Your message dated Sun, 30 Jun 2024 05:19:25 +0000 with message-id <e1snmyd-00cbe0...@fasolo.debian.org> and subject line Bug#1073417: fixed in trapperkeeper-status-clojure 1.1.1-5 has caused the Debian Bug report #1073417, regarding trapperkeeper-status-clojure: FTBFS: make[1]: *** [debian/rules:25: override_dh_auto_test] Error 1 to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1073417: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073417 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Source: trapperkeeper-status-clojure Version: 1.1.1-4 Severity: serious Justification: FTBFS Tags: trixie sid ftbfs User: lu...@debian.org Usertags: ftbfs-20240615 ftbfs-trixie Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part (hopefully): > make[1]: Entering directory '/<<PKGBUILDDIR>>' > lein test > SLF4J: Class path contains multiple SLF4J bindings. > SLF4J: Found binding in > [jar:file:/usr/share/java/logback-classic.jar!/org/slf4j/impl/StaticLoggerBinder.class] > SLF4J: Found binding in > [jar:file:/usr/share/java/logback-classic-1.2.11.jar!/org/slf4j/impl/StaticLoggerBinder.class] > SLF4J: See http://www.slf4j.org/codes.html#multiple_bindings for an > explanation. > SLF4J: Actual binding is of type > [ch.qos.logback.classic.util.ContextSelectorStaticBinder] > > lein test puppetlabs.trapperkeeper.services.status.check-test > > lein test puppetlabs.trapperkeeper.services.status.status-core-test > > lein test puppetlabs.trapperkeeper.services.status.status-proxy-service-test > > lein test :only > puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-only-proxies-what-it-should-test > > ERROR in (proxy-only-proxies-what-it-should-test) (Alert.java:131) > Uncaught exception, not in assertion. > expected: nil > actual: javax.net.ssl.SSLHandshakeException: PKIX path validation failed: > java.security.cert.CertPathValidatorException: validity check failed > at sun.security.ssl.Alert.createSSLException (Alert.java:131) > sun.security.ssl.TransportContext.fatal (TransportContext.java:378) > sun.security.ssl.TransportContext.fatal (TransportContext.java:321) > sun.security.ssl.TransportContext.fatal (TransportContext.java:316) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts > (CertificateMessage.java:1351) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate > (CertificateMessage.java:1226) > sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume > (CertificateMessage.java:1169) > sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396) > sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1277) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1264) > java.security.AccessController.doPrivileged (AccessController.java:712) > sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209) > org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask > (SSLIOSession.java:289) > org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake > (SSLIOSession.java:357) > org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady > (SSLIOSession.java:545) > org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady > (AbstractIODispatch.java:120) > org.apache.http.impl.nio.reactor.BaseIOReactor.readable > (BaseIOReactor.java:162) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent > (AbstractIOReactor.java:337) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents > (AbstractIOReactor.java:315) > org.apache.http.impl.nio.reactor.AbstractIOReactor.execute > (AbstractIOReactor.java:276) > org.apache.http.impl.nio.reactor.BaseIOReactor.execute > (BaseIOReactor.java:104) > org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run > (AbstractMultiworkerIOReactor.java:591) > java.lang.Thread.run (Thread.java:840) > Caused by: sun.security.validator.ValidatorException: PKIX path validation > failed: java.security.cert.CertPathValidatorException: validity check failed > at sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:369) > sun.security.validator.PKIXValidator.engineValidate > (PKIXValidator.java:275) > sun.security.validator.Validator.validate (Validator.java:264) > sun.security.ssl.X509TrustManagerImpl.checkTrusted > (X509TrustManagerImpl.java:285) > sun.security.ssl.X509TrustManagerImpl.checkServerTrusted > (X509TrustManagerImpl.java:144) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts > (CertificateMessage.java:1329) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate > (CertificateMessage.java:1226) > sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume > (CertificateMessage.java:1169) > sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396) > sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1277) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1264) > java.security.AccessController.doPrivileged (AccessController.java:712) > sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209) > org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask > (SSLIOSession.java:289) > org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake > (SSLIOSession.java:357) > org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady > (SSLIOSession.java:545) > org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady > (AbstractIODispatch.java:120) > org.apache.http.impl.nio.reactor.BaseIOReactor.readable > (BaseIOReactor.java:162) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent > (AbstractIOReactor.java:337) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents > (AbstractIOReactor.java:315) > org.apache.http.impl.nio.reactor.AbstractIOReactor.execute > (AbstractIOReactor.java:276) > org.apache.http.impl.nio.reactor.BaseIOReactor.execute > (BaseIOReactor.java:104) > org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run > (AbstractMultiworkerIOReactor.java:591) > java.lang.Thread.run (Thread.java:840) > Caused by: java.security.cert.CertPathValidatorException: validity check > failed > at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate > (PKIXMasterCertPathValidator.java:135) > sun.security.provider.certpath.PKIXCertPathValidator.validate > (PKIXCertPathValidator.java:224) > sun.security.provider.certpath.PKIXCertPathValidator.validate > (PKIXCertPathValidator.java:144) > sun.security.provider.certpath.PKIXCertPathValidator.engineValidate > (PKIXCertPathValidator.java:83) > java.security.cert.CertPathValidator.validate (CertPathValidator.java:309) > sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364) > sun.security.validator.PKIXValidator.engineValidate > (PKIXValidator.java:275) > sun.security.validator.Validator.validate (Validator.java:264) > sun.security.ssl.X509TrustManagerImpl.checkTrusted > (X509TrustManagerImpl.java:285) > sun.security.ssl.X509TrustManagerImpl.checkServerTrusted > (X509TrustManagerImpl.java:144) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts > (CertificateMessage.java:1329) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate > (CertificateMessage.java:1226) > sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume > (CertificateMessage.java:1169) > sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396) > sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1277) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1264) > java.security.AccessController.doPrivileged (AccessController.java:712) > sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209) > org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask > (SSLIOSession.java:289) > org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake > (SSLIOSession.java:357) > org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady > (SSLIOSession.java:545) > org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady > (AbstractIODispatch.java:120) > org.apache.http.impl.nio.reactor.BaseIOReactor.readable > (BaseIOReactor.java:162) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent > (AbstractIOReactor.java:337) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents > (AbstractIOReactor.java:315) > org.apache.http.impl.nio.reactor.AbstractIOReactor.execute > (AbstractIOReactor.java:276) > org.apache.http.impl.nio.reactor.BaseIOReactor.execute > (BaseIOReactor.java:104) > org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run > (AbstractMultiworkerIOReactor.java:591) > java.lang.Thread.run (Thread.java:840) > Caused by: java.security.cert.CertificateExpiredException: NotAfter: Sat Jun > 08 21:21:40 UTC 2024 > at sun.security.x509.CertificateValidity.valid (CertificateValidity.java:277) > sun.security.x509.X509CertImpl.checkValidity (X509CertImpl.java:621) > sun.security.provider.certpath.BasicChecker.verifyValidity > (BasicChecker.java:190) > sun.security.provider.certpath.BasicChecker.check (BasicChecker.java:144) > sun.security.provider.certpath.PKIXMasterCertPathValidator.validate > (PKIXMasterCertPathValidator.java:125) > sun.security.provider.certpath.PKIXCertPathValidator.validate > (PKIXCertPathValidator.java:224) > sun.security.provider.certpath.PKIXCertPathValidator.validate > (PKIXCertPathValidator.java:144) > sun.security.provider.certpath.PKIXCertPathValidator.engineValidate > (PKIXCertPathValidator.java:83) > java.security.cert.CertPathValidator.validate (CertPathValidator.java:309) > sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364) > sun.security.validator.PKIXValidator.engineValidate > (PKIXValidator.java:275) > sun.security.validator.Validator.validate (Validator.java:264) > sun.security.ssl.X509TrustManagerImpl.checkTrusted > (X509TrustManagerImpl.java:285) > sun.security.ssl.X509TrustManagerImpl.checkServerTrusted > (X509TrustManagerImpl.java:144) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts > (CertificateMessage.java:1329) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate > (CertificateMessage.java:1226) > sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume > (CertificateMessage.java:1169) > sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396) > sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1277) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1264) > java.security.AccessController.doPrivileged (AccessController.java:712) > sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209) > org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask > (SSLIOSession.java:289) > org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake > (SSLIOSession.java:357) > org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady > (SSLIOSession.java:545) > org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady > (AbstractIODispatch.java:120) > org.apache.http.impl.nio.reactor.BaseIOReactor.readable > (BaseIOReactor.java:162) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent > (AbstractIOReactor.java:337) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents > (AbstractIOReactor.java:315) > org.apache.http.impl.nio.reactor.AbstractIOReactor.execute > (AbstractIOReactor.java:276) > org.apache.http.impl.nio.reactor.BaseIOReactor.execute > (BaseIOReactor.java:104) > org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run > (AbstractMultiworkerIOReactor.java:591) > java.lang.Thread.run (Thread.java:840) > > lein test :only > puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test > > FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:76) > status-proxy-service can connect to https status-service service correctly > proxying plain url > expected: (= 200 (:status resp)) > actual: (not (= 200 502)) > > lein test :only > puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test > > FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:77) > status-proxy-service can connect to https status-service service correctly > proxying plain url > expected: (= {"bar" {"service_version" "0.1.0", "service_status_version" 1, > "state" "running", "detail_level" "info", "active_alerts" [], "status" "bar > status 1 :info"}, "foo" {"service_version" "1.1.0", "service_status_version" > 2, "state" "running", "detail_level" "info", "active_alerts" [], "status" > "foo status 2 :info"}} (dissoc body "status-service")) > actual: (not (= {"bar" {"service_version" "0.1.0", "service_status_version" > 1, "state" "running", "detail_level" "info", "active_alerts" [], "status" > "bar status 1 :info"}, "foo" {"service_version" "1.1.0", > "service_status_version" 2, "state" "running", "detail_level" "info", > "active_alerts" [], "status" "foo status 2 :info"}} nil)) > > lein test :only > puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test > > FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:93) > status-proxy-service can connect to https status-service service correctly > proxying url with query param > expected: (= 200 (:status resp)) > actual: (not (= 200 502)) > > lein test :only > puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test > > FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:94) > status-proxy-service can connect to https status-service service correctly > proxying url with query param > expected: (= {"bar" {"service_version" "0.1.0", "service_status_version" 1, > "state" "running", "detail_level" "debug", "active_alerts" [], "status" "bar > status 1 :debug"}, "foo" {"service_version" "1.1.0", "service_status_version" > 2, "state" "running", "detail_level" "debug", "active_alerts" [], "status" > "foo status 2 :debug"}} (dissoc body "status-service")) > actual: (not (= {"bar" {"service_version" "0.1.0", "service_status_version" > 1, "state" "running", "detail_level" "debug", "active_alerts" [], "status" > "bar status 1 :debug"}, "foo" {"service_version" "1.1.0", > "service_status_version" 2, "state" "running", "detail_level" "debug", > "active_alerts" [], "status" "foo status 2 :debug"}} nil)) > > lein test :only > puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test > > FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:110) > status-proxy-service can connect to https status-service service correctly > proxying specific service > expected: (= 200 (:status