages/boto/sqs/connection.py", line 279, in receive_message queue.id, queue) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) SQSError: SQSError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalid.229b8a40-25c7-5e40-b700-dbe8d398e3d7 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://queue.amazonaws.com/123456789012/testQueue/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: queue.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ReceiveMessage', 'Version': '2012-11-05', 'MaxNumberOfMessages': 1} boto: DEBUG: establishing HTTPS connection: host=queue.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT queue.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=queue.amazonaws.com, certificate hosts=['sqs.us-east-1.amazonaws.com', 'queue.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET /123456789012/testQueue/ Action=ReceiveMessage&MaxNumberOfMessages=1&Version=2012-11-05 host:queue.amazonaws.com x-amz-date:20170531T164934Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164934Z 20170531/us-east-1/sqs/aws4_request 05c23fffb1bfd338e0e724c4de2a3d8c5a90522958112f1420b5a55c1c98ef4a boto: DEBUG: Signature: 6bc48414ebe1917f1ad8d736c9e45ed6b72728d200b902203e30d9702bb62b6e boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'queue.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sqs/aws4_request,SignedHeaders=host;x-amz-date,Signature=6bc48414ebe1917f1ad8d736c9e45ed6b72728d200b902203e30d9702bb62b6e', 'X-Amz-Date': '20170531T164934Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '229b8a40-25c7-5e40-b700-dbe8d398e3d7'), ('content-length', '311'), ('server', 'Server'), ('connection', 'close'), ('date', 'Wed, 31 May 2017 16:49:35 GMT'), ('content-type', 'text/xml')] boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid.229b8a40-25c7-5e40-b700-dbe8d398e3d7 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_send_message_attributes (tests.unit.sqs.test_connection.SQSSendBatchMessageAttributes) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sqs/test_connection.py", line 293, in test_send_message_attributes self.service_connection.send_message_batch(queue, (message1, message2)) File "/usr/lib/python2.7/dist-packages/boto/sqs/connection.py", line 444, in send_message_batch queue.id, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) SQSError: SQSError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalid.eadcc065-21c0-5440-a952-91cdd79f0bba -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://queue.amazonaws.com/123456789012/testQueue/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: queue.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'SendMessageBatchRequestEntry.1.MessageAttribute.1.Value.DataType': 'String', 'SendMessageBatchRequestEntry.2.MessageAttribute.1.Name': 'name2', 'SendMessageBatchRequestEntry.1.DelaySeconds': 0, 'SendMessageBatchRequestEntry.1.MessageAttribute.1.Name': 'name1', 'SendMessageBatchRequestEntry.2.MessageBody': 'Message 2', 'SendMessageBatchRequestEntry.2.MessageAttribute.1.Value.StringValue': '1', 'SendMessageBatchRequestEntry.1.MessageAttribute.1.Value.StringValue': 'foo', 'SendMessageBatchRequestEntry.1.MessageBody': 'Message 1', 'Version': '2012-11-05', 'SendMessageBatchRequestEntry.2.Id': 2, 'SendMessageBatchRequestEntry.2.DelaySeconds': 0, 'Action': 'SendMessageBatch', 'SendMessageBatchRequestEntry.1.Id': 1, 'SendMessageBatchRequestEntry.2.MessageAttribute.1.Value.DataType': 'Number'} boto: DEBUG: establishing HTTPS connection: host=queue.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT queue.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=queue.amazonaws.com, certificate hosts=['sqs.us-east-1.amazonaws.com', 'queue.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST /123456789012/testQueue/ host:queue.amazonaws.com x-amz-date:20170531T164935Z host;x-amz-date ef71eba267a4ec2585a2d761c0a6a641e5052210a96cc7c9cbf3b34055217efd boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164935Z 20170531/us-east-1/sqs/aws4_request 0a0e09107ccbcc29dcbd184b6fb97944a9f1000d38a32bc6c38a8fb4212a822c boto: DEBUG: Signature: 99681a71a394ab0d97266c4861fe6368012c3492091127c6b3d2cbdcb588db9c boto: DEBUG: Final headers: {'Content-Length': '724', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'queue.amazonaws.com', 'X-Amz-Date': '20170531T164935Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sqs/aws4_request,SignedHeaders=host;x-amz-date,Signature=99681a71a394ab0d97266c4861fe6368012c3492091127c6b3d2cbdcb588db9c'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'eadcc065-21c0-5440-a952-91cdd79f0bba'), ('content-length', '311'), ('server', 'Server'), ('connection', 'close'), ('date', 'Wed, 31 May 2017 16:49:35 GMT'), ('content-type', 'text/xml')] boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid.eadcc065-21c0-5440-a952-91cdd79f0bba --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_send_message_attributes (tests.unit.sqs.test_connection.SQSSendMessageAttributes) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sqs/test_connection.py", line 239, in test_send_message_attributes 'string_value': '1' File "/usr/lib/python2.7/dist-packages/boto/sqs/connection.py", line 390, in send_message queue.id, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) SQSError: SQSError: 403 Forbidden SenderInvalidClientTokenIdThe security token included in the request is invalid.1ab7529a-d382-5f47-b51a-033225dde181 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://queue.amazonaws.com/123456789012/testQueue/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: queue.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Version': '2012-11-05', 'MessageAttribute.1.Value.DataType': 'String', 'MessageAttribute.1.Value.StringValue': 'Bob', 'Action': 'SendMessage', 'MessageAttribute.1.Name': 'name1', 'MessageAttribute.2.Value.StringValue': '1', 'MessageAttribute.2.Name': 'name2', 'MessageBody': 'Test message', 'MessageAttribute.2.Value.DataType': 'Number'} boto: DEBUG: establishing HTTPS connection: host=queue.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT queue.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=queue.amazonaws.com, certificate hosts=['sqs.us-east-1.amazonaws.com', 'queue.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST /123456789012/testQueue/ host:queue.amazonaws.com x-amz-date:20170531T164935Z host;x-amz-date 089fe2abe1d26e72685bb145548711b8405f0e0c5e352cc246ab42d69ba804d2 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164935Z 20170531/us-east-1/sqs/aws4_request 65f77696c249ebf7e9b8d563a379e9de13559137f467d5f2837b01093be6d3d2 boto: DEBUG: Signature: ff94278711314a0dc9919feef2dcef283fa6396ad666f9c7ff17fcd591ab4763 boto: DEBUG: Final headers: {'Content-Length': '286', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'queue.amazonaws.com', 'X-Amz-Date': '20170531T164935Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sqs/aws4_request,SignedHeaders=host;x-amz-date,Signature=ff94278711314a0dc9919feef2dcef283fa6396ad666f9c7ff17fcd591ab4763'} boto: DEBUG: Response headers: [('x-amzn-requestid', '1ab7529a-d382-5f47-b51a-033225dde181'), ('content-length', '311'), ('server', 'Server'), ('connection', 'close'), ('date', 'Wed, 31 May 2017 16:49:35 GMT'), ('content-type', 'text/xml')] boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid.1ab7529a-d382-5f47-b51a-033225dde181 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_assume_role (tests.unit.sts.test_connection.TestSTSConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sts/test_connection.py", line 70, in test_assume_role response = self.service_connection.assume_role('arn:role', 'mysession') File "/usr/lib/python2.7/dist-packages/boto/sts/connection.py", line 384, in assume_role return self.get_object('AssumeRole', params, AssumedRole, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 21168b56-4621-11e7-9849-fd30ece34972 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://sts.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: sts.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'AssumeRole', 'RoleArn': 'arn:role', 'Version': '2011-06-15', 'RoleSessionName': 'mysession'} boto: DEBUG: establishing HTTPS connection: host=sts.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT sts.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=sts.amazonaws.com, certificate hosts=['sts.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:sts.amazonaws.com x-amz-date:20170531T164936Z host;x-amz-date 77e9524d1e551feb722f153517f8f62908b52a53b63097a111defcd8b7c57a2b boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164936Z 20170531/us-east-1/sts/aws4_request 39284f276392464bb644f0335cd634719b93f2a0b841eb2565049525a7c87531 boto: DEBUG: Signature: 845c8dc1694e85c3de7909470e8e95baba225d1dff359bb35448e48bf99909a4 boto: DEBUG: Final headers: {'Content-Length': '81', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'sts.amazonaws.com', 'X-Amz-Date': '20170531T164936Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sts/aws4_request,SignedHeaders=host;x-amz-date,Signature=845c8dc1694e85c3de7909470e8e95baba225d1dff359bb35448e48bf99909a4'} boto: DEBUG: Response headers: [('x-amzn-requestid', '21168b56-4621-11e7-9849-fd30ece34972'), ('date', 'Wed, 31 May 2017 16:49:35 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 21168b56-4621-11e7-9849-fd30ece34972 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_assume_role_with_mfa (tests.unit.sts.test_connection.TestSTSConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sts/test_connection.py", line 88, in test_assume_role_with_mfa mfa_token='abc123' File "/usr/lib/python2.7/dist-packages/boto/sts/connection.py", line 384, in assume_role return self.get_object('AssumeRole', params, AssumedRole, verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 403 Forbidden Sender InvalidClientTokenId The security token included in the request is invalid. 214b0890-4621-11e7-aac4-0bfb3a859c4d -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://sts.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: sts.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'RoleSessionName': 'mysession', 'RoleArn': 'arn:role', 'SerialNumber': 'GAHT12345678', 'Version': '2011-06-15', 'TokenCode': 'abc123', 'Action': 'AssumeRole'} boto: DEBUG: establishing HTTPS connection: host=sts.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT sts.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=sts.amazonaws.com, certificate hosts=['sts.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:sts.amazonaws.com x-amz-date:20170531T164936Z host;x-amz-date 42df4c50d803319dfccb861bf2c1aa719abd0a1d945e55a34f16333797f5e824 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164936Z 20170531/us-east-1/sts/aws4_request 232f45dafeead9613bff40c7c73e42263363da17bf1f67e6eee45b86789b28d2 boto: DEBUG: Signature: e916931118fa59470adfbb7df1cb704e4486b3ab3bdec8233fc09a072fae58a9 boto: DEBUG: Final headers: {'Content-Length': '124', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'sts.amazonaws.com', 'X-Amz-Date': '20170531T164936Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sts/aws4_request,SignedHeaders=host;x-amz-date,Signature=e916931118fa59470adfbb7df1cb704e4486b3ab3bdec8233fc09a072fae58a9'} boto: DEBUG: Response headers: [('x-amzn-requestid', '214b0890-4621-11e7-aac4-0bfb3a859c4d'), ('date', 'Wed, 31 May 2017 16:49:36 GMT'), ('content-length', '306'), ('content-type', 'text/xml')] boto: DEBUG: Sender InvalidClientTokenId The security token included in the request is invalid. 214b0890-4621-11e7-aac4-0bfb3a859c4d --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_assume_role_with_saml (tests.unit.sts.test_connection.TestSTSSAMLConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sts/test_connection.py", line 226, in test_assume_role_with_saml saml_assertion=assertion File "/usr/lib/python2.7/dist-packages/boto/sts/connection.py", line 493, in assume_role_with_saml verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 400 Bad Request Sender InvalidIdentityToken Invalid base64 SAMLResponse (Service: AWSOpenIdDiscoveryService; Status Code: 400; Error Code: AuthSamlInvalidSamlResponseException; Request ID: 2181d081-4621-11e7-873a-8b16e04fa0e0) 2182ba21-4621-11e7-9ee4-9b290c80cbfd -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://sts.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: sts.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'AssumeRoleWithSAML', 'RoleArn': 'arn:aws:iam::000240903217:role/Test', 'PrincipalArn': 'arn:aws:iam::000240903217:role/Principal', 'SAMLAssertion': 'test', 'Version': '2011-06-15'} boto: DEBUG: establishing HTTPS connection: host=sts.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT sts.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=sts.amazonaws.com, certificate hosts=['sts.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:sts.amazonaws.com x-amz-date:20170531T164936Z host;x-amz-date 2bd93099fb3a885092140573a058a096d1d95e5f689e7dea26272145fb30aea2 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164936Z 20170531/us-east-1/sts/aws4_request f4ed9073244be064aa2cc336282c71744a66a286d4d5e208f916013df05b6d06 boto: DEBUG: Signature: 6a090b4ff3d2433b7a59b2ec8b2c9f07d2f8881e442c876ae533cf7e5809ae1e boto: DEBUG: Final headers: {'Content-Length': '185', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'sts.amazonaws.com', 'X-Amz-Date': '20170531T164936Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sts/aws4_request,SignedHeaders=host;x-amz-date,Signature=6a090b4ff3d2433b7a59b2ec8b2c9f07d2f8881e442c876ae533cf7e5809ae1e'} boto: DEBUG: Response headers: [('x-amzn-requestid', '2182ba21-4621-11e7-9ee4-9b290c80cbfd'), ('date', 'Wed, 31 May 2017 16:49:36 GMT'), ('content-length', '434'), ('content-type', 'text/xml'), ('connection', 'close')] boto: DEBUG: Sender InvalidIdentityToken Invalid base64 SAMLResponse (Service: AWSOpenIdDiscoveryService; Status Code: 400; Error Code: AuthSamlInvalidSamlResponseException; Request ID: 2181d081-4621-11e7-873a-8b16e04fa0e0) 2182ba21-4621-11e7-9ee4-9b290c80cbfd --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_assume_role_with_web_identity (tests.unit.sts.test_connection.TestSTSWebIdentityConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/sts/test_connection.py", line 155, in test_assume_role_with_web_identity provider_id='www.amazon.com', File "/usr/lib/python2.7/dist-packages/boto/sts/connection.py", line 598, in assume_role_with_web_identity verb='POST' File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) BotoServerError: BotoServerError: 400 Bad Request Sender InvalidIdentityToken Provided Token is not a Login With Amazon token 21b8be91-4621-11e7-977b-1fd2ce2ef3a0 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://sts.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: sts.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'RoleSessionName': 'guestuser', 'RoleArn': 'arn:aws:iam::000240903217:role/FederatedWebIdentityRole', 'WebIdentityToken': 'b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9', 'ProviderId': 'www.amazon.com', 'Version': '2011-06-15', 'Action': 'AssumeRoleWithWebIdentity'} boto: DEBUG: establishing HTTPS connection: host=sts.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT sts.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=sts.amazonaws.com, certificate hosts=['sts.