Source: trapperkeeper-status-clojure
Version: 1.1.1-4
Severity: serious
Justification: FTBFS
Tags: trixie sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-20240615 ftbfs-trixie

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.


Relevant part (hopefully):
> make[1]: Entering directory '/<<PKGBUILDDIR>>'
> lein test
> SLF4J: Class path contains multiple SLF4J bindings.
> SLF4J: Found binding in 
> [jar:file:/usr/share/java/logback-classic.jar!/org/slf4j/impl/StaticLoggerBinder.class]
> SLF4J: Found binding in 
> [jar:file:/usr/share/java/logback-classic-1.2.11.jar!/org/slf4j/impl/StaticLoggerBinder.class]
> SLF4J: See http://www.slf4j.org/codes.html#multiple_bindings for an 
> explanation.
> SLF4J: Actual binding is of type 
> [ch.qos.logback.classic.util.ContextSelectorStaticBinder]
> 
> lein test puppetlabs.trapperkeeper.services.status.check-test
> 
> lein test puppetlabs.trapperkeeper.services.status.status-core-test
> 
> lein test puppetlabs.trapperkeeper.services.status.status-proxy-service-test
> 
> lein test :only 
> puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-only-proxies-what-it-should-test
> 
> ERROR in (proxy-only-proxies-what-it-should-test) (Alert.java:131)
> Uncaught exception, not in assertion.
> expected: nil
>   actual: javax.net.ssl.SSLHandshakeException: PKIX path validation failed: 
> java.security.cert.CertPathValidatorException: validity check failed
>  at sun.security.ssl.Alert.createSSLException (Alert.java:131)
>     sun.security.ssl.TransportContext.fatal (TransportContext.java:378)
>     sun.security.ssl.TransportContext.fatal (TransportContext.java:321)
>     sun.security.ssl.TransportContext.fatal (TransportContext.java:316)
>     
> sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts 
> (CertificateMessage.java:1351)
>     
> sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate
>  (CertificateMessage.java:1226)
>     sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume 
> (CertificateMessage.java:1169)
>     sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396)
>     sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
> (SSLEngineImpl.java:1277)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
> (SSLEngineImpl.java:1264)
>     java.security.AccessController.doPrivileged (AccessController.java:712)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask 
> (SSLIOSession.java:289)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake 
> (SSLIOSession.java:357)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady 
> (SSLIOSession.java:545)
>     org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady 
> (AbstractIODispatch.java:120)
>     org.apache.http.impl.nio.reactor.BaseIOReactor.readable 
> (BaseIOReactor.java:162)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent 
> (AbstractIOReactor.java:337)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents 
> (AbstractIOReactor.java:315)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.execute 
> (AbstractIOReactor.java:276)
>     org.apache.http.impl.nio.reactor.BaseIOReactor.execute 
> (BaseIOReactor.java:104)
>     org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run 
> (AbstractMultiworkerIOReactor.java:591)
>     java.lang.Thread.run (Thread.java:840)
> Caused by: sun.security.validator.ValidatorException: PKIX path validation 
> failed: java.security.cert.CertPathValidatorException: validity check failed
>  at sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:369)
>     sun.security.validator.PKIXValidator.engineValidate 
> (PKIXValidator.java:275)
>     sun.security.validator.Validator.validate (Validator.java:264)
>     sun.security.ssl.X509TrustManagerImpl.checkTrusted 
> (X509TrustManagerImpl.java:285)
>     sun.security.ssl.X509TrustManagerImpl.checkServerTrusted 
> (X509TrustManagerImpl.java:144)
>     
> sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts 
> (CertificateMessage.java:1329)
>     
> sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate
>  (CertificateMessage.java:1226)
>     sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume 
> (CertificateMessage.java:1169)
>     sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396)
>     sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
> (SSLEngineImpl.java:1277)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
> (SSLEngineImpl.java:1264)
>     java.security.AccessController.doPrivileged (AccessController.java:712)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask 