resp)) > actual: (not (= 200 502)) > > lein test :only > puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test > > FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:111) > status-proxy-service can connect to https status-service service correctly > proxying specific service > expected: (= {"service_version" "1.1.0", "service_status_version" 2, "state" > "running", "detail_level" "info", "status" "foo status 2 :info", > "active_alerts" [], "service_name" "foo"} body) > actual: (not (= {"service_version" "1.1.0", "service_status_version" 2, > "state" "running", "detail_level" "info", "status" "foo status 2 :info", > "active_alerts" [], "service_name" "foo"} nil)) > > lein test puppetlabs.trapperkeeper.services.status.status-service-test > 2024-06-16 11:51:35,464 DEBUG [o.e.j.i.ManagedSelector] Destroyed > SocketChannelEndPoint@31c10df9{l=/127.0.0.1:8180,r=/127.0.0.1:48570,CLOSED,fill=-,flush=-,to=1/30000}{io=0/0,kio=-1,kro=-1}->HttpConnection@430675c6[p=HttpParser{s=CLOSED,0 > of > -1},g=HttpGenerator@3d3120e0{s=START}]=>HttpChannelOverHttp@6014ee76{s=HttpChannelState@78a0448c{s=IDLE > rs=BLOCKING os=OPEN is=IDLE awp=false se=false i=true > al=0},r=1,c=false/false,a=IDLE,uri=null,age=0} > > lein test :only > puppetlabs.trapperkeeper.services.status.status-service-test/auth-service-ssl-status-endpoint-test > > ERROR in (auth-service-ssl-status-endpoint-test) (Alert.java:131) > Uncaught exception, not in assertion. > expected: nil > actual: javax.net.ssl.SSLHandshakeException: PKIX path validation failed: > java.security.cert.CertPathValidatorException: validity check failed > at sun.security.ssl.Alert.createSSLException (Alert.java:131) > sun.security.ssl.TransportContext.fatal (TransportContext.java:378) > sun.security.ssl.TransportContext.fatal (TransportContext.java:321) > sun.security.ssl.TransportContext.fatal (TransportContext.java:316) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts > (CertificateMessage.java:1351) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate > (CertificateMessage.java:1226) > sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume > (CertificateMessage.java:1169) > sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396) > sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1277) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1264) > java.security.AccessController.doPrivileged (AccessController.java:712) > sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209) > org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask > (SSLIOSession.java:289) > org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake > (SSLIOSession.java:357) > org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady > (SSLIOSession.java:545) > org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady > (AbstractIODispatch.java:120) > org.apache.http.impl.nio.reactor.BaseIOReactor.readable > (BaseIOReactor.java:162) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent > (AbstractIOReactor.java:337) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents > (AbstractIOReactor.java:315) > org.apache.http.impl.nio.reactor.AbstractIOReactor.execute > (AbstractIOReactor.java:276) > org.apache.http.impl.nio.reactor.BaseIOReactor.execute > (BaseIOReactor.java:104) > org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run > (AbstractMultiworkerIOReactor.java:591) > java.lang.Thread.run (Thread.java:840) > Caused by: sun.security.validator.ValidatorException: PKIX path validation > failed: java.security.cert.CertPathValidatorException: validity check failed > at sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:369) > sun.security.validator.PKIXValidator.engineValidate > (PKIXValidator.java:275) > sun.security.validator.Validator.validate (Validator.java:264) > sun.security.ssl.X509TrustManagerImpl.checkTrusted > (X509TrustManagerImpl.java:285) > sun.security.ssl.X509TrustManagerImpl.checkServerTrusted > (X509TrustManagerImpl.java:144) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts > (CertificateMessage.java:1329) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate > (CertificateMessage.java:1226) > sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume > (CertificateMessage.java:1169) > sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396) > sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1277) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1264) > java.security.AccessController.doPrivileged (AccessController.java:712) > sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209) > org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask > (SSLIOSession.java:289) > org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake > (SSLIOSession.java:357) > org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady > (SSLIOSession.java:545) > org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady > (AbstractIODispatch.java:120) > org.apache.http.impl.nio.reactor.BaseIOReactor.readable > (BaseIOReactor.java:162) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent > (AbstractIOReactor.java:337) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents > (AbstractIOReactor.java:315) > org.apache.http.impl.nio.reactor.AbstractIOReactor.execute > (AbstractIOReactor.java:276) > org.apache.http.impl.nio.reactor.BaseIOReactor.execute > (BaseIOReactor.java:104) > org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run > (AbstractMultiworkerIOReactor.java:591) > java.lang.Thread.run (Thread.java:840) > Caused by: java.security.cert.CertPathValidatorException: validity check > failed > at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate > (PKIXMasterCertPathValidator.java:135) > sun.security.provider.certpath.PKIXCertPathValidator.validate > (PKIXCertPathValidator.java:224) > sun.security.provider.certpath.PKIXCertPathValidator.validate > (PKIXCertPathValidator.java:144) > sun.security.provider.certpath.PKIXCertPathValidator.engineValidate > (PKIXCertPathValidator.java:83) > java.security.cert.CertPathValidator.validate (CertPathValidator.java:309) > sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364) > sun.security.validator.PKIXValidator.engineValidate > (PKIXValidator.java:275) > sun.security.validator.Validator.validate (Validator.java:264) > sun.security.ssl.X509TrustManagerImpl.checkTrusted > (X509TrustManagerImpl.java:285) > sun.security.ssl.X509TrustManagerImpl.checkServerTrusted > (X509TrustManagerImpl.java:144) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts > (CertificateMessage.java:1329) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate > (CertificateMessage.java:1226) > sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume > (CertificateMessage.java:1169) > sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396) > sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1277) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1264) > java.security.AccessController.doPrivileged (AccessController.java:712) > sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209) > org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask > (SSLIOSession.java:289) > org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake > (SSLIOSession.java:357) > org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady > (SSLIOSession.java:545) > org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady > (AbstractIODispatch.java:120) > org.apache.http.impl.nio.reactor.BaseIOReactor.readable > (BaseIOReactor.java:162) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent > (AbstractIOReactor.java:337) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents > (AbstractIOReactor.java:315) > org.apache.http.impl.nio.reactor.AbstractIOReactor.execute > (AbstractIOReactor.java:276) > org.apache.http.impl.nio.reactor.BaseIOReactor.execute > (BaseIOReactor.java:104) > org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run > (AbstractMultiworkerIOReactor.java:591) > java.lang.Thread.run (Thread.java:840) > Caused by: java.security.cert.CertificateExpiredException: NotAfter: Sat Jun > 08 21:21:40 UTC 2024 > at sun.security.x509.CertificateValidity.valid (CertificateValidity.java:277) > sun.security.x509.X509CertImpl.checkValidity (X509CertImpl.java:621) > sun.security.provider.certpath.BasicChecker.verifyValidity > (BasicChecker.java:190) > sun.security.provider.certpath.BasicChecker.check (BasicChecker.java:144) > sun.security.provider.certpath.PKIXMasterCertPathValidator.validate > (PKIXMasterCertPathValidator.java:125) > sun.security.provider.certpath.PKIXCertPathValidator.validate > (PKIXCertPathValidator.java:224) > sun.security.provider.certpath.PKIXCertPathValidator.validate > (PKIXCertPathValidator.java:144) > sun.security.provider.certpath.PKIXCertPathValidator.engineValidate > (PKIXCertPathValidator.java:83) > java.security.cert.CertPathValidator.validate (CertPathValidator.java:309) > sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364) > sun.security.validator.PKIXValidator.engineValidate > (PKIXValidator.java:275) > sun.security.validator.Validator.validate (Validator.java:264) > sun.security.ssl.X509TrustManagerImpl.checkTrusted > (X509TrustManagerImpl.java:285) > sun.security.ssl.X509TrustManagerImpl.checkServerTrusted > (X509TrustManagerImpl.java:144) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts > (CertificateMessage.java:1329) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate > (CertificateMessage.java:1226) > sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume > (CertificateMessage.java:1169) > sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396) > sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1277) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1264) > java.security.AccessController.doPrivileged (AccessController.java:712) > sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209) > org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask > (SSLIOSession.java:289) > org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake > (SSLIOSession.java:357) > org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady > (SSLIOSession.java:545) > org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady > (AbstractIODispatch.java:120) > org.apache.http.impl.nio.reactor.BaseIOReactor.readable > (BaseIOReactor.java:162) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent > (AbstractIOReactor.java:337) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents > (AbstractIOReactor.java:315) > org.apache.http.impl.nio.reactor.AbstractIOReactor.execute > (AbstractIOReactor.java:276) > org.apache.http.impl.nio.reactor.BaseIOReactor.execute > (BaseIOReactor.java:104) > org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run > (AbstractMultiworkerIOReactor.java:591) > java.lang.Thread.run (Thread.java:840) > > Ran 24 tests containing 152 assertions. > 6 failures, 2 errors. > Tests failed. > make[1]: *** [debian/rules:25: override_dh_auto_test] Error 1 The full build log is available from: http://qa-logs.debian.net/2024/06/15/trapperkeeper-status-clojure_1.1.1-4_unstable.log All bugs filed during this archive rebuild are listed at: https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20240615;users=lu...@debian.org or: https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20240615&fusertaguser=lu...@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! If you reassign this bug to another package, please mark it as 'affects'-ing this package. See https://www.debian.org/Bugs/server-control#affects If you fail to reproduce this, please provide a build log and diff it with mine so that we can identify if something relevant changed in the meantime.
--- End Message ---
--- Begin Message ---Source: trapperkeeper-status-clojure Source-Version: 1.1.1-5 Done: Louis-Philippe Véronneau <po...@debian.org> We believe that the bug you reported is fixed in the latest version of trapperkeeper-status-clojure, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1073...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Louis-Philippe Véronneau <po...@debian.org> (supplier of updated trapperkeeper-status-clojure package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sun, 30 Jun 2024 00:56:16 -0400 Source: trapperkeeper-status-clojure Architecture: source Version: 1.1.1-5 Distribution: unstable Urgency: medium Maintainer: Debian Clojure Maintainers <team+cloj...@tracker.debian.org> Changed-By: Louis-Philippe Véronneau <po...@debian.org> Closes: 1073417 Changes: trapperkeeper-status-clojure (1.1.1-5) unstable; urgency=medium . * Team upload. * d/rules: regenerate the TLS certs for the tests on the fly. (Closes: #1073417) Checksums-Sha1: cc5f33f2767c51961e57f6faac9a79470f9e4206 2397 trapperkeeper-status-clojure_1.1.1-5.dsc 08906c1764eec48b53d613fee91e0bca125710f0 5348 trapperkeeper-status-clojure_1.1.1-5.debian.tar.xz 56cfc68bae2ef298b1e3a5999387e1ac76ab438b 13138 trapperkeeper-status-clojure_1.1.1-5_amd64.buildinfo Checksums-Sha256: 2dea8c07707eb1f4832e8e196ba1a5cc5dc15fd8af7e664628fe0e3b21427b43 2397 trapperkeeper-status-clojure_1.1.1-5.dsc c6f79edc424808ddf88581022a1fbe73dfd1f203c32172c0fb8f4265628c06e8 5348 trapperkeeper-status-clojure_1.1.1-5.debian.tar.xz b9a4eda82e862e84874e043da80a113c4d3476fcf24ceb99beccf142c425e036 13138 trapperkeeper-status-clojure_1.1.1-5_amd64.buildinfo Files: 2850a2b0487a20ddf048589626f58ca0 2397 java optional trapperkeeper-status-clojure_1.1.1-5.dsc c3d843d49182a9537cb73b29bf3ae20b 5348 java optional trapperkeeper-status-clojure_1.1.1-5.debian.tar.xz 17618a4955e593146c547518cc13d524 13138 java optional trapperkeeper-status-clojure_1.1.1-5_amd64.buildinfo -----BEGIN PGP SIGNATURE----- iHUEARYKAB0WIQTKp0AHB6gWsCAvw830JXpQshz6hQUCZoDl+AAKCRD0JXpQshz6 hbdHAP4wfxhKmbhEJjO8p4hWpwrl4IFeSX8cUL7/Xu2lxwh2/AD/QgMlyC3dPdwZ NFWpnpH2Q9D6URjN3D33rmnguWNThwM= =1wlT -----END PGP SIGNATURE-----pgp9Rb6rllZTN.pgp
Description: PGP signature
--- End Message ---