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:sts.amazonaws.com x-amz-date:20170531T164937Z host;x-amz-date 2c25527ce68390d9722e8c338550e4e19422cb7cd9ab5dda73d25ae3ffdc193d boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164937Z 20170531/us-east-1/sts/aws4_request 622f40bc2dcea4bc6eac1a589ad4b6439d25e275aca8e0f3fe6b61e3d8149bc5 boto: DEBUG: Signature: ad59ba14c5285f8d553a5a207fa4d59a49dbaf071032c4b1ac8c60bd9288228f boto: DEBUG: Final headers: {'Content-Length': '261', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'sts.amazonaws.com', 'X-Amz-Date': '20170531T164937Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/sts/aws4_request,SignedHeaders=host;x-amz-date,Signature=ad59ba14c5285f8d553a5a207fa4d59a49dbaf071032c4b1ac8c60bd9288228f'} boto: DEBUG: Response headers: [('x-amzn-requestid', '21b8be91-4621-11e7-977b-1fd2ce2ef3a0'), ('date', 'Wed, 31 May 2017 16:49:36 GMT'), ('content-length', '299'), ('content-type', 'text/xml'), ('connection', 'close')] boto: DEBUG: Sender InvalidIdentityToken Provided Token is not a Login With Amazon token 21b8be91-4621-11e7-977b-1fd2ce2ef3a0 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_customer_gateway (tests.unit.vpc.test_customergateway.TestCreateCustomerGateway) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_customergateway.py", line 73, in test_create_customer_gateway 'ipsec.1', '12.1.2.3', 65534) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 970, in create_customer_gateway return self.get_object('CreateCustomerGateway', params, CustomerGateway) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials239a1b2f-1bed-4073-aca5-63167a8ca996 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateCustomerGateway', 'Type': 'ipsec.1', 'Version': '2014-10-01', 'IpAddress': '12.1.2.3', 'BgpAsn': 65534} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateCustomerGateway&BgpAsn=65534&IpAddress=12.1.2.3&Type=ipsec.1&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164937Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164937Z 20170531/us-east-1/ec2/aws4_request 24ef6d21585002b4f158bb8e97fafd29b898cb92da8627ddd44067e1fabe36b4 boto: DEBUG: Signature: 9c35de0661caf488ce1c676963e88bfd2fe2ff83b1f85b5d51023a760314b43a boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=9c35de0661caf488ce1c676963e88bfd2fe2ff83b1f85b5d51023a760314b43a', 'X-Amz-Date': '20170531T164937Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:37 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials239a1b2f-1bed-4073-aca5-63167a8ca996 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_customer_gateway (tests.unit.vpc.test_customergateway.TestDeleteCustomerGateway) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_customergateway.py", line 104, in test_delete_customer_gateway api_response = self.service_connection.delete_customer_gateway('cgw-b4dc3961') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 988, in delete_customer_gateway return self.get_status('DeleteCustomerGateway', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials7f4c3312-d36d-4400-85b1-4169ad6afd57 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'CustomerGatewayId': 'cgw-b4dc3961', 'Action': 'DeleteCustomerGateway', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DeleteCustomerGateway&CustomerGatewayId=cgw-b4dc3961&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164938Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164938Z 20170531/us-east-1/ec2/aws4_request 7ddc5ba0aec72866336be1e12e5b3158ce4905b3900c72326299866c8ff25a19 boto: DEBUG: Signature: 04e47225731c1d7fe8c0c8817b8de85ababeb4aa427cce5dab3c4dabc5f04ba0 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=04e47225731c1d7fe8c0c8817b8de85ababeb4aa427cce5dab3c4dabc5f04ba0', 'X-Amz-Date': '20170531T164938Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:37 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials7f4c3312-d36d-4400-85b1-4169ad6afd57 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_customer_gateways (tests.unit.vpc.test_customergateway.TestDescribeCustomerGateways) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_customergateway.py", line 34, in test_get_all_customer_gateways ('ip-address', '12.1.2.3')])) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 942, in get_all_customer_gateways [('item', CustomerGateway)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials04f9fa7f-34af-4c2e-8978-a3ffb0c3ac94 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeCustomerGateways', 'Filter.2.Name': 'ip-address', 'Version': '2014-10-01', 'Filter.1.Name': 'state', 'Filter.1.Value.2': 'available', 'Filter.2.Value.1': '12.1.2.3', 'Filter.1.Value.1': 'pending', 'CustomerGatewayId.1': 'cgw-b4dc3961'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeCustomerGateways&CustomerGatewayId.1=cgw-b4dc3961&Filter.1.Name=state&Filter.1.Value.1=pending&Filter.1.Value.2=available&Filter.2.Name=ip-address&Filter.2.Value.1=12.1.2.3&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164938Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164938Z 20170531/us-east-1/ec2/aws4_request 2f0901ab2b6b1e7bcfcfbe27515a6fc5716630505f9a01ad187ab00ffc0418ac boto: DEBUG: Signature: 329d17783b618726149cdf6486d0b4ae7d546142030ebca266b7669521747565 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=329d17783b618726149cdf6486d0b4ae7d546142030ebca266b7669521747565', 'X-Amz-Date': '20170531T164938Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:37 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials04f9fa7f-34af-4c2e-8978-a3ffb0c3ac94 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_associate_dhcp_options (tests.unit.vpc.test_dhcpoptions.TestAssociateDhcpOptions) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_dhcpoptions.py", line 204, in test_associate_dhcp_options 'dopt-7a8b9c2d', 'vpc-1a2b3c4d') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1342, in associate_dhcp_options return self.get_status('AssociateDhcpOptions', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials3a2c0e68-3f25-452f-8468-abc666268f74 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'AssociateDhcpOptions', 'VpcId': 'vpc-1a2b3c4d', 'Version': '2014-10-01', 'DhcpOptionsId': 'dopt-7a8b9c2d'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=AssociateDhcpOptions&DhcpOptionsId=dopt-7a8b9c2d&Version=2014-10-01&VpcId=vpc-1a2b3c4d host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164938Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164938Z 20170531/us-east-1/ec2/aws4_request 292db13f1330a654ffc3e4a74ed53a62e5476821648a2535610856f6587de2b5 boto: DEBUG: Signature: 8c1132a2c51c338649733979955e6396006dceb861feac00c6d4eb09bafb7280 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=8c1132a2c51c338649733979955e6396006dceb861feac00c6d4eb09bafb7280', 'X-Amz-Date': '20170531T164938Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:38 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials3a2c0e68-3f25-452f-8468-abc666268f74 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_dhcp_options (tests.unit.vpc.test_dhcpoptions.TestCreateDhcpOptions) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_dhcpoptions.py", line 138, in test_create_dhcp_options netbios_node_type='2') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1302, in create_dhcp_options return self.get_object('CreateDhcpOptions', params, DhcpOptions) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials347798dd-4f38-4a60-881a-286bc48e9190 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'DhcpConfiguration.4.Value.1': '10.20.20.1', 'DhcpConfiguration.2.Value.1': '10.2.5.1', 'DhcpConfiguration.2.Key': 'domain-name-servers', 'DhcpConfiguration.2.Value.2': '10.2.5.2', 'DhcpConfiguration.4.Key': 'netbios-name-servers', 'DhcpConfiguration.1.Key': 'domain-name', 'Version': '2014-10-01', 'DhcpConfiguration.3.Key': 'ntp-servers', 'DhcpConfiguration.3.Value.1': '10.12.12.1', 'DhcpConfiguration.3.Value.2': '10.12.12.2', 'DhcpConfiguration.1.Value.1': 'example.com', 'Action': 'CreateDhcpOptions', 'DhcpConfiguration.5.Value.1': '2', 'DhcpConfiguration.5.Key': 'netbios-node-type'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateDhcpOptions&DhcpConfiguration.1.Key=domain-name&DhcpConfiguration.1.Value.1=example.com&DhcpConfiguration.2.Key=domain-name-servers&DhcpConfiguration.2.Value.1=10.2.5.1&DhcpConfiguration.2.Value.2=10.2.5.2&DhcpConfiguration.3.Key=ntp-servers&DhcpConfiguration.3.Value.1=10.12.12.1&DhcpConfiguration.3.Value.2=10.12.12.2&DhcpConfiguration.4.Key=netbios-name-servers&DhcpConfiguration.4.Value.1=10.20.20.1&DhcpConfiguration.5.Key=netbios-node-type&DhcpConfiguration.5.Value.1=2&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164939Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164939Z 20170531/us-east-1/ec2/aws4_request 3d3e31bb56ea5bac4769805a5edee27d4fe4af3fc5072c382eb21b443b9339cc boto: DEBUG: Signature: 384dd0711cc1dc6284bb81bc7c028c950242809f69253be86231a9fa2903c769 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=384dd0711cc1dc6284bb81bc7c028c950242809f69253be86231a9fa2903c769', 'X-Amz-Date': '20170531T164939Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:38 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials347798dd-4f38-4a60-881a-286bc48e9190 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_dhcp_options (tests.unit.vpc.test_dhcpoptions.TestDeleteDhcpOptions) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_dhcpoptions.py", line 179, in test_delete_dhcp_options api_response = self.service_connection.delete_dhcp_options('dopt-7a8b9c2d') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1320, in delete_dhcp_options return self.get_status('DeleteDhcpOptions', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials004b0a38-9097-42c4-a9da-7d941544f9df -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DeleteDhcpOptions', 'Version': '2014-10-01', 'DhcpOptionsId': 'dopt-7a8b9c2d'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DeleteDhcpOptions&DhcpOptionsId=dopt-7a8b9c2d&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164939Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164939Z 20170531/us-east-1/ec2/aws4_request 0ce933365d50db5b6d881c1aa3125e95bf9c5fcf48bf0e8b1331e986a159f737 boto: DEBUG: Signature: f196616853ea5bef79828c70bc622d394da425b998db004233f81f2594f7a1a1 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=f196616853ea5bef79828c70bc622d394da425b998db004233f81f2594f7a1a1', 'X-Amz-Date': '20170531T164939Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:39 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials004b0a38-9097-42c4-a9da-7d941544f9df --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_dhcp_options (tests.unit.vpc.test_dhcpoptions.TestDescribeDhcpOptions) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_dhcpoptions.py", line 53, in test_get_all_dhcp_options [('key', 'domain-name')]) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1228, in get_all_dhcp_options [('item', DhcpOptions)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials66e48e58-28c8-41c2-a5ec-2d7e6fd62861 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeDhcpOptions', 'Filter.1.Value.1': 'domain-name', 'Version': '2014-10-01', 'Filter.1.Name': 'key', 'DhcpOptionsId.1': 'dopt-7a8b9c2d'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeDhcpOptions&DhcpOptionsId.1=dopt-7a8b9c2d&Filter.1.Name=key&Filter.1.Value.1=domain-name&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164940Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164940Z 20170531/us-east-1/ec2/aws4_request 15171a94fd1e3fa05d68ecc303a8271cfe362248834ac826ac5a663709006bb3 boto: DEBUG: Signature: 3f138f33be0af73b438f7d238bea1d391be6c4836313bc225792d12a4e89e828 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=3f138f33be0af73b438f7d238bea1d391be6c4836313bc225792d12a4e89e828', 'X-Amz-Date': '20170531T164940Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:39 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials66e48e58-28c8-41c2-a5ec-2d7e6fd62861 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_attach_internet_gateway (tests.unit.vpc.test_internetgateway.TestAttachInternetGateway) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_internetgateway.py", line 115, in test_attach_internet_gateway 'igw-eaad4883', 'vpc-11ad4878') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 873, in attach_internet_gateway return self.get_status('AttachInternetGateway', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials0c0570f8-48d4-4389-8eca-1fd24830ac7d -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'AttachInternetGateway', 'VpcId': 'vpc-11ad4878', 'Version': '2014-10-01', 'InternetGatewayId': 'igw-eaad4883'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=AttachInternetGateway&InternetGatewayId=igw-eaad4883&Version=2014-10-01&VpcId=vpc-11ad4878 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164940Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164940Z 20170531/us-east-1/ec2/aws4_request 87aef5db3383919afd4e42fd0d4d7e472a4a33c10611b23b641988e98394be1d boto: DEBUG: Signature: 484341a2afef98fa877cedf00bd7dcbe547b75ba1f29dad0f8e233913e8c1586 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=484341a2afef98fa877cedf00bd7dcbe547b75ba1f29dad0f8e233913e8c1586', 'X-Amz-Date': '20170531T164940Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:40 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials0c0570f8-48d4-4389-8eca-1fd24830ac7d --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_internet_gateway (tests.unit.vpc.test_internetgateway.TestCreateInternetGateway) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_internetgateway.py", line 66, in test_create_internet_gateway api_response = self.service_connection.create_internet_gateway() File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 830, in create_internet_gateway return self.get_object('CreateInternetGateway', params, InternetGateway) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials468bc2f1-a9e6-495b-bfe2-ca8f767df90d -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateInternetGateway', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateInternetGateway&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164941Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164941Z 20170531/us-east-1/ec2/aws4_request 6d68de32382bd5ba1c33d43fb40c88bebdbd1a060f4572058269bcf98a661100 boto: DEBUG: Signature: e6ab4eea70b8fec60efb8e33f11d0c0ad3c06e8cac0950b71040c0f2a5be3112 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=e6ab4eea70b8fec60efb8e33f11d0c0ad3c06e8cac0950b71040c0f2a5be3112', 'X-Amz-Date': '20170531T164941Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:40 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials468bc2f1-a9e6-495b-bfe2-ca8f767df90d --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_internet_gateway (tests.unit.vpc.test_internetgateway.TestDeleteInternetGateway) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_internetgateway.py", line 90, in test_delete_internet_gateway api_response = self.service_connection.delete_internet_gateway('igw-eaad4883') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 848, in delete_internet_gateway return self.get_status('DeleteInternetGateway', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials235d9ed3-b106-4b45-8f52-273b59e95b14 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DeleteInternetGateway', 'Version': '2014-10-01', 'InternetGatewayId': 'igw-eaad4883'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DeleteInternetGateway&InternetGatewayId=igw-eaad4883&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164941Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164941Z 20170531/us-east-1/ec2/aws4_request 67f73be70a3da0725b660858a1a1819da35dd3f23abcf8b360e66d1ccff1889b boto: DEBUG: Signature: c4c176ac9f1e5c552fd5ed2880a75d55fca000a3e025dcc6cb02d1c2a0929298 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=c4c176ac9f1e5c552fd5ed2880a75d55fca000a3e025dcc6cb02d1c2a0929298', 'X-Amz-Date': '20170531T164941Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:40 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials235d9ed3-b106-4b45-8f52-273b59e95b14 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_describe_internet_gateway (tests.unit.vpc.test_internetgateway.TestDescribeInternetGateway) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_internetgateway.py", line 33, in test_describe_internet_gateway 'igw-eaad4883EXAMPLE', filters=[('attachment.state', ['available', 'pending'])]) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 815, in get_all_internet_gateways [('item', InternetGateway)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsdcd47e46-4415-4c95-b36f-b665011507ce -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Filter.1.Name': 'attachment.state', 'Action': 'DescribeInternetGateways', 'Version': '2014-10-01', 'Filter.1.Value.2': 'pending', 'Filter.1.Value.1': 'available', 'InternetGatewayId.1': 'igw-eaad4883EXAMPLE'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeInternetGateways&Filter.1.Name=attachment.state&Filter.1.Value.1=available&Filter.1.Value.2=pending&InternetGatewayId.1=igw-eaad4883EXAMPLE&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164941Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164941Z 20170531/us-east-1/ec2/aws4_request ecaef10801ed72d940f5d1d09f49d195cda50b9079c2d069c06635f12be055f8 boto: DEBUG: Signature: 81e953103887aa0a7abf388372281039955299dad0bb15543c1eadfbc40771c7 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=81e953103887aa0a7abf388372281039955299dad0bb15543c1eadfbc40771c7', 'X-Amz-Date': '20170531T164941Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:41 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsdcd47e46-4415-4c95-b36f-b665011507ce --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_detach_internet_gateway (tests.unit.vpc.test_internetgateway.TestDetachInternetGateway) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_internetgateway.py", line 141, in test_detach_internet_gateway 'igw-eaad4883', 'vpc-11ad4878') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 898, in detach_internet_gateway return self.get_status('DetachInternetGateway', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsb14c3225-d5c3-4b2e-9e5d-8a1488a77d7b -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DetachInternetGateway', 'VpcId': 'vpc-11ad4878', 'Version': '2014-10-01', 'InternetGatewayId': 'igw-eaad4883'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DetachInternetGateway&InternetGatewayId=igw-eaad4883&Version=2014-10-01&VpcId=vpc-11ad4878 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164942Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164942Z 20170531/us-east-1/ec2/aws4_request 5c5eb5fb612dc60e1f3caf384343c3c795f618ab0c58586e160bddd847ddc462 boto: DEBUG: Signature: 3499ae80ec186492b7e4a972c86e2c01e4dbfa2a6dd2e366f56cbf53ea416a55 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=3499ae80ec186492b7e4a972c86e2c01e4dbfa2a6dd2e366f56cbf53ea416a55', 'X-Amz-Date': '20170531T164942Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:42 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsb14c3225-d5c3-4b2e-9e5d-8a1488a77d7b --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_network_acl (tests.unit.vpc.test_networkacl.DeleteCreateNetworkAcl) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_networkacl.py", line 332, in test_delete_network_acl response = self.service_connection.delete_network_acl('acl-2cb85d45') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 619, in delete_network_acl return