> (SSLIOSession.java:289)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake 
> (SSLIOSession.java:357)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady 
> (SSLIOSession.java:545)
>     org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady 
> (AbstractIODispatch.java:120)
>     org.apache.http.impl.nio.reactor.BaseIOReactor.readable 
> (BaseIOReactor.java:162)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent 
> (AbstractIOReactor.java:337)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents 
> (AbstractIOReactor.java:315)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.execute 
> (AbstractIOReactor.java:276)
>     org.apache.http.impl.nio.reactor.BaseIOReactor.execute 
> (BaseIOReactor.java:104)
>     org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run 
> (AbstractMultiworkerIOReactor.java:591)
>     java.lang.Thread.run (Thread.java:840)
> Caused by: java.security.cert.CertPathValidatorException: validity check 
> failed
>  at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate 
> (PKIXMasterCertPathValidator.java:135)
>     sun.security.provider.certpath.PKIXCertPathValidator.validate 
> (PKIXCertPathValidator.java:224)
>     sun.security.provider.certpath.PKIXCertPathValidator.validate 
> (PKIXCertPathValidator.java:144)
>     sun.security.provider.certpath.PKIXCertPathValidator.engineValidate 
> (PKIXCertPathValidator.java:83)
>     java.security.cert.CertPathValidator.validate (CertPathValidator.java:309)
>     sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364)
>     sun.security.validator.PKIXValidator.engineValidate 
> (PKIXValidator.java:275)
>     sun.security.validator.Validator.validate (Validator.java:264)
>     sun.security.ssl.X509TrustManagerImpl.checkTrusted 
> (X509TrustManagerImpl.java:285)
>     sun.security.ssl.X509TrustManagerImpl.checkServerTrusted 
> (X509TrustManagerImpl.java:144)
>     
> sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts 
> (CertificateMessage.java:1329)
>     
> sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate
>  (CertificateMessage.java:1226)
>     sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume 
> (CertificateMessage.java:1169)
>     sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396)
>     sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
> (SSLEngineImpl.java:1277)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
> (SSLEngineImpl.java:1264)
>     java.security.AccessController.doPrivileged (AccessController.java:712)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask 
> (SSLIOSession.java:289)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake 
> (SSLIOSession.java:357)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady 
> (SSLIOSession.java:545)
>     org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady 
> (AbstractIODispatch.java:120)
>     org.apache.http.impl.nio.reactor.BaseIOReactor.readable 
> (BaseIOReactor.java:162)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent 
> (AbstractIOReactor.java:337)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents 
> (AbstractIOReactor.java:315)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.execute 
> (AbstractIOReactor.java:276)
>     org.apache.http.impl.nio.reactor.BaseIOReactor.execute 
> (BaseIOReactor.java:104)
>     org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run 
> (AbstractMultiworkerIOReactor.java:591)
>     java.lang.Thread.run (Thread.java:840)
> Caused by: java.security.cert.CertificateExpiredException: NotAfter: Sat Jun 
> 08 21:21:40 UTC 2024
>  at sun.security.x509.CertificateValidity.valid (CertificateValidity.java:277)
>     sun.security.x509.X509CertImpl.checkValidity (X509CertImpl.java:621)
>     sun.security.provider.certpath.BasicChecker.verifyValidity 
> (BasicChecker.java:190)
>     sun.security.provider.certpath.BasicChecker.check (BasicChecker.java:144)
>     sun.security.provider.certpath.PKIXMasterCertPathValidator.validate 
> (PKIXMasterCertPathValidator.java:125)
>     sun.security.provider.certpath.PKIXCertPathValidator.validate 
> (PKIXCertPathValidator.java:224)
>     sun.security.provider.certpath.PKIXCertPathValidator.validate 
> (PKIXCertPathValidator.java:144)
>     sun.security.provider.certpath.PKIXCertPathValidator.engineValidate 
> (PKIXCertPathValidator.java:83)
>     java.security.cert.CertPathValidator.validate (CertPathValidator.java:309)
>     sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364)