self.get_status('DeleteNetworkAcl', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsc88e68d4-e0ca-4db2-bde8-44fc8b59dca5 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DeleteNetworkAcl', 'NetworkAclId': 'acl-2cb85d45', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DeleteNetworkAcl&NetworkAclId=acl-2cb85d45&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164942Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164942Z 20170531/us-east-1/ec2/aws4_request 4334b8119e00d46e5d5ac20fff774a3be0abfc5260f02b03ea298e9f84177f1f boto: DEBUG: Signature: ffbdf8472f758c44f0790d6663625f34cebcd25e5aafbb114728451bc1bb3a25 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=ffbdf8472f758c44f0790d6663625f34cebcd25e5aafbb114728451bc1bb3a25', 'X-Amz-Date': '20170531T164942Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:42 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsc88e68d4-e0ca-4db2-bde8-44fc8b59dca5 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_network_acl (tests.unit.vpc.test_networkacl.TestCreateNetworkAcl) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_networkacl.py", line 308, in test_create_network_acl response = self.service_connection.create_network_acl('vpc-11ad4878') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 606, in create_network_acl return self.get_object('CreateNetworkAcl', params, NetworkAcl) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsd7b2900d-b6c6-48c4-abb9-514da52594b7 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateNetworkAcl', 'VpcId': 'vpc-11ad4878', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateNetworkAcl&Version=2014-10-01&VpcId=vpc-11ad4878 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164942Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164942Z 20170531/us-east-1/ec2/aws4_request 120d6659e3dcba8081840ed1bbc47eb07fe02cb8121283beb26ca1b120fec4c1 boto: DEBUG: Signature: 7cdd384155328ec7e0cbbe85abdec3c8ba385adaaa45b99df524046c9a164c12 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=7cdd384155328ec7e0cbbe85abdec3c8ba385adaaa45b99df524046c9a164c12', 'X-Amz-Date': '20170531T164942Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:42 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsd7b2900d-b6c6-48c4-abb9-514da52594b7 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_network_acl (tests.unit.vpc.test_networkacl.TestCreateNetworkAclEntry) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_networkacl.py", line 358, in test_create_network_acl port_range_from=53, port_range_to=53) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 687, in create_network_acl_entry return self.get_status('CreateNetworkAclEntry', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials9affdd3f-8294-4984-9476-fc658433b2ab -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'NetworkAclId': 'acl-2cb85d45', 'RuleNumber': 110, 'Protocol': 'udp', 'Version': '2014-10-01', 'Action': 'CreateNetworkAclEntry', 'Egress': 'false', 'RuleAction': 'allow', 'PortRange.From': 53, 'PortRange.To': 53, 'CidrBlock': '0.0.0.0/0'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateNetworkAclEntry&CidrBlock=0.0.0.0%2F0&Egress=false&NetworkAclId=acl-2cb85d45&PortRange.From=53&PortRange.To=53&Protocol=udp&RuleAction=allow&RuleNumber=110&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164943Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164943Z 20170531/us-east-1/ec2/aws4_request 9f5793fb5012381387c0638b58833f3e8cee222b65a25c4142eb4350a645f893 boto: DEBUG: Signature: 7a48da59a64008b5a99479de1b02378a8a2df47724b8ca95b2774a761370cce7 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=7a48da59a64008b5a99479de1b02378a8a2df47724b8ca95b2774a761370cce7', 'X-Amz-Date': '20170531T164943Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:43 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials9affdd3f-8294-4984-9476-fc658433b2ab --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_network_acl_icmp (tests.unit.vpc.test_networkacl.TestCreateNetworkAclEntry) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_networkacl.py", line 378, in test_create_network_acl_icmp icmp_code=-1, icmp_type=8) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 687, in create_network_acl_entry return self.get_status('CreateNetworkAclEntry', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialse63f3e55-0b70-4a37-b3bc-17fd166ce6ca -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'NetworkAclId': 'acl-2cb85d45', 'RuleNumber': 110, 'Protocol': 'udp', 'Version': '2014-10-01', 'Icmp.Type': 8, 'Egress': 'true', 'RuleAction': 'allow', 'Action': 'CreateNetworkAclEntry', 'Icmp.Code': -1, 'CidrBlock': '0.0.0.0/0'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateNetworkAclEntry&CidrBlock=0.0.0.0%2F0&Egress=true&Icmp.Code=-1&Icmp.Type=8&NetworkAclId=acl-2cb85d45&Protocol=udp&RuleAction=allow&RuleNumber=110&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164943Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164943Z 20170531/us-east-1/ec2/aws4_request 7b6eba1c085a5e986ad8ea774c305b143e97bbfbf92e9e7bf73e2304aad51791 boto: DEBUG: Signature: fbd38cea878c5f22d6a8a4a3ce82364e73e40911967b4e5999892a49eb30b1f7 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=fbd38cea878c5f22d6a8a4a3ce82364e73e40911967b4e5999892a49eb30b1f7', 'X-Amz-Date': '20170531T164943Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:42 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialse63f3e55-0b70-4a37-b3bc-17fd166ce6ca --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_network_acl (tests.unit.vpc.test_networkacl.TestDeleteNetworkAclEntry) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_networkacl.py", line 462, in test_delete_network_acl egress=False) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 784, in delete_network_acl_entry return self.get_status('DeleteNetworkAclEntry', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials484cf941-e9a3-4284-9ea1-158e34609dd1 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DeleteNetworkAclEntry', 'NetworkAclId': 'acl-2cb85d45', 'RuleNumber': 100, 'Version': '2014-10-01', 'Egress': 'false'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DeleteNetworkAclEntry&Egress=false&NetworkAclId=acl-2cb85d45&RuleNumber=100&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164943Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164943Z 20170531/us-east-1/ec2/aws4_request 731adcd9292a924d3bc831feae816b5584853395cd69a8c840ae6e66c835e016 boto: DEBUG: Signature: 2299ad3229e92a05df5ab05e20b6c5a9d28319babf61d63a40debd3d1fa5c79a boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=2299ad3229e92a05df5ab05e20b6c5a9d28319babf61d63a40debd3d1fa5c79a', 'X-Amz-Date': '20170531T164943Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:43 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials484cf941-e9a3-4284-9ea1-158e34609dd1 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_network_acls (tests.unit.vpc.test_networkacl.TestDescribeNetworkAcls) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_networkacl.py", line 127, in test_get_all_network_acls [('vpc-id', 'vpc-5266953b')]) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 547, in get_all_network_acls [('item', NetworkAcl)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials6062c4e2-bdfa-48a8-8831-30654c444ee7 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'NetworkAclId.1': 'acl-5566953c', 'Filter.1.Name': 'vpc-id', 'NetworkAclId.2': 'acl-5d659634', 'Version': '2014-10-01', 'Action': 'DescribeNetworkAcls', 'Filter.1.Value.1': 'vpc-5266953b'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeNetworkAcls&Filter.1.Name=vpc-id&Filter.1.Value.1=vpc-5266953b&NetworkAclId.1=acl-5566953c&NetworkAclId.2=acl-5d659634&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164944Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164944Z 20170531/us-east-1/ec2/aws4_request 19ef00926ba785a51faf546cab919a3b0e5d8d38c7959bd33417f84e8d5d08de boto: DEBUG: Signature: 3815cf73b37bcd0fd0e202b16e2bf3ebfdf734432b25826d07c816e86ccaadbd boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=3815cf73b37bcd0fd0e202b16e2bf3ebfdf734432b25826d07c816e86ccaadbd', 'X-Amz-Date': '20170531T164944Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:44 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials6062c4e2-bdfa-48a8-8831-30654c444ee7 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_network_acl_associations (tests.unit.vpc.test_networkacl.TestGetNetworkAclAssociations) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_networkacl.py", line 515, in test_get_network_acl_associations api_response = self.service_connection.get_all_network_acls() File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 547, in get_all_network_acls [('item', NetworkAcl)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials10175c09-f7e6-4e4d-b1b4-c2b062742fcd -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeNetworkAcls', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeNetworkAcls&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164944Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164944Z 20170531/us-east-1/ec2/aws4_request 0cc953bec303d840393e50a8cea2ff665d3dae7740af79e43302851c429ab335 boto: DEBUG: Signature: 7da22a4aea3442d98d9051603c11603743b80510250a6ec62b303cf33efdc41e boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=7da22a4aea3442d98d9051603c11603743b80510250a6ec62b303cf33efdc41e', 'X-Amz-Date': '20170531T164944Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:44 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials10175c09-f7e6-4e4d-b1b4-c2b062742fcd --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_associate_network_acl (tests.unit.vpc.test_networkacl.TestReplaceNetworkAclAssociation) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_networkacl.py", line 242, in test_associate_network_acl response = self.service_connection.associate_network_acl('acl-5fb85d36', 'subnet-ff669596') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 563, in associate_network_acl acl = self.get_all_network_acls(filters=[('association.subnet-id', subnet_id)])[0] File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 547, in get_all_network_acls [('item', NetworkAcl)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials706c092f-0090-489d-acef-a0d39d9c9a34 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeNetworkAcls', 'Filter.1.Value.1': 'subnet-ff669596', 'Version': '2014-10-01', 'Filter.1.Name': 'association.subnet-id'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeNetworkAcls&Filter.1.Name=association.subnet-id&Filter.1.Value.1=subnet-ff669596&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164945Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164945Z 20170531/us-east-1/ec2/aws4_request 95749c195c5969465efc6ef53615d11df43380b3e674b8bca34cf3d1bcf1843e boto: DEBUG: Signature: 10154613a3e7fd1bb92115db34c131185ec166a38cd1b1a7eea734fb771b4311 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=10154613a3e7fd1bb92115db34c131185ec166a38cd1b1a7eea734fb771b4311', 'X-Amz-Date': '20170531T164945Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:45 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials706c092f-0090-489d-acef-a0d39d9c9a34 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_disassociate_network_acl (tests.unit.vpc.test_networkacl.TestReplaceNetworkAclAssociation) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_networkacl.py", line 260, in test_disassociate_network_acl 'vpc-5266953b') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 590, in disassociate_network_acl acls = self.get_all_network_acls(filters=[('vpc-id', vpc_id), ('default', 'true')]) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 547, in get_all_network_acls [('item', NetworkAcl)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials6d272332-9e32-4751-9fc8-5429b125caee -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Filter.1.Name': 'default', 'Filter.2.Value.1': 'vpc-5266953b', 'Action': 'DescribeNetworkAcls', 'Version': '2014-10-01', 'Filter.2.Name': 'vpc-id', 'Filter.1.Value.1': 'true'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeNetworkAcls&Filter.1.Name=default&Filter.1.Value.1=true&Filter.2.Name=vpc-id&Filter.2.Value.1=vpc-5266953b&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164945Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164945Z 20170531/us-east-1/ec2/aws4_request cebbd6f562367b6b3eba436a6c443a7064a885cbf67d09aa3bb85d48a60d8178 boto: DEBUG: Signature: 8803d7f467137a3665ac6ba4032fca60608e3221bfa84eb62d17e0ccd669e715 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=8803d7f467137a3665ac6ba4032fca60608e3221bfa84eb62d17e0ccd669e715', 'X-Amz-Date': '20170531T164945Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:45 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials6d272332-9e32-4751-9fc8-5429b125caee --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_replace_network_acl (tests.unit.vpc.test_networkacl.TestReplaceNetworkAclEntry) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_networkacl.py", line 411, in test_replace_network_acl port_range_from=139, port_range_to=139) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 755, in replace_network_acl_entry return self.get_status('ReplaceNetworkAclEntry', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials29759567-38bf-4c01-b590-e2fe6cfe6a5d -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'NetworkAclId': 'acl-2cb85d45', 'RuleNumber': 110, 'Protocol': 'tcp', 'Version': '2014-10-01', 'Action': 'ReplaceNetworkAclEntry', 'Egress': 'false', 'RuleAction': 'deny', 'PortRange.From': 139, 'PortRange.To': 139, 'CidrBlock': '0.0.0.0/0'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=ReplaceNetworkAclEntry&CidrBlock=0.0.0.0%2F0&Egress=false&NetworkAclId=acl-2cb85d45&PortRange.From=139&PortRange.To=139&Protocol=tcp&RuleAction=deny&RuleNumber=110&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164945Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164945Z 20170531/us-east-1/ec2/aws4_request 26def909fe41fda339f25d05a599f7a834ece6701992f24b2c1a58658beacb65 boto: DEBUG: Signature: 524bb4e49f8dd6a22677d04479e07d8ee3d0b98f0219279bb7c1b204f45bb4d1 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=524bb4e49f8dd6a22677d04479e07d8ee3d0b98f0219279bb7c1b204f45bb4d1', 'X-Amz-Date': '20170531T164945Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:45 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials29759567-38bf-4c01-b590-e2fe6cfe6a5d --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_replace_network_acl_icmp (tests.unit.vpc.test_networkacl.TestReplaceNetworkAclEntry) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_networkacl.py", line 431, in test_replace_network_acl_icmp icmp_code=-1, icmp_type=8) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 755, in replace_network_acl_entry return self.get_status('ReplaceNetworkAclEntry', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials7d88872b-381c-4772-aa43-4a17d601c216 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'NetworkAclId': 'acl-2cb85d45', 'Icmp.Type': 8, 'RuleNumber': 110, 'Protocol': 'tcp', 'Version': '2014-10-01', 'RuleAction': 'deny', 'Action': 'ReplaceNetworkAclEntry', 'Icmp.Code': -1, 'CidrBlock': '0.0.0.0/0'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=ReplaceNetworkAclEntry&CidrBlock=0.0.0.0%2F0&Icmp.Code=-1&Icmp.Type=8&NetworkAclId=acl-2cb85d45&Protocol=tcp&RuleAction=deny&RuleNumber=110&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164946Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164946Z 20170531/us-east-1/ec2/aws4_request 1c97ec8fb08ca1a7b86389c88905f51708b5395b9a93865fa5fe4bfc9a9d71d4 boto: DEBUG: Signature: e723e19287114daf11329c1aef342fe650ca3cb311b05cd450b00e0c0bb2488e boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=e723e19287114daf11329c1aef342fe650ca3cb311b05cd450b00e0c0bb2488e', 'X-Amz-Date': '20170531T164946Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:45 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials7d88872b-381c-4772-aa43-4a17d601c216 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_associate_route_table (tests.unit.vpc.test_routetable.TestAssociateRouteTable) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_routetable.py", line 144, in test_associate_route_table 'rtb-e4ad488d', 'subnet-15ad487c') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 250, in associate_route_table result = self.get_object('AssociateRouteTable', params, ResultSet) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsdadb5c88-59e2-4d4d-b283-bafafbba3559 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'SubnetId': 'subnet-15ad487c', 'Action': 'AssociateRouteTable', 'RouteTableId': 'rtb-e4ad488d', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=AssociateRouteTable&RouteTableId=rtb-e4ad488d&SubnetId=subnet-15ad487c&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164946Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164946Z 20170531/us-east-1/ec2/aws4_request a88d3c8367d11c20d27b49db89f06fb9720c5c004bbf724aef3d079d1190690e boto: DEBUG: Signature: 9d262d6dad0d3454a794235db7d01c62e4b59f114428d8432e886380c432961b boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=9d262d6dad0d3454a794235db7d01c62e4b59f114428d8432e886380c432961b', 'X-Amz-Date': '20170531T164946Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:46 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsdadb5c88-59e2-4d4d-b283-bafafbba3559 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_route_gateway (tests.unit.vpc.test_routetable.TestCreateRoute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_routetable.py", line 298, in test_create_route_gateway 'rtb-e4ad488d', '0.0.0.0/0', gateway_id='igw-eaad4883') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 442, in create_route return self.get_status('CreateRoute', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsafea3d5a-a58b-4ffc-8700-800eb519bff3 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'GatewayId': 'igw-eaad4883', 'DestinationCidrBlock': '0.0.0.0/0', 'RouteTableId': 'rtb-e4ad488d', 'Version': '2014-10-01', 'Action': 'CreateRoute'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateRoute&DestinationCidrBlock=0.0.0.0%2F0&GatewayId=igw-eaad4883&RouteTableId=rtb-e4ad488d&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164946Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164946Z 20170531/us-east-1/ec2/aws4_request be248ee30f95592f29e6b11801ca78d202ef210193d0a6bdec971bc00aa03201 boto: DEBUG: Signature: 19d8d832c4782c292b20a887433dd928bcfda9136b01230d9ca065394d77d0e3 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=19d8d832c4782c292b20a887433dd928bcfda9136b01230d9ca065394d77d0e3', 'X-Amz-Date': '20170531T164946Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:46 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsafea3d5a-a58b-4ffc-8700-800eb519bff3 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_route_instance (tests.unit.vpc.test_routetable.TestCreateRoute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_routetable.py", line 312, in test_create_route_instance 'rtb-g8ff4ea2', '0.0.0.0/0', instance_id='i-1a2b3c4d') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 442, in create_route return self.get_status('CreateRoute', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials7ecf62d7-629f-4e6c-a011-a912b19dc359 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'InstanceId': 'i-1a2b3c4d', 'DestinationCidrBlock': '0.0.0.0/0', 'RouteTableId': 'rtb-g8ff4ea2', 'Version': '2014-10-01', 'Action': 'CreateRoute'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateRoute&DestinationCidrBlock=0.0.0.0%2F0&InstanceId=i-1a2b3c4d&RouteTableId=rtb-g8ff4ea2&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164947Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164947Z 20170531/us-east-1/ec2/aws4_request a40299ae4c584e39306d95ccd7c62818b74b3b12398b6e95131095d0280ac010 boto: DEBUG: Signature: 4484e2457c402f9c3527bb5de79bb068bfec0f3f882de1936407bc99c6586f71 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=4484e2457c402f9c3527bb5de79bb068bfec0f3f882de1936407bc99c6586f71', 'X-Amz-Date': '20170531T164947Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:47 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials7ecf62d7-629f-4e6c-a011-a912b19dc359 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_route_interface (tests.unit.vpc.test_routetable.TestCreateRoute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_routetable.py", line 326, in test_create_route_interface 'rtb-g8ff4ea2', '0.0.0.0/0', interface_id='eni-1a2b3c4d') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 442, in create_route return self.get_status('CreateRoute', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsdbd6e1d7-b041-484b-b86e-c888597049e1 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateRoute', 'DestinationCidrBlock': '0.0.0.0/0', 'RouteTableId': 'rtb-g8ff4ea2', 'Version': '2014-10-01', 'NetworkInterfaceId': 'eni-1a2b3c4d'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateRoute&DestinationCidrBlock=0.0.0.0%2F0&NetworkInterfaceId=eni-1a2b3c4d&RouteTableId=rtb-g8ff4ea2&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164947Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164947Z 20170531/us-east-1/ec2/aws4_request cfc26d7815a0efd480d144355e7d9d60731c799a20c95dcf369e878d5f15cfb3 boto: DEBUG: Signature: 909becd13b762da83feab08caa0178f8a4085d53f706e7b46a9c65124e1c98d7 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=909becd13b762da83feab08caa0178f8a4085d53f706e7b46a9c65124e1c98d7', 'X-Amz-Date': '20170531T164947Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:47 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsdbd6e1d7-b041-484b-b86e-c888597049e1 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_route_vpc_peering_connection (tests.unit.vpc.test_routetable.TestCreateRoute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_routetable.py", line 340, in test_create_route_vpc_peering_connection 'rtb-g8ff4ea2', '0.0.0.0/0', vpc_peering_connection_id='pcx-1a2b3c4d') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 442, in create_route return self.get_status('CreateRoute', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials0d0057ab-e599-4826-b3e0-84c49b1f366c -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateRoute', 'DestinationCidrBlock': '0.0.0.0/0', 'RouteTableId': 'rtb-g8ff4ea2', 'Version': '2014-10-01', 'VpcPeeringConnectionId': 'pcx-1a2b3c4d'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateRoute&DestinationCidrBlock=0.0.0.0%2F0&RouteTableId=rtb-g8ff4ea2&Version=2014-10-01&VpcPeeringConnectionId=pcx-1a2b3c4d host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164948Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164948Z 20170531/us-east-1/ec2/aws4_request f6f4b61d3a26a56060b5bccb9bedc2de170202eea43e0df54d445cd27262e977 boto: DEBUG: Signature: 19c4ad95ba9e53ab97e6120e2f370f80cdeadfd9e473eb6f43b7daa8dafad3e2 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=19c4ad95ba9e53ab97e6120e2f370f80cdeadfd9e473eb6f43b7daa8dafad3e2', 'X-Amz-Date': '20170531T164948Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:47 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials0d0057ab-e599-4826-b3e0-84c49b1f366c --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_route_table (tests.unit.vpc.test_routetable.TestCreateRouteTable) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_routetable.py", line 205, in test_create_route_table api_response = self.service_connection.create_route_table('vpc-11ad4878') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 289, in create_route_table return self.get_object('CreateRouteTable', params, RouteTable) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsbe855c24-c63f-4de3-9a73-c4ae35ddc952 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateRouteTable', 'VpcId': 'vpc-11ad4878', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateRouteTable&Version=2014-10-01&VpcId=vpc-11ad4878 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164948Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164948Z 20170531/us-east-1/ec2/aws4_request 7951d311a6bbab5075a2debfb8a3d1e4ad7fd9f945b56d3af86ad49fc3b1c840 boto: DEBUG: Signature: 328854b98e83849428697671c4fd7fa79f71d61d247a8ca2de0054f5bf2bd233 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=328854b98e83849428697671c4fd7fa79f71d61d247a8ca2de0054f5bf2bd233', 'X-Amz-Date': '20170531T164948Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:47 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsbe855c24-c63f-4de3-9a73-c4ae35ddc952 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_route (tests.unit.vpc.test_routetable.TestDeleteRoute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_routetable.py", line 435, in test_delete_route api_response = self.service_connection.delete_route('rtb-e4ad488d', '172.16.1.0/24') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 519, in delete_route return self.get_status('DeleteRoute', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials22a92efc-3aa8-42b3-8c65-94960e065ef3 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DeleteRoute', 'DestinationCidrBlock': '172.16.1.0/24', 'RouteTableId': 'rtb-e4ad488d', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DeleteRoute&DestinationCidrBlock=172.16.1.0%2F24&RouteTableId=rtb-e4ad488d&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164948Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164948Z 20170531/us-east-1/ec2/aws4_request 8902070b90978f2146ed84bc37c2da17c6e7323f3eb294897e8db7d535fe2841 boto: DEBUG: Signature: 608ef2694c72e522824c33f313326e48cc71c323bd85140adb35e7dd4201e450 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=608ef2694c72e522824c33f313326e48cc71c323bd85140adb35e7dd4201e450', 'X-Amz-Date': '20170531T164948Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:48 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials22a92efc-3aa8-42b3-8c65-94960e065ef3 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_route_table (tests.unit.vpc.test_routetable.TestDeleteRouteTable) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_routetable.py", line 234, in test_delete_route_table api_response = self.service_connection.delete_route_table('rtb-e4ad488d') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 307, in delete_route_table return self.get_status('DeleteRouteTable', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsabb048ce-f0be-498b-bb19-89f19281376b -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DeleteRouteTable', 'RouteTableId': 'rtb-e4ad488d', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DeleteRouteTable&RouteTableId=rtb-e4ad488d&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164949Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164949Z 20170531/us-east-1/ec2/aws4_request 1b82638b94efb3989d579521b97e261ff2ebe73412b10cc6acec52542df727c5 boto: DEBUG: Signature: afc7ac128f472ec3a0930f0c189f1dede5d41c40336d0f6f7e3aee9958e9fabf boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=afc7ac128f472ec3a0930f0c189f1dede5d41c40336d0f6f7e3aee9958e9fabf', 'X-Amz-Date': '20170531T164949Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:49 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsabb048ce-f0be-498b-bb19-89f19281376b --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_route_tables (tests.unit.vpc.test_routetable.TestDescribeRouteTables) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_routetable.py", line 81, in test_get_all_route_tables ['rtb-13ad487a', 'rtb-f9ad4890'], filters=[('route.state', 'active')]) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 226, in get_all_route_tables [('item', RouteTable)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsed234e03-c35d-46ec-8eb3-0692df558fee -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Version': '2014-10-01', 'Filter.1.Name': 'route.state', 'RouteTableId.2': 'rtb-f9ad4890', 'RouteTableId.1': 'rtb-13ad487a', 'Action': 'DescribeRouteTables', 'Filter.1.Value.1': 'active'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeRouteTables&Filter.1.Name=route.state&Filter.1.Value.1=active&RouteTableId.1=rtb-13ad487a&RouteTableId.2=rtb-f9ad4890&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164949Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164949Z 20170531/us-east-1/ec2/aws4_request 2e7b5837145d122b79655d126a50c4a634ed77c1ac5ce835a2ff58c9089753ee boto: DEBUG: Signature: 0a48800a4ec9d1908b5d3789faf5344aafffa3e4aeaefbe8ea0352e5f89ee50f boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=0a48800a4ec9d1908b5d3789faf5344aafffa3e4aeaefbe8ea0352e5f89ee50f', 'X-Amz-Date': '20170531T164949Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:49 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsed234e03-c35d-46ec-8eb3-0692df558fee --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_disassociate_route_table (tests.unit.vpc.test_routetable.TestDisassociateRouteTable) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_routetable.py", line 169, in test_disassociate_route_table api_response = self.service_connection.disassociate_route_table('rtbassoc-fdad4894') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 271, in disassociate_route_table return self.get_status('DisassociateRouteTable', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials8cd6742f-c33d-428b-b7ad-c5aa711efc60 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DisassociateRouteTable', 'AssociationId': 'rtbassoc-fdad4894', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DisassociateRouteTable&AssociationId=rtbassoc-fdad4894&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164949Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164949Z 20170531/us-east-1/ec2/aws4_request 0a09f30baa36283e4aad7ba17d171739519a2ab67b9bd1c0b3b8c37ebdd809bb boto: DEBUG: Signature: 77aa8b9f74d0ee72c62d0f08d793bfac417b15cc9a4aed61de11c5f6394f8bb4 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=77aa8b9f74d0ee72c62d0f08d793bfac417b15cc9a4aed61de11c5f6394f8bb4', 'X-Amz-Date': '20170531T164949Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:49 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials8cd6742f-c33d-428b-b7ad-c5aa711efc60 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_replace_route_gateway (tests.unit.vpc.test_routetable.TestReplaceRoute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_routetable.py", line 367, in test_replace_route_gateway 'rtb-e4ad488d', '0.0.0.0/0', gateway_id='igw-eaad4883') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 493, in replace_route return self.get_status('ReplaceRoute', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsbd785f14-0d33-4632-b30f-96c4495208d7 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'GatewayId': 'igw-eaad4883', 'DestinationCidrBlock': '0.0.0.0/0', 'RouteTableId': 'rtb-e4ad488d', 'Version': '2014-10-01', 'Action': 'ReplaceRoute'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=ReplaceRoute&DestinationCidrBlock=0.0.0.0%2F0&GatewayId=igw-eaad4883&RouteTableId=rtb-e4ad488d&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164950Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164950Z 20170531/us-east-1/ec2/aws4_request 6f5f6861da1b05c8409c4b896e1029fcdc6ddbf8dd8bec72d3457c95c767cacc boto: DEBUG: Signature: c1f8106bca0c32e93e1612544b9b21c78fd7d811a83dd12dc6fc6c3708f41e9a boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=c1f8106bca0c32e93e1612544b9b21c78fd7d811a83dd12dc6fc6c3708f41e9a', 'X-Amz-Date': '20170531T164950Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:50 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsbd785f14-0d33-4632-b30f-96c4495208d7 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_replace_route_instance (tests.unit.vpc.test_routetable.TestReplaceRoute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_routetable.py", line 381, in test_replace_route_instance 'rtb-g8ff4ea2', '0.0.0.0/0', instance_id='i-1a2b3c4d') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 493, in replace_route return self.get_status('ReplaceRoute', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials197c8879-11c9-4cbb-a9a4-07fd6e024d8e -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'InstanceId': 'i-1a2b3c4d', 'DestinationCidrBlock': '0.0.0.0/0', 'RouteTableId': 'rtb-g8ff4ea2', 'Version': '2014-10-01', 'Action': 'ReplaceRoute'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=ReplaceRoute&DestinationCidrBlock=0.0.0.0%2F0&InstanceId=i-1a2b3c4d&RouteTableId=rtb-g8ff4ea2&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164950Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164950Z 20170531/us-east-1/ec2/aws4_request 8a20a85795cfa395b1df53ff561eeeb72203f695854216debdff180053b29d6e boto: DEBUG: Signature: a35e56f736124280c8d3cd39efcd979099a57c4d28d459a2fee73a676400cdf0 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=a35e56f736124280c8d3cd39efcd979099a57c4d28d459a2fee73a676400cdf0', 'X-Amz-Date': '20170531T164950Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:50 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials197c8879-11c9-4cbb-a9a4-07fd6e024d8e --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_replace_route_interface (tests.unit.vpc.test_routetable.TestReplaceRoute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_routetable.py", line 395, in test_replace_route_interface 'rtb-g8ff4ea2', '0.0.0.0/0', interface_id='eni-1a2b3c4d') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 493, in replace_route return self.get_status('ReplaceRoute', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials37cbf364-0444-4f4f-a9be-9af1fcbb47da -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ReplaceRoute', 'DestinationCidrBlock': '0.0.0.0/0', 'RouteTableId': 'rtb-g8ff4ea2', 'Version': '2014-10-01', 'NetworkInterfaceId': 'eni-1a2b3c4d'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=ReplaceRoute&DestinationCidrBlock=0.0.0.0%2F0&NetworkInterfaceId=eni-1a2b3c4d&RouteTableId=rtb-g8ff4ea2&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164950Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164950Z 20170531/us-east-1/ec2/aws4_request 86baaff5b4059c70ab8d66776ae4fe4d120a169a88f703f2d04ed719ec050c53 boto: DEBUG: Signature: 1904c4760d844e814881f327742c86fdb67997fdcd9a9a5a0d41add8755336cc boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=1904c4760d844e814881f327742c86fdb67997fdcd9a9a5a0d41add8755336cc', 'X-Amz-Date': '20170531T164950Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:50 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials37cbf364-0444-4f4f-a9be-9af1fcbb47da --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_replace_route_vpc_peering_connection (tests.unit.vpc.test_routetable.TestReplaceRoute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_routetable.py", line 409, in test_replace_route_vpc_peering_connection 'rtb-g8ff4ea2', '0.0.0.0/0', vpc_peering_connection_id='pcx-1a2b3c4d') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 493, in replace_route return self.get_status('ReplaceRoute', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials749a9103-2526-4899-8fc4-2c919a9735ea -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ReplaceRoute', 'DestinationCidrBlock': '0.0.0.0/0', 'RouteTableId': 'rtb-g8ff4ea2', 'Version': '2014-10-01', 'VpcPeeringConnectionId': 'pcx-1a2b3c4d'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=ReplaceRoute&DestinationCidrBlock=0.0.0.0%2F0&RouteTableId=rtb-g8ff4ea2&Version=2014-10-01&VpcPeeringConnectionId=pcx-1a2b3c4d host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164951Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164951Z 20170531/us-east-1/ec2/aws4_request efdde72f67f7b8584fd594a2b449b3e987b879918f033eb3a08da06d101eb46c boto: DEBUG: Signature: 5e00414ec885896d479b412f58250bfd9f5223cfbbdd4a9f6d3b2f2e866bf07c boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=5e00414ec885896d479b412f58250bfd9f5223cfbbdd4a9f6d3b2f2e866bf07c', 'X-Amz-Date': '20170531T164951Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:50 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials749a9103-2526-4899-8fc4-2c919a9735ea --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_replace_route_table_assocation (tests.unit.vpc.test_routetable.TestReplaceRouteTableAssociation) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_routetable.py", line 259, in test_replace_route_table_assocation 'rtbassoc-faad4893', 'rtb-f9ad4890') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 364, in replace_route_table_assocation association_id, route_table_id, dry_run=dry_run).status File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 335, in _replace_route_table_association ResultSet) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsfe25b270-e089-4c3a-a4b2-b8aed0fa776a -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ReplaceRouteTableAssociation', 'RouteTableId': 'rtb-f9ad4890', 'AssociationId': 'rtbassoc-faad4893', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=ReplaceRouteTableAssociation&AssociationId=rtbassoc-faad4893&RouteTableId=rtb-f9ad4890&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164951Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164951Z 20170531/us-east-1/ec2/aws4_request 2fffd8dbe7fdec5d4cfe68597c3a0c3fb4cbc309f2c6dbc5b0c843866a355c0d boto: DEBUG: Signature: ac994ee7b37e9a9b7ffded5aa550d04e0e121079dc0c9122c4c7385aec1eb1d6 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=ac994ee7b37e9a9b7ffded5aa550d04e0e121079dc0c9122c4c7385aec1eb1d6', 'X-Amz-Date': '20170531T164951Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:51 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsfe25b270-e089-4c3a-a4b2-b8aed0fa776a --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_replace_route_table_association_with_assoc (tests.unit.vpc.test_routetable.TestReplaceRouteTableAssociation) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_routetable.py", line 272, in test_replace_route_table_association_with_assoc 'rtbassoc-faad4893', 'rtb-f9ad4890') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 389, in replace_route_table_association_with_assoc association_id, route_table_id, dry_run=dry_run).newAssociationId File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 335, in _replace_route_table_association ResultSet) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsd6e51ab4-3eeb-4f05-b20b-eb4525f334e1 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ReplaceRouteTableAssociation', 'RouteTableId': 'rtb-f9ad4890', 'AssociationId': 'rtbassoc-faad4893', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=ReplaceRouteTableAssociation&AssociationId=rtbassoc-faad4893&RouteTableId=rtb-f9ad4890&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164952Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164952Z 20170531/us-east-1/ec2/aws4_request c0869a3120dbc43799c039bfb3a88dc5982c46f1e94e4f2a64ad45a5adda22a8 boto: DEBUG: Signature: ed1cccefd9adeba50f784b01b699adb7b037d41427868f074570f6c61c5f3d2d boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=ed1cccefd9adeba50f784b01b699adb7b037d41427868f074570f6c61c5f3d2d', 'X-Amz-Date': '20170531T164952Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:51 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsd6e51ab4-3eeb-4f05-b20b-eb4525f334e1 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_subnet (tests.unit.vpc.test_subnet.TestCreateSubnet) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_subnet.py", line 90, in test_create_subnet 'vpc-1a2b3c4d', '10.0.1.0/24', 'us-east-1a') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1181, in create_subnet return self.get_object('CreateSubnet', params, Subnet) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsc56d4c58-ca41-4fa6-a8ef-0c2c96ec2e39 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateSubnet', 'VpcId': 'vpc-1a2b3c4d', 'CidrBlock': '10.0.1.0/24', 'Version': '2014-10-01', 'AvailabilityZone': 'us-east-1a'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateSubnet&AvailabilityZone=us-east-1a&CidrBlock=10.0.1.0%2F24&Version=2014-10-01&VpcId=vpc-1a2b3c4d host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164952Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164952Z 20170531/us-east-1/ec2/aws4_request 9215ef5367d793025dbe0d9b249a326d8f92ebc824e81322bb0115b7d36442d6 boto: DEBUG: Signature: 83bdddeec2079a6da0539faaeeb1331f40d245efcfee8aa7fc21faabf05fa3c3 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=83bdddeec2079a6da0539faaeeb1331f40d245efcfee8aa7fc21faabf05fa3c3', 'X-Amz-Date': '20170531T164952Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:52 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsc56d4c58-ca41-4fa6-a8ef-0c2c96ec2e39 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_subnet (tests.unit.vpc.test_subnet.TestDeleteSubnet) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_subnet.py", line 122, in test_delete_subnet api_response = self.service_connection.delete_subnet('subnet-9d4a7b6c') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1199, in delete_subnet return self.get_status('DeleteSubnet', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials89f99ba3-da30-4025-999c-16fe458c3e50 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'SubnetId': 'subnet-9d4a7b6c', 'Action': 'DeleteSubnet', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DeleteSubnet&SubnetId=subnet-9d4a7b6c&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164952Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164952Z 20170531/us-east-1/ec2/aws4_request 85143645f8961ead30d07ff030826d8b53a5162ea2744514ef848eed504892dd boto: DEBUG: Signature: a3fbb7c8b8f4667ef6401e2b7fe1484aba80889f071c7a68bf3422cebe9d9ba4 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=a3fbb7c8b8f4667ef6401e2b7fe1484aba80889f071c7a68bf3422cebe9d9ba4', 'X-Amz-Date': '20170531T164952Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:52 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials89f99ba3-da30-4025-999c-16fe458c3e50 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_subnets (tests.unit.vpc.test_subnet.TestDescribeSubnets) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_subnet.py", line 48, in test_get_all_subnets ('vpc-id', ['subnet-9d4a7b6c', 'subnet-6e7f829e'])])) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1153, in get_all_subnets return self.get_list('DescribeSubnets', params, [('item', Subnet)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials96b77bad-701e-4239-b98e-61b82b10180e -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeSubnets', 'SubnetId.1': 'subnet-9d4a7b6c', 'SubnetId.2': 'subnet-6e7f829e', 'Filter.1.Value.1': 'available', 'Version': '2014-10-01', 'Filter.1.Name': 'state', 'Filter.2.Value.1': 'subnet-9d4a7b6c', 'Filter.2.Value.2': 'subnet-6e7f829e', 'Filter.2.Name': 'vpc-id'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeSubnets&Filter.1.Name=state&Filter.1.Value.1=available&Filter.2.Name=vpc-id&Filter.2.Value.1=subnet-9d4a7b6c&Filter.2.Value.2=subnet-6e7f829e&SubnetId.1=subnet-9d4a7b6c&SubnetId.2=subnet-6e7f829e&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164953Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164953Z 20170531/us-east-1/ec2/aws4_request 2c7dfcfb2899bf94b3852b88d26a3ecec83ec72592e43a225096dc254c9be312 boto: DEBUG: Signature: 9661792f398f50c24f65c2cfdc919df63b7e10c30fc4ef3ed51e548f402e24f2 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=9661792f398f50c24f65c2cfdc919df63b7e10c30fc4ef3ed51e548f402e24f2', 'X-Amz-Date': '20170531T164953Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:52 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials96b77bad-701e-4239-b98e-61b82b10180e --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_attach_classic_link_instance_object_groups (tests.unit.vpc.test_vpc.TestAttachClassicLinkVpc) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc.py", line 250, in test_attach_classic_link_instance_object_groups dry_run=True File "/usr/lib/python2.7/dist-packages/boto/vpc/vpc.py", line 181, in attach_classic_instance dry_run=dry_run File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1762, in attach_classic_link_vpc return self.get_status('AttachClassicLinkVpc', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials95f1c6c6-9fc8-4ba8-bf00-8a132f8f9683 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'VpcId': 'myid', 'DryRun': 'true', 'SecurityGroupId.2': 'sg-bar', 'SecurityGroupId.1': 'sg-foo', 'InstanceId': 'my_instance_id', 'Version': '2014-10-01', 'Action': 'AttachClassicLinkVpc'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=AttachClassicLinkVpc&DryRun=true&InstanceId=my_instance_id&SecurityGroupId.1=sg-foo&SecurityGroupId.2=sg-bar&Version=2014-10-01&VpcId=myid host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164953Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164953Z 20170531/us-east-1/ec2/aws4_request 213214ea608c3c9cd36a2fc1affff0d3889729d8b9112516bef05798a5ffe5a4 boto: DEBUG: Signature: 81ed36835a08158dc609c6b75e12263b091a3698adf2a1869c3e87dbdc9f532c boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=81ed36835a08158dc609c6b75e12263b091a3698adf2a1869c3e87dbdc9f532c', 'X-Amz-Date': '20170531T164953Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:53 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials95f1c6c6-9fc8-4ba8-bf00-8a132f8f9683 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_attach_classic_link_instance_string_groups (tests.unit.vpc.test_vpc.TestAttachClassicLinkVpc) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc.py", line 224, in test_attach_classic_link_instance_string_groups dry_run=True File "/usr/lib/python2.7/dist-packages/boto/vpc/vpc.py", line 181, in attach_classic_instance dry_run=dry_run File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1762, in attach_classic_link_vpc return self.get_status('AttachClassicLinkVpc', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials55fad227-98fa-4707-80b0-4ca09877cf48 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'VpcId': 'myid', 'DryRun': 'true', 'SecurityGroupId.2': 'sg-bar', 'SecurityGroupId.1': 'sg-foo', 'InstanceId': 'my_instance_id', 'Version': '2014-10-01', 'Action': 'AttachClassicLinkVpc'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=AttachClassicLinkVpc&DryRun=true&InstanceId=my_instance_id&SecurityGroupId.1=sg-foo&SecurityGroupId.2=sg-bar&Version=2014-10-01&VpcId=myid host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164953Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164953Z 20170531/us-east-1/ec2/aws4_request 213214ea608c3c9cd36a2fc1affff0d3889729d8b9112516bef05798a5ffe5a4 boto: DEBUG: Signature: 81ed36835a08158dc609c6b75e12263b091a3698adf2a1869c3e87dbdc9f532c boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=81ed36835a08158dc609c6b75e12263b091a3698adf2a1869c3e87dbdc9f532c', 'X-Amz-Date': '20170531T164953Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:53 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials55fad227-98fa-4707-80b0-4ca09877cf48 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_vpc (tests.unit.vpc.test_vpc.TestCreateVpc) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc.py", line 64, in test_create_vpc api_response = self.service_connection.create_vpc('10.0.0.0/16', 'default') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 135, in create_vpc return self.get_object('CreateVpc', params, VPC) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials57ce58bd-d451-4593-b6ae-fd4e66590711 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateVpc', 'CidrBlock': '10.0.0.0/16', 'Version': '2014-10-01', 'InstanceTenancy': 'default'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateVpc&CidrBlock=10.0.0.0%2F16&InstanceTenancy=default&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164954Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164954Z 20170531/us-east-1/ec2/aws4_request b807beb6758f76012f9e0ee1e29f683bf716eca4c9a8d3484175ed93a9702a78 boto: DEBUG: Signature: 8233f0458a64e24d711ce0c5d4d7f3fd1d760a8a8c3db1fabca478ed2bb4c99a boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=8233f0458a64e24d711ce0c5d4d7f3fd1d760a8a8c3db1fabca478ed2bb4c99a', 'X-Amz-Date': '20170531T164954Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:54 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials57ce58bd-d451-4593-b6ae-fd4e66590711 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_vpc (tests.unit.vpc.test_vpc.TestDeleteVpc) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc.py", line 94, in test_delete_vpc api_response = self.service_connection.delete_vpc('vpc-1a2b3c4d') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 153, in delete_vpc return self.get_status('DeleteVpc', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials1424b1f1-7729-4691-ad78-c5b37ac5d9b8 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DeleteVpc', 'VpcId': 'vpc-1a2b3c4d', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DeleteVpc&Version=2014-10-01&VpcId=vpc-1a2b3c4d host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164954Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164954Z 20170531/us-east-1/ec2/aws4_request 0c0f76215d0be3fc4085c4470aae7cb5cc9966d40eae599e7c8de065a0f5329b boto: DEBUG: Signature: 776c2a49c1497b369b713d390e1ce1a6eec6f868b2693e10721e00a782d867e9 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=776c2a49c1497b369b713d390e1ce1a6eec6f868b2693e10721e00a782d867e9', 'X-Amz-Date': '20170531T164954Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:53 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials1424b1f1-7729-4691-ad78-c5b37ac5d9b8 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_vpcs (tests.unit.vpc.test_vpc.TestDescribeVPCs) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc.py", line 35, in test_get_vpcs api_response = self.service_connection.get_all_vpcs() File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 111, in get_all_vpcs return self.get_list('DescribeVpcs', params, [('item', VPC)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsd4fd18ce-23db-4bac-926d-d84ea5cc88b6 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeVpcs', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeVpcs&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164955Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164955Z 20170531/us-east-1/ec2/aws4_request 449be1b8e685558454825dce14e35af12d639f167e0f2c6521ee1292ea140179 boto: DEBUG: Signature: 3ce83a17ae9dc62078d23e05ae5c3e9eacedcff33af0c842dd7c663e903ac482 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=3ce83a17ae9dc62078d23e05ae5c3e9eacedcff33af0c842dd7c663e903ac482', 'X-Amz-Date': '20170531T164955Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:54 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsd4fd18ce-23db-4bac-926d-d84ea5cc88b6 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_detach_classic_link_instance (tests.unit.vpc.test_vpc.TestDetachClassicLinkVpc) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc.py", line 277, in test_detach_classic_link_instance dry_run=True File "/usr/lib/python2.7/dist-packages/boto/vpc/vpc.py", line 203, in detach_classic_instance dry_run=dry_run File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1786, in detach_classic_link_vpc return self.get_status('DetachClassicLinkVpc', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials9777c858-09be-43e8-839f-50b1e76e584d -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'InstanceId': 'my_instance_id', 'Action': 'DetachClassicLinkVpc', 'VpcId': 'myid', 'DryRun': 'true', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DetachClassicLinkVpc&DryRun=true&InstanceId=my_instance_id&Version=2014-10-01&VpcId=myid host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164955Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164955Z 20170531/us-east-1/ec2/aws4_request 446aac136c08bd3f39503c8507a6bb8693df3b748d7cbb6465497b673c3860cc boto: DEBUG: Signature: eeba6c030da518914bc077c782ea13407cf5dd45247d9163b75c7d9aaa0557d3 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=eeba6c030da518914bc077c782ea13407cf5dd45247d9163b75c7d9aaa0557d3', 'X-Amz-Date': '20170531T164955Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:55 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials9777c858-09be-43e8-839f-50b1e76e584d --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_enable_classic_link (tests.unit.vpc.test_vpc.TestDisableClassicLinkVpc) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc.py", line 