>     sun.security.validator.PKIXValidator.engineValidate 
> (PKIXValidator.java:275)
>     sun.security.validator.Validator.validate (Validator.java:264)
>     sun.security.ssl.X509TrustManagerImpl.checkTrusted 
> (X509TrustManagerImpl.java:285)
>     sun.security.ssl.X509TrustManagerImpl.checkServerTrusted 
> (X509TrustManagerImpl.java:144)
>     
> sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts 
> (CertificateMessage.java:1329)
>     
> sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate
>  (CertificateMessage.java:1226)
>     sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume 
> (CertificateMessage.java:1169)
>     sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396)
>     sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
> (SSLEngineImpl.java:1277)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
> (SSLEngineImpl.java:1264)
>     java.security.AccessController.doPrivileged (AccessController.java:712)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask 
> (SSLIOSession.java:289)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake 
> (SSLIOSession.java:357)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady 
> (SSLIOSession.java:545)
>     org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady 
> (AbstractIODispatch.java:120)
>     org.apache.http.impl.nio.reactor.BaseIOReactor.readable 
> (BaseIOReactor.java:162)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent 
> (AbstractIOReactor.java:337)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents 
> (AbstractIOReactor.java:315)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.execute 
> (AbstractIOReactor.java:276)
>     org.apache.http.impl.nio.reactor.BaseIOReactor.execute 
> (BaseIOReactor.java:104)
>     org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run 
> (AbstractMultiworkerIOReactor.java:591)
>     java.lang.Thread.run (Thread.java:840)
> 
> lein test :only 
> puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test
> 
> FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:76)
> status-proxy-service can connect to https status-service service correctly 
> proxying plain url
> expected: (= 200 (:status resp))
>   actual: (not (= 200 502))
> 
> lein test :only 
> puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test
> 
> FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:77)
> status-proxy-service can connect to https status-service service correctly 
> proxying plain url
> expected: (= {"bar" {"service_version" "0.1.0", "service_status_version" 1, 
> "state" "running", "detail_level" "info", "active_alerts" [], "status" "bar 
> status 1 :info"}, "foo" {"service_version" "1.1.0", "service_status_version" 
> 2, "state" "running", "detail_level" "info", "active_alerts" [], "status" 
> "foo status 2 :info"}} (dissoc body "status-service"))
>   actual: (not (= {"bar" {"service_version" "0.1.0", "service_status_version" 
> 1, "state" "running", "detail_level" "info", "active_alerts" [], "status" 
> "bar status 1 :info"}, "foo" {"service_version" "1.1.0", 
> "service_status_version" 2, "state" "running", "detail_level" "info", 
> "active_alerts" [], "status" "foo status 2 :info"}} nil))
> 
> lein test :only 
> puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test
> 
> FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:93)
> status-proxy-service can connect to https status-service service correctly 
> proxying url with query param
> expected: (= 200 (:status resp))
>   actual: (not (= 200 502))
> 
> lein test :only 
> puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test
> 
> FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:94)
> status-proxy-service can connect to https status-service service correctly 
> proxying url with query param
> expected: (= {"bar" {"service_version" "0.1.0", "service_status_version" 1, 
> "state" "running", "detail_level" "debug", "active_alerts" [], "status" "bar 
> status 1 :debug"}, "foo" {"service_version" "1.1.0", "service_status_version" 
> 2, "state" "running", "detail_level" "debug", "active_alerts" [], "status" 
> "foo status 2 :debug"}} (dissoc body "status-service"))
>   actual: (not (= {"bar" {"service_version" "0.1.0", "service_status_version" 
> 1, "state" "running", "detail_level" "debug", "active_alerts" [], "status" 
> "bar status 1 :debug"}, "foo" {"service_version" "1.1.0", 
> "service_status_version" 2, "state" "running", "detail_level" "debug", 