324, in test_enable_classic_link dry_run=True File "/usr/lib/python2.7/dist-packages/boto/vpc/vpc.py", line 125, in disable_classic_link dry_run=dry_run) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1805, in disable_vpc_classic_link return self.get_status('DisableVpcClassicLink', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialse59b392f-537f-4670-b4e7-2c73e4264a93 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DisableVpcClassicLink', 'VpcId': 'myid', 'DryRun': 'true', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DisableVpcClassicLink&DryRun=true&Version=2014-10-01&VpcId=myid host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164955Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164955Z 20170531/us-east-1/ec2/aws4_request 62959d79f605f982408e4fa4d166e354827207255af7ad314a2a839210291610 boto: DEBUG: Signature: d44a816718162b69216c59f9abf168bae95c978d2b8063f9cecdcda93c548a56 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=d44a816718162b69216c59f9abf168bae95c978d2b8063f9cecdcda93c548a56', 'X-Amz-Date': '20170531T164955Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:55 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialse59b392f-537f-4670-b4e7-2c73e4264a93 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_enable_classic_link (tests.unit.vpc.test_vpc.TestEnableClassicLinkVpc) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc.py", line 301, in test_enable_classic_link dry_run=True File "/usr/lib/python2.7/dist-packages/boto/vpc/vpc.py", line 143, in enable_classic_link dry_run=dry_run) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1828, in enable_vpc_classic_link return self.get_status('EnableVpcClassicLink', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials175f36ba-099e-43c1-940a-8dd50fc14cff -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'EnableVpcClassicLink', 'VpcId': 'myid', 'DryRun': 'true', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=EnableVpcClassicLink&DryRun=true&Version=2014-10-01&VpcId=myid host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164956Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164956Z 20170531/us-east-1/ec2/aws4_request abcd58a156b3c213e3e69ff55e4957f126a04887cbabef1cf8ad84e29b3ecc8f boto: DEBUG: Signature: eef3e921eaed6a240495419064fc45a87647ac4a36f4713a151c1071c5e0b22f boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=eef3e921eaed6a240495419064fc45a87647ac4a36f4713a151c1071c5e0b22f', 'X-Amz-Date': '20170531T164956Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:55 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials175f36ba-099e-43c1-940a-8dd50fc14cff --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_classic_link_vpcs (tests.unit.vpc.test_vpc.TestGetAllClassicLinkVpc) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc.py", line 173, in test_get_all_classic_link_vpcs response = self.service_connection.get_all_classic_link_vpcs() File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1714, in get_all_classic_link_vpcs verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialse85d2581-97ae-452a-b5f4-b36da9faecd4 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeVpcClassicLink', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164956Z host;x-amz-date fb9d3618f455c5eb9427fe99c844e981d2a2eae65781f69bb2c3e8b6fdfd2e6c boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164956Z 20170531/us-east-1/ec2/aws4_request 396c5774c92483c0607866b4af36a5878db11782ed5683a0c8e40e0c01ca7a43 boto: DEBUG: Signature: 0a63622e20d7400c752fdbc88fd0423bb5e8edeb8bc463eafe4cc7c02a344b72 boto: DEBUG: Final headers: {'Content-Length': '48', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164956Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=0a63622e20d7400c752fdbc88fd0423bb5e8edeb8bc463eafe4cc7c02a344b72'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:56 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialse85d2581-97ae-452a-b5f4-b36da9faecd4 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_classic_link_vpcs_params (tests.unit.vpc.test_vpc.TestGetAllClassicLinkVpc) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc.py", line 185, in test_get_all_classic_link_vpcs_params dry_run=True, File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1714, in get_all_classic_link_vpcs verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials26743be5-683b-4345-9449-ea36b15919b1 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'VpcId.2': 'id2', 'VpcId.1': 'id1', 'DryRun': 'true', 'Filter.1.Name': 'GroupId', 'Version': '2014-10-01', 'Action': 'DescribeVpcClassicLink', 'Filter.1.Value.1': 'sg-9b4343fe'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164956Z host;x-amz-date 6dc121fd2481c567f5cce87c6e64590c75c2f8b035af6513f93ec5bab05e382a boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164956Z 20170531/us-east-1/ec2/aws4_request c1194deb72fac773ae51e6c797bae753cbccf8057531847fbe6ccc2d4d330da4 boto: DEBUG: Signature: a0aa206abc873dee55889f7f9e749ad3db4a45bb096646344a348e5caac3fdfb boto: DEBUG: Final headers: {'Content-Length': '135', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164956Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=a0aa206abc873dee55889f7f9e749ad3db4a45bb096646344a348e5caac3fdfb'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:55 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials26743be5-683b-4345-9449-ea36b15919b1 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_modify_vpc_attribute_dns_hostnames (tests.unit.vpc.test_vpc.TestModifyVpcAttribute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc.py", line 132, in test_modify_vpc_attribute_dns_hostnames 'vpc-1a2b3c4d', enable_dns_hostnames=True) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 192, in modify_vpc_attribute return self.get_status('ModifyVpcAttribute', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials8280c8aa-c42c-40ca-9c06-279391efc719 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'ModifyVpcAttribute', 'VpcId': 'vpc-1a2b3c4d', 'Version': '2014-10-01', 'EnableDnsHostnames.Value': 'true'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=ModifyVpcAttribute&EnableDnsHostnames.Value=true&Version=2014-10-01&VpcId=vpc-1a2b3c4d host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164957Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164957Z 20170531/us-east-1/ec2/aws4_request e44367381488b489d6d7810579301db02ba7633801ab6503e56784eb973bb9bc boto: DEBUG: Signature: b1af8560418c05fe21d54bc2a328b31949ad07b6238650f0a57626073e53e121 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=b1af8560418c05fe21d54bc2a328b31949ad07b6238650f0a57626073e53e121', 'X-Amz-Date': '20170531T164957Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:56 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials8280c8aa-c42c-40ca-9c06-279391efc719 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_modify_vpc_attribute_dns_support (tests.unit.vpc.test_vpc.TestModifyVpcAttribute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc.py", line 119, in test_modify_vpc_attribute_dns_support 'vpc-1a2b3c4d', enable_dns_support=True) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 192, in modify_vpc_attribute return self.get_status('ModifyVpcAttribute', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialse2961942-9e8b-4705-991b-1227133eec12 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'EnableDnsSupport.Value': 'true', 'Action': 'ModifyVpcAttribute', 'VpcId': 'vpc-1a2b3c4d', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=ModifyVpcAttribute&EnableDnsSupport.Value=true&Version=2014-10-01&VpcId=vpc-1a2b3c4d host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164957Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164957Z 20170531/us-east-1/ec2/aws4_request 49fd5e042a37e432c3083afb4049a94f3393ea2966139b0159d75ef97cd78ceb boto: DEBUG: Signature: c79313e22662045ad2a2350dc3e01996760c1ff78662e45511ef021b8c178556 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=c79313e22662045ad2a2350dc3e01996760c1ff78662e45511ef021b8c178556', 'X-Amz-Date': '20170531T164957Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:56 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialse2961942-9e8b-4705-991b-1227133eec12 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_vpc_update_classic_link_enabled (tests.unit.vpc.test_vpc.TestUpdateClassicLinkVpc) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc.py", line 355, in test_vpc_update_classic_link_enabled validate=True File "/usr/lib/python2.7/dist-packages/boto/vpc/vpc.py", line 109, in update_classic_link_enabled dry_run=dry_run File "/usr/lib/python2.7/dist-packages/boto/vpc/vpc.py", line 83, in _get_status_then_update_vpc dry_run=dry_run File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1714, in get_all_classic_link_vpcs verb='POST') File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials4195dc1f-c33c-43cc-b8a7-e81a73a7abbd -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DescribeVpcClassicLink', 'VpcId.1': 'myid', 'Version': '2014-10-01', 'DryRun': 'true'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164957Z host;x-amz-date 1b8b6a0b2af01da1b74ed7cab839f3c1226dc0ca5d21e06e5d59b4fe14912c28 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164957Z 20170531/us-east-1/ec2/aws4_request cf2e855599c3b0a82a0044c0d2dfc4b67cef15c5c3ec46d750470b16b439dd1c boto: DEBUG: Signature: 3ed9c88630d081ad57f117a652286338cdaa01d2a25d96c6d29960ae85526388 boto: DEBUG: Final headers: {'Content-Length': '73', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'ec2.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164957Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=3ed9c88630d081ad57f117a652286338cdaa01d2a25d96c6d29960ae85526388'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:57 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials4195dc1f-c33c-43cc-b8a7-e81a73a7abbd --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_accept_vpc_peering_connection (tests.unit.vpc.test_vpc_peering_connection.TestAcceptVpcPeeringConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc_peering_connection.py", line 260, in test_accept_vpc_peering_connection vpc_peering_connection = self.service_connection.accept_vpc_peering_connection('pcx-1a2b3c4d') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1686, in accept_vpc_peering_connection VpcPeeringConnection) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsc0fc03e9-47bc-450e-9e92-60c11a51f9d6 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'AcceptVpcPeeringConnection', 'Version': '2014-10-01', 'VpcPeeringConnectionId': 'pcx-1a2b3c4d'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=AcceptVpcPeeringConnection&Version=2014-10-01&VpcPeeringConnectionId=pcx-1a2b3c4d host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164958Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164958Z 20170531/us-east-1/ec2/aws4_request 81573ad185a66d1abd8068fa9199c27101f10d89c5ad23a7c53fe33a2d052121 boto: DEBUG: Signature: 73648bfba94c6550b046a2b266adc64b9c462ca5f222611ae78c68961c44ca83 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=73648bfba94c6550b046a2b266adc64b9c462ca5f222611ae78c68961c44ca83', 'X-Amz-Date': '20170531T164958Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:57 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsc0fc03e9-47bc-450e-9e92-60c11a51f9d6 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_vpc_peering_connection (tests.unit.vpc.test_vpc_peering_connection.TestCreateVpcPeeringConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc_peering_connection.py", line 135, in test_create_vpc_peering_connection vpc_peering_connection = self.service_connection.create_vpc_peering_connection('vpc-1a2b3c4d', 'vpc-a1b2c3d4', '123456789012') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1625, in create_vpc_peering_connection VpcPeeringConnection) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials726d796c-38cb-487b-89ae-dddcc298415a -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateVpcPeeringConnection', 'PeerOwnerId': '123456789012', 'PeerVpcId': 'vpc-a1b2c3d4', 'VpcId': 'vpc-1a2b3c4d', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateVpcPeeringConnection&PeerOwnerId=123456789012&PeerVpcId=vpc-a1b2c3d4&Version=2014-10-01&VpcId=vpc-1a2b3c4d host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164958Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164958Z 20170531/us-east-1/ec2/aws4_request 11cc24ea1328c77e59533494fcc91b9835d66929503a5ed24078977e8ccf1b93 boto: DEBUG: Signature: 863535877f647011f94969c39dc35b0f019bf77e43022577c52f90d6c5225f10 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=863535877f647011f94969c39dc35b0f019bf77e43022577c52f90d6c5225f10', 'X-Amz-Date': '20170531T164958Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:57 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials726d796c-38cb-487b-89ae-dddcc298415a --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_vpc_peering_connection (tests.unit.vpc.test_vpc_peering_connection.TestDeleteVpcPeeringConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc_peering_connection.py", line 160, in test_delete_vpc_peering_connection self.assertEquals(self.service_connection.delete_vpc_peering_connection('pcx-12345678'), True) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1646, in delete_vpc_peering_connection return self.get_status('DeleteVpcPeeringConnection', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials51d02200-fbae-409d-86f2-1ee95f5deb6a -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DeleteVpcPeeringConnection', 'Version': '2014-10-01', 'VpcPeeringConnectionId': 'pcx-12345678'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DeleteVpcPeeringConnection&Version=2014-10-01&VpcPeeringConnectionId=pcx-12345678 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164958Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164958Z 20170531/us-east-1/ec2/aws4_request fb6458e9ca2d675acd9d08c5c350aedfd91f688d402e704307265a9527c25eb6 boto: DEBUG: Signature: 32bf48354689890b0fa7ce4e4bfdc5e87c51ea0d7feedbbfd0de02318d262720 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=32bf48354689890b0fa7ce4e4bfdc5e87c51ea0d7feedbbfd0de02318d262720', 'X-Amz-Date': '20170531T164958Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:58 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials51d02200-fbae-409d-86f2-1ee95f5deb6a --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_vpc_peering_connections (tests.unit.vpc.test_vpc_peering_connection.TestDescribeVpcPeeringConnections) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc_peering_connection.py", line 78, in test_get_vpc_peering_connections ['pcx-111aaa22', 'pcx-444bbb88'], filters=[('status-code', ['pending-acceptance'])]) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1598, in get_all_vpc_peering_connections return self.get_list('DescribeVpcPeeringConnections', params, [('item', VpcPeeringConnection)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsfc37ea9c-4c08-44ed-af42-d81378f296f8 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'VpcPeeringConnectionId.2': 'pcx-444bbb88', 'VpcPeeringConnectionId.1': 'pcx-111aaa22', 'Filter.1.Name': 'status-code', 'Version': '2014-10-01', 'Action': 'DescribeVpcPeeringConnections', 'Filter.1.Value.1': 'pending-acceptance'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeVpcPeeringConnections&Filter.1.Name=status-code&Filter.1.Value.1=pending-acceptance&Version=2014-10-01&VpcPeeringConnectionId.1=pcx-111aaa22&VpcPeeringConnectionId.2=pcx-444bbb88 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164959Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164959Z 20170531/us-east-1/ec2/aws4_request d8d28ad58fa8c80aa9c0041ec0a13ce506c19035c847604fb772f3e824912993 boto: DEBUG: Signature: d04bfeeb355d115fa0a6cf32eee35a021002d94249b53bb986cc71c637cc9cb1 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=d04bfeeb355d115fa0a6cf32eee35a021002d94249b53bb986cc71c637cc9cb1', 'X-Amz-Date': '20170531T164959Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:59 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsfc37ea9c-4c08-44ed-af42-d81378f296f8 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_reject_vpc_peering_connection (tests.unit.vpc.test_vpc_peering_connection.TestRejectVpcPeeringConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpc_peering_connection.py", line 227, in test_reject_vpc_peering_connection self.assertEquals(self.service_connection.reject_vpc_peering_connection('pcx-12345678'), True) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1665, in reject_vpc_peering_connection return self.get_status('RejectVpcPeeringConnection', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialscd2aa28e-ea3d-4470-89a3-9669811978a4 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'RejectVpcPeeringConnection', 'Version': '2014-10-01', 'VpcPeeringConnectionId': 'pcx-12345678'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=RejectVpcPeeringConnection&Version=2014-10-01&VpcPeeringConnectionId=pcx-12345678 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T164959Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164959Z 20170531/us-east-1/ec2/aws4_request 4f5b5e11d9521d81953e18ba5ec5c7b5ab0c50ed28c31d202edfa876fab15178 boto: DEBUG: Signature: e6a57c4474d56b33b2f92dc33a4d1f5b392df1c12996136b8e15f33a61c262f0 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=e6a57c4474d56b33b2f92dc33a4d1f5b392df1c12996136b8e15f33a61c262f0', 'X-Amz-Date': '20170531T164959Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:49:59 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialscd2aa28e-ea3d-4470-89a3-9669811978a4 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_vpn_connection (tests.unit.vpc.test_vpnconnection.TestCreateVPNConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpnconnection.py", line 162, in test_create_vpn_connection 'ipsec.1', 'cgw-b4dc3961', 'vgw-8db04f81', static_routes_only=True) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1422, in create_vpn_connection return self.get_object('CreateVpnConnection', params, VpnConnection) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsf51c05ba-3234-4a83-b93e-d1f8a47f1eed -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateVpnConnection', 'Options.StaticRoutesOnly': 'true', 'Version': '2014-10-01', 'VpnGatewayId': 'vgw-8db04f81', 'CustomerGatewayId': 'cgw-b4dc3961', 'Type': 'ipsec.1'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateVpnConnection&CustomerGatewayId=cgw-b4dc3961&Options.StaticRoutesOnly=true&Type=ipsec.1&Version=2014-10-01&VpnGatewayId=vgw-8db04f81 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T165000Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T165000Z 20170531/us-east-1/ec2/aws4_request eea28e1003e3e3308635f9996f0d9e448f94be3efa23644f7134d7de889311cc boto: DEBUG: Signature: 541704cf39e9bbf1d50ae71e27dae0fa20aa26c17db98768f8d79b9695aed57d boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=541704cf39e9bbf1d50ae71e27dae0fa20aa26c17db98768f8d79b9695aed57d', 'X-Amz-Date': '20170531T165000Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:50:00 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsf51c05ba-3234-4a83-b93e-d1f8a47f1eed --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_create_vpn_connection_route (tests.unit.vpc.test_vpnconnection.TestCreateVPNConnectionRoute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpnconnection.py", line 217, in test_create_vpn_connection_route '11.12.0.0/16', 'vpn-83ad48ea') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1521, in create_vpn_connection_route return self.get_status('CreateVpnConnectionRoute', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials38e60fe9-b314-4d4c-9f9a-af74e07c2d22 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'VpnConnectionId': 'vpn-83ad48ea', 'DestinationCidrBlock': '11.12.0.0/16', 'Version': '2014-10-01', 'Action': 'CreateVpnConnectionRoute'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateVpnConnectionRoute&DestinationCidrBlock=11.12.0.0%2F16&Version=2014-10-01&VpnConnectionId=vpn-83ad48ea host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T165000Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T165000Z 20170531/us-east-1/ec2/aws4_request ef0ab2ffde3ebd26350d5e9d645760f134d0028ed8a10ff1b9e5366e316329b0 boto: DEBUG: Signature: dc754383b8297525f6459c97ed1329ba016064dffacd22ac5061b427cf791220 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=dc754383b8297525f6459c97ed1329ba016064dffacd22ac5061b427cf791220', 'X-Amz-Date': '20170531T165000Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:50:00 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials38e60fe9-b314-4d4c-9f9a-af74e07c2d22 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_vpn_connection (tests.unit.vpc.test_vpnconnection.TestDeleteVPNConnection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpnconnection.py", line 192, in test_delete_vpn_connection api_response = self.service_connection.delete_vpn_connection('vpn-44a8938f') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1440, in delete_vpn_connection return self.get_status('DeleteVpnConnection', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsd3016798-1628-4a8e-8cd2-bb7cb5b1ab85 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'VpnConnectionId': 'vpn-44a8938f', 'Action': 'DeleteVpnConnection', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DeleteVpnConnection&Version=2014-10-01&VpnConnectionId=vpn-44a8938f host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T165000Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T165000Z 20170531/us-east-1/ec2/aws4_request e0a9b7e2b3c6b7e13d1a99129d3ce4c134e8fa33fe370b9f1105ee046d1bdcfc boto: DEBUG: Signature: b9362e2fb5b7ae356b921345743e2f93c87d42014bfda090c90a917cddf54f4d boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=b9362e2fb5b7ae356b921345743e2f93c87d42014bfda090c90a917cddf54f4d', 'X-Amz-Date': '20170531T165000Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:50:00 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsd3016798-1628-4a8e-8cd2-bb7cb5b1ab85 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_vpn_connection_route (tests.unit.vpc.test_vpnconnection.TestDeleteVPNConnectionRoute) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpnconnection.py", line 243, in test_delete_vpn_connection_route '11.12.0.0/16', 'vpn-83ad48ea') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1550, in delete_vpn_connection_route return self.get_status('DeleteVpnConnectionRoute', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials5f8d7052-68b0-48f2-8121-9873b1da86f0 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'VpnConnectionId': 'vpn-83ad48ea', 'DestinationCidrBlock': '11.12.0.0/16', 'Version': '2014-10-01', 'Action': 'DeleteVpnConnectionRoute'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DeleteVpnConnectionRoute&DestinationCidrBlock=11.12.0.0%2F16&Version=2014-10-01&VpnConnectionId=vpn-83ad48ea host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T165001Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T165001Z 20170531/us-east-1/ec2/aws4_request 937f3c73b66e89928f96d58efe4059237c3b1bd1593aa80f00d93b2bf355a548 boto: DEBUG: Signature: 468b9715e8a84af51a791cc84c7ba25f76f7528a6846426a7ca7d58cfdb72be1 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=468b9715e8a84af51a791cc84c7ba25f76f7528a6846426a7ca7d58cfdb72be1', 'X-Amz-Date': '20170531T165001Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:50:00 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials5f8d7052-68b0-48f2-8121-9873b1da86f0 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_vpcs (tests.unit.vpc.test_vpnconnection.TestDescribeVPNConnections) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpnconnection.py", line 104, in test_get_vpcs ['vpn-12qw34er56ty', 'vpn-qwerty12'], filters=[('state', ['pending', 'available'])]) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1385, in get_all_vpn_connections [('item', VpnConnection)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials491048a9-1aef-4a60-8a76-15a565cbe923 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Filter.1.Name': 'state', 'VpnConnectionId.1': 'vpn-12qw34er56ty', 'VpnConnectionId.2': 'vpn-qwerty12', 'Action': 'DescribeVpnConnections', 'Version': '2014-10-01', 'Filter.1.Value.2': 'available', 'Filter.1.Value.1': 'pending'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeVpnConnections&Filter.1.Name=state&Filter.1.Value.1=pending&Filter.1.Value.2=available&Version=2014-10-01&VpnConnectionId.1=vpn-12qw34er56ty&VpnConnectionId.2=vpn-qwerty12 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T165001Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T165001Z 20170531/us-east-1/ec2/aws4_request 73a2297979b1c417a4fac987ca1caa0aa08c9b9cbca22aa99d3bcc81fb0255b6 boto: DEBUG: Signature: b71adb4e3aa55ca2e21ea94a1406b176148954e392121de8d4fac1a4bb0d9544 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=b71adb4e3aa55ca2e21ea94a1406b176148954e392121de8d4fac1a4bb0d9544', 'X-Amz-Date': '20170531T165001Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:50:01 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials491048a9-1aef-4a60-8a76-15a565cbe923 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_attach_vpn_gateway (tests.unit.vpc.test_vpngateway.TestAttachVpnGateway) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpngateway.py", line 130, in test_attach_vpn_gateway api_response = self.service_connection.attach_vpn_gateway('vgw-8db04f81', 'vpc-1a2b3c4d') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1091, in attach_vpn_gateway return self.get_object('AttachVpnGateway', params, Attachment) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsa92a8595-3dc4-48ee-a0b2-77a5f1ab8b0d -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'AttachVpnGateway', 'VpcId': 'vpc-1a2b3c4d', 'Version': '2014-10-01', 'VpnGatewayId': 'vgw-8db04f81'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=AttachVpnGateway&Version=2014-10-01&VpcId=vpc-1a2b3c4d&VpnGatewayId=vgw-8db04f81 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T165001Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T165001Z 20170531/us-east-1/ec2/aws4_request dc6307eedf545bbea282bf71ff946118957dcc2d39dc961d95eab87ff4a80d95 boto: DEBUG: Signature: 5ff771914188e0c93a83908c0ad270ec2e4243bc13600c629bc61dccfb7c68ea boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=5ff771914188e0c93a83908c0ad270ec2e4243bc13600c629bc61dccfb7c68ea', 'X-Amz-Date': '20170531T165001Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:50:01 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsa92a8595-3dc4-48ee-a0b2-77a5f1ab8b0d --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_vpn_gateway (tests.unit.vpc.test_vpngateway.TestCreateVpnGateway) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpngateway.py", line 77, in test_delete_vpn_gateway api_response = self.service_connection.create_vpn_gateway('ipsec.1', 'us-east-1a') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1051, in create_vpn_gateway return self.get_object('CreateVpnGateway', params, VpnGateway) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1208, in get_object raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials70f4570e-7ceb-4551-8b91-0ccb423045d9 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'CreateVpnGateway', 'AvailabilityZone': 'us-east-1a', 'Type': 'ipsec.1', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=CreateVpnGateway&AvailabilityZone=us-east-1a&Type=ipsec.1&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T165002Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T165002Z 20170531/us-east-1/ec2/aws4_request 2552ce9b8fb4001ccf435b5dcb13d2caa47a7c75202a835ca10ddca7ad6cb39f boto: DEBUG: Signature: 93467e48fa38b17630deb2135effb76e4490c813dc9907f7b221032d7b1c0f17 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=93467e48fa38b17630deb2135effb76e4490c813dc9907f7b221032d7b1c0f17', 'X-Amz-Date': '20170531T165002Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:50:01 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials70f4570e-7ceb-4551-8b91-0ccb423045d9 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_delete_vpn_gateway (tests.unit.vpc.test_vpngateway.TestDeleteVpnGateway) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpngateway.py", line 103, in test_delete_vpn_gateway api_response = self.service_connection.delete_vpn_gateway('vgw-8db04f81') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1069, in delete_vpn_gateway return self.get_status('DeleteVpnGateway', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialse2843c79-3c74-47dc-8096-706145206e49 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DeleteVpnGateway', 'Version': '2014-10-01', 'VpnGatewayId': 'vgw-8db04f81'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DeleteVpnGateway&Version=2014-10-01&VpnGatewayId=vgw-8db04f81 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T165002Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T165002Z 20170531/us-east-1/ec2/aws4_request 3a2c354f7f92a9f1bb77eabfed7614cdc4df4e06d1c410f3a44ebf9f8142134a boto: DEBUG: Signature: 4c156fdb7fe4fd48049d7d70716c3160f83cccea154ce54de4594a4713f7cc69 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=4c156fdb7fe4fd48049d7d70716c3160f83cccea154ce54de4594a4713f7cc69', 'X-Amz-Date': '20170531T165002Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:50:02 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialse2843c79-3c74-47dc-8096-706145206e49 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_get_all_vpn_gateways (tests.unit.vpc.test_vpngateway.TestDescribeVpnGateways) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpngateway.py", line 39, in test_get_all_vpn_gateways ('availability-zone', 'us-east-1a')])) File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1028, in get_all_vpn_gateways [('item', VpnGateway)]) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1186, in get_list raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialse913cee2-c84e-4154-8345-cdaf0c6a9fb0 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'VpnGatewayId.1': 'vgw-8db04f81', 'Filter.2.Name': 'availability-zone', 'Version': '2014-10-01', 'Action': 'DescribeVpnGateways', 'Filter.1.Name': 'state', 'Filter.1.Value.2': 'available', 'Filter.2.Value.1': 'us-east-1a', 'Filter.1.Value.1': 'pending'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DescribeVpnGateways&Filter.1.Name=state&Filter.1.Value.1=pending&Filter.1.Value.2=available&Filter.2.Name=availability-zone&Filter.2.Value.1=us-east-1a&Version=2014-10-01&VpnGatewayId.1=vgw-8db04f81 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T165003Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T165003Z 20170531/us-east-1/ec2/aws4_request 1a5dd9451b030b8b87d9072ac4ddc2978e2325c652fe008a37878c03c9437c2f boto: DEBUG: Signature: c1eb8370f79fb796d7bda01994ff534e95308bf93c4624a3736eaf5435584b5f boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=c1eb8370f79fb796d7bda01994ff534e95308bf93c4624a3736eaf5435584b5f', 'X-Amz-Date': '20170531T165003Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:50:02 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialse913cee2-c84e-4154-8345-cdaf0c6a9fb0 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_detach_vpn_gateway (tests.unit.vpc.test_vpngateway.TestDetachVpnGateway) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpngateway.py", line 157, in test_detach_vpn_gateway api_response = self.service_connection.detach_vpn_gateway('vgw-8db04f81', 'vpc-1a2b3c4d') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1113, in detach_vpn_gateway return self.get_status('DetachVpnGateway', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials42a4bfb7-dad0-4654-8e8a-3939259afeb5 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'Action': 'DetachVpnGateway', 'VpcId': 'vpc-1a2b3c4d', 'Version': '2014-10-01', 'VpnGatewayId': 'vgw-8db04f81'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DetachVpnGateway&Version=2014-10-01&VpcId=vpc-1a2b3c4d&VpnGatewayId=vgw-8db04f81 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T165003Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T165003Z 20170531/us-east-1/ec2/aws4_request ed8b965bd927e51eee94deb0c75accf7c9b3c6da4d3016b2e08f14ef4f08eb3f boto: DEBUG: Signature: 283a1565d2fcef12ca418c18ca8d32dd675b428a9ec22511c843ee304e42dff4 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=283a1565d2fcef12ca418c18ca8d32dd675b428a9ec22511c843ee304e42dff4', 'X-Amz-Date': '20170531T165003Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:50:02 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials42a4bfb7-dad0-4654-8e8a-3939259afeb5 --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_disable_vgw_route_propagation (tests.unit.vpc.test_vpngateway.TestDisableVgwRoutePropagation) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpngateway.py", line 183, in test_disable_vgw_route_propagation 'rtb-c98a35a0', 'vgw-d8e09e8a') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1466, in disable_vgw_route_propagation return self.get_status('DisableVgwRoutePropagation', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentials1cad2a10-afb9-4b6c-aaf5-be2e5b44fd2b -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'GatewayId': 'vgw-d8e09e8a', 'Action': 'DisableVgwRoutePropagation', 'RouteTableId': 'rtb-c98a35a0', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=DisableVgwRoutePropagation&GatewayId=vgw-d8e09e8a&RouteTableId=rtb-c98a35a0&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T165003Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T165003Z 20170531/us-east-1/ec2/aws4_request edf60327eb7ced2e96d89a15e8bd05876a249404f16856bffdfee384f4933aea boto: DEBUG: Signature: 534670814d37ea913d6d01fce9fe3e18f19b331b5519af22e6f4a6a0abb2d3c8 boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=534670814d37ea913d6d01fce9fe3e18f19b331b5519af22e6f4a6a0abb2d3c8', 'X-Amz-Date': '20170531T165003Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:50:03 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentials1cad2a10-afb9-4b6c-aaf5-be2e5b44fd2b --------------------- >> end captured logging << --------------------- ====================================================================== ERROR: test_enable_vgw_route_propagation (tests.unit.vpc.test_vpngateway.TestEnableVgwRoutePropagation) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/vpc/test_vpngateway.py", line 209, in test_enable_vgw_route_propagation 'rtb-c98a35a0', 'vgw-d8e09e8a') File "/usr/lib/python2.7/dist-packages/boto/vpc/__init__.py", line 1492, in enable_vgw_route_propagation return self.get_status('EnableVgwRoutePropagation', params) File "/usr/lib/python2.7/dist-packages/boto/connection.py", line 1227, in get_status raise self.ResponseError(response.status, response.reason, body) EC2ResponseError: EC2ResponseError: 401 Unauthorized AuthFailureAWS was not able to validate the provided access credentialsdc64a88d-a7d8-4a6d-a0a5-185068856676 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://ec2.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: ec2.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'GatewayId': 'vgw-d8e09e8a', 'Action': 'EnableVgwRoutePropagation', 'RouteTableId': 'rtb-c98a35a0', 'Version': '2014-10-01'} boto: DEBUG: establishing HTTPS connection: host=ec2.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT ec2.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=ec2.us-east-1.amazonaws.com, certificate hosts=['us-east-1.ec2.amazonaws.com', 'ec2.amazonaws.com', 'ec2.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: GET / Action=EnableVgwRoutePropagation&GatewayId=vgw-d8e09e8a&RouteTableId=rtb-c98a35a0&Version=2014-10-01 host:ec2.us-east-1.amazonaws.com x-amz-date:20170531T165004Z host;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T165004Z 20170531/us-east-1/ec2/aws4_request 14168fd32180a105296a17016828f31da7bc015c85b09f782e43595d4f1d80c7 boto: DEBUG: Signature: 8d98897a9fcbf87180c05e9d14cca142dd59956d963c96a2eebdabf1365636fc boto: DEBUG: Final headers: {'Content-Length': '0', 'Host': 'ec2.us-east-1.amazonaws.com', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/ec2/aws4_request,SignedHeaders=host;x-amz-date,Signature=8d98897a9fcbf87180c05e9d14cca142dd59956d963c96a2eebdabf1365636fc', 'X-Amz-Date': '20170531T165004Z', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('transfer-encoding', 'chunked'), ('date', 'Wed, 31 May 2017 16:50:03 GMT'), ('server', 'AmazonEC2')] boto: DEBUG: AuthFailureAWS was not able to validate the provided access credentialsdc64a88d-a7d8-4a6d-a0a5-185068856676 --------------------- >> end captured logging << --------------------- ====================================================================== FAIL: test_create_stack_fail_error (tests.unit.cloudformation.test_connection.TestCloudFormationCreateStack) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 121, in test_create_stack_fail_error self.assertEqual('abc', e.request_id) AssertionError: 'abc' != u'd403408e-4620-11e7-a390-73e33706999d' -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'StackName': 'stack_name', 'Version': '2010-05-15', 'ContentType': 'JSON', 'Parameters.member.1.ParameterKey': 'KeyName', 'TemplateBody': '\n{\n "AWSTemplateFormatVersion" : "2010-09-09",\n "Description" : "Sample template",\n "Parameters" : {\n "KeyName" : {\n "Description" : "key pair",\n "Type" : "String"\n }\n },\n "Resources" : {\n "Ec2Instance" : {\n "Type" : "AWS::EC2::Instance",\n "Properties" : {\n "KeyName" : { "Ref" : "KeyName" },\n "ImageId" : "ami-7f418316",\n "UserData" : { "Fn::Base64" : "80" }\n }\n }\n },\n "Outputs" : {\n "InstanceId" : {\n "Description" : "InstanceId of the newly created EC2 instance",\n "Value" : { "Ref" : "Ec2Instance" }\n }\n}\n', 'DisableRollback': 'false', 'Action': 'CreateStack', 'Parameters.member.1.ParameterValue': 'myKeyName'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164726Z host;x-amz-date e6635e22e420254a0524884f509bc4afae21db0ce5f4f13ef1ef57d63e0c2b8f boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164726Z 20170531/us-east-1/cloudformation/aws4_request 0b1e09527630cd5c167b8ea1e4702f756469467bc3584887219eb6b3e0d49ecd boto: DEBUG: Signature: 4a162ed7b76b07a300302e34de19b327c1cf0ce2f884693aa6ad0072473a5df7 boto: DEBUG: Final headers: {'Content-Length': '1388', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164726Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=4a162ed7b76b07a300302e34de19b327c1cf0ce2f884693aa6ad0072473a5df7'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd403408e-4620-11e7-a390-73e33706999d'), ('date', 'Wed, 31 May 2017 16:47:26 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: ERROR: 403 Forbidden boto: ERROR: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d403408e-4620-11e7-a390-73e33706999d"} --------------------- >> end captured logging << --------------------- ====================================================================== FAIL: test_create_stack_fails (tests.unit.cloudformation.test_connection.TestCloudFormationCreateStack) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/cloudformation/test_connection.py", line 111, in test_create_stack_fails parameters=[('KeyName', 'myKeyName')]) AssertionError: "Invalid arg." does not match "BotoServerError: 403 Forbidden {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d43b4083-4620-11e7-a390-73e33706999d"}" -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://cloudformation.us-east-1.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: cloudformation.us-east-1.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {'StackName': 'stack_name', 'Version': '2010-05-15', 'ContentType': 'JSON', 'Parameters.member.1.ParameterKey': 'KeyName', 'TemplateBody': '\n{\n "AWSTemplateFormatVersion" : "2010-09-09",\n "Description" : "Sample template",\n "Parameters" : {\n "KeyName" : {\n "Description" : "key pair",\n "Type" : "String"\n }\n },\n "Resources" : {\n "Ec2Instance" : {\n "Type" : "AWS::EC2::Instance",\n "Properties" : {\n "KeyName" : { "Ref" : "KeyName" },\n "ImageId" : "ami-7f418316",\n "UserData" : { "Fn::Base64" : "80" }\n }\n }\n },\n "Outputs" : {\n "InstanceId" : {\n "Description" : "InstanceId of the newly created EC2 instance",\n "Value" : { "Ref" : "Ec2Instance" }\n }\n}\n', 'DisableRollback': 'false', 'Action': 'CreateStack', 'Parameters.member.1.ParameterValue': 'myKeyName'} boto: DEBUG: establishing HTTPS connection: host=cloudformation.us-east-1.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT cloudformation.us-east-1.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=cloudformation.us-east-1.amazonaws.com, certificate hosts=['cloudformation.us-east-1.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: CanonicalRequest: POST / host:cloudformation.us-east-1.amazonaws.com x-amz-date:20170531T164727Z host;x-amz-date e6635e22e420254a0524884f509bc4afae21db0ce5f4f13ef1ef57d63e0c2b8f boto: DEBUG: StringToSign: AWS4-HMAC-SHA256 20170531T164727Z 20170531/us-east-1/cloudformation/aws4_request 3baa2ff370954f4439f92c2d92f56c3fd116da06ffcbf143390c4af9fb550d84 boto: DEBUG: Signature: 3f4642cf8f50294d8685eaf23e68f8b6ce213161473284e0cba7fb0724e4c3e1 boto: DEBUG: Final headers: {'Content-Length': '1388', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'cloudformation.us-east-1.amazonaws.com', 'X-Amz-Date': '20170531T164727Z', 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Authorization': 'AWS4-HMAC-SHA256 Credential=aws_access_key_id/20170531/us-east-1/cloudformation/aws4_request,SignedHeaders=host;x-amz-date,Signature=3f4642cf8f50294d8685eaf23e68f8b6ce213161473284e0cba7fb0724e4c3e1'} boto: DEBUG: Response headers: [('x-amzn-requestid', 'd43b4083-4620-11e7-a390-73e33706999d'), ('date', 'Wed, 31 May 2017 16:47:26 GMT'), ('content-length', '175'), ('content-type', 'application/json')] boto: ERROR: 403 Forbidden boto: ERROR: {"Error":{"Code":"InvalidClientTokenId","Message":"The security token included in the request is invalid.","Type":"Sender"},"RequestId":"d43b4083-4620-11e7-a390-73e33706999d"} --------------------- >> end captured logging << --------------------- ====================================================================== FAIL: test_private_zone_invalid_vpc_400 (tests.unit.route53.test_connection.TestRoute53Connection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/route53/test_connection.py", line 112, in test_private_zone_invalid_vpc_400 self.assertTrue('It failed.' in str(err.exception)) AssertionError: False is not true -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: POST boto: DEBUG: Path: https://route53.amazonaws.com/2013-04-01/hostedzone boto: DEBUG: Data: example.com. None None f84b59f7-4335-4a09-8aa6-15851d4bb2c8 boto: DEBUG: Headers: {'Content-Type': 'text/xml'} boto: DEBUG: Host: route53.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=route53.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT route53.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=route53.amazonaws.com, certificate hosts=['route53.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Content-Length': '387', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic', 'Host': 'route53.amazonaws.com', 'Date': 'Wed, 31 May 2017 16:49:08 GMT', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=ZhUaXxG4hV98Um660FRXG2U0gfJb9+TaQr2cHNeEBd4=', 'Content-Type': 'text/xml'} boto: DEBUG: Response headers: [('x-amzn-requestid', '109a9318-4621-11e7-8e6a-ad0b78e8806a'), ('date', 'Wed, 31 May 2017 16:49:08 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Saw HTTP status: 403 boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid109a9318-4621-11e7-8e6a-ad0b78e8806a --------------------- >> end captured logging << --------------------- ====================================================================== FAIL: test_retryable_400_prior_request_not_complete (tests.unit.route53.test_connection.TestRoute53Connection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/route53/test_connection.py", line 70, in test_retryable_400_prior_request_not_complete self.do_retry_handler() File "/usr/lib/python2.7/dist-packages/mock/mock.py", line 1305, in patched return func(*args, **keywargs) File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/route53/test_connection.py", line 99, in do_retry_handler self.assertEqual(self.calls['count'], 7) AssertionError: 1 != 7 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://route53.amazonaws.com/2013-04-01/hostedzone boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: route53.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=route53.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT route53.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=route53.amazonaws.com, certificate hosts=['route53.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:08 GMT', 'Content-Length': '0', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=ZhUaXxG4hV98Um660FRXG2U0gfJb9+TaQr2cHNeEBd4=', 'Host': 'route53.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '10d0e4fc-4621-11e7-91bd-7d990adde257'), ('date', 'Wed, 31 May 2017 16:49:08 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Saw HTTP status: 403 boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid10d0e4fc-4621-11e7-91bd-7d990adde257 --------------------- >> end captured logging << --------------------- ====================================================================== FAIL: test_retryable_400_throttling (tests.unit.route53.test_connection.TestRoute53Connection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/route53/test_connection.py", line 77, in test_retryable_400_throttling self.do_retry_handler() File "/usr/lib/python2.7/dist-packages/mock/mock.py", line 1305, in patched return func(*args, **keywargs) File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/route53/test_connection.py", line 99, in do_retry_handler self.assertEqual(self.calls['count'], 7) AssertionError: 1 != 7 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://route53.amazonaws.com/2013-04-01/hostedzone boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: route53.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=route53.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT route53.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=route53.amazonaws.com, certificate hosts=['route53.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:09 GMT', 'Content-Length': '0', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=wZqXGt/w15v98vRchlgyzyw+MfpH61JmNfAAUqP+pKY=', 'Host': 'route53.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '1109f65b-4621-11e7-a0e1-cd86a6addf74'), ('date', 'Wed, 31 May 2017 16:49:08 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Saw HTTP status: 403 boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid1109f65b-4621-11e7-a0e1-cd86a6addf74 --------------------- >> end captured logging << --------------------- ====================================================================== FAIL: test_typical_400 (tests.unit.route53.test_connection.TestRoute53Connection) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/route53/test_connection.py", line 63, in test_typical_400 self.assertTrue('It failed.' in str(err.exception)) AssertionError: False is not true -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: Method: GET boto: DEBUG: Path: https://route53.amazonaws.com/2013-04-01/hostedzone boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: route53.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=route53.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT route53.amazonaws.com:443 HTTP/1.0 boto: DEBUG: wrapping ssl socket for proxied connection; CA certificate file=/usr/lib/python2.7/dist-packages/boto/cacerts/cacerts.txt boto: DEBUG: validating server certificate: hostname=route53.amazonaws.com, certificate hosts=['route53.amazonaws.com'] boto: DEBUG: Token: None boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:09 GMT', 'Content-Length': '0', 'X-Amzn-Authorization': u'AWS3-HTTPS AWSAccessKeyId=aws_access_key_id,Algorithm=HmacSHA256,Signature=wZqXGt/w15v98vRchlgyzyw+MfpH61JmNfAAUqP+pKY=', 'Host': 'route53.amazonaws.com', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amzn-requestid', '11426b41-4621-11e7-b697-adc2a29dab58'), ('date', 'Wed, 31 May 2017 16:49:09 GMT'), ('content-length', '305'), ('content-type', 'text/xml')] boto: DEBUG: Saw HTTP status: 403 boto: DEBUG: SenderInvalidClientTokenIdThe security token included in the request is invalid11426b41-4621-11e7-b697-adc2a29dab58 --------------------- >> end captured logging << --------------------- ====================================================================== FAIL: test_head_bucket_notfound (tests.unit.s3.test_connection.TestHeadBucket) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_connection.py", line 320, in test_head_bucket_notfound self.assertEqual(err.status, 404) AssertionError: 403 != 404 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/totally-doesnt-exist/ boto: DEBUG: Method: HEAD boto: DEBUG: Path: https://totally-doesnt-exist.s3.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: totally-doesnt-exist.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=totally-doesnt-exist.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT totally-doesnt-exist.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: HEAD Wed, 31 May 2017 16:49:14 GMT /totally-doesnt-exist/ boto: DEBUG: Signature: AWS aws_access_key_id:dp8E7jv3achVuJVj6uexXAZcyDc= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:14 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:dp8E7jv3achVuJVj6uexXAZcyDc=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'w1H8dmLLmSTZPC3RCAMc+J0oIC+TmN49bCX0RKFJwD2dSRC6tkn6nfcDx6Qs+ITyFXt3pQhRIRo='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'FC3800451D715777'), ('date', 'Wed, 31 May 2017 16:49:13 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ====================================================================== FAIL: test_head_bucket_other (tests.unit.s3.test_connection.TestHeadBucket) ---------------------------------------------------------------------- Traceback (most recent call last): File "/tmp/autopkgtest.JJMfC2/autopkgtest_tmp/tests/unit/s3/test_connection.py", line 331, in test_head_bucket_other self.assertEqual(err.status, 405) AssertionError: 403 != 405 -------------------- >> begin captured logging << -------------------- boto: DEBUG: Using access key provided by client. boto: DEBUG: Using secret key provided by client. boto: DEBUG: path=/ boto: DEBUG: auth_path=/you-broke-it/ boto: DEBUG: Method: HEAD boto: DEBUG: Path: https://you-broke-it.s3.amazonaws.com/ boto: DEBUG: Data: boto: DEBUG: Headers: {} boto: DEBUG: Host: you-broke-it.s3.amazonaws.com boto: DEBUG: Port: 443 boto: DEBUG: Params: {} boto: DEBUG: establishing HTTPS connection: host=you-broke-it.s3.amazonaws.com, kwargs={'port': 443, 'timeout': 70} boto: DEBUG: Proxy connection: CONNECT you-broke-it.s3.amazonaws.com:443 HTTP/1.0 boto: DEBUG: Token: None boto: DEBUG: StringToSign: HEAD Wed, 31 May 2017 16:49:14 GMT /you-broke-it/ boto: DEBUG: Signature: AWS aws_access_key_id:Sy9u+sHaYcVAlgRndJo4iOD3mCY= boto: DEBUG: Final headers: {'Date': 'Wed, 31 May 2017 16:49:14 GMT', 'Content-Length': '0', 'Authorization': u'AWS aws_access_key_id:Sy9u+sHaYcVAlgRndJo4iOD3mCY=', 'User-Agent': 'Boto/2.44.0 Python/2.7.13 Linux/4.10.0-21-generic'} boto: DEBUG: Response headers: [('x-amz-id-2', 'R8k7qp47lyMqK4+O5bc5vLcFHbwHB64IifV0XEyEdJSNC7q1FGe3o/7LkUGjkR3eYBjDwyE8Oz8='), ('server', 'AmazonS3'), ('transfer-encoding', 'chunked'), ('x-amz-request-id', 'E92141CA21DA2EEC'), ('date', 'Wed, 31 May 2017 16:49:14 GMT'), ('content-type', 'application/xml')] --------------------- >> end captured logging << --------------------- ---------------------------------------------------------------------- Ran 1056 tests in 161.588s FAILED (SKIP=8, errors=453, failures=8) autopkgtest [16:50:06]: test unit: -----------------------] autopkgtest [16:50:06]: test unit: - - - - - - - - - - results - - - - - - - - - - unit FAIL non-zero exit status 1 autopkgtest [16:50:06]: @@@@@@@@@@@@@@@@@@@@ summary unit FAIL non-zero exit status 1 Exit request sent. Creating nova instance adt-artful-amd64-python-boto-20170531-164447 from image ubuntu/ubuntu-artful-adt-amd64-server-20170531.img (UUID a7f4edf3-b50f-4bf1-91d8-754f1fa6dba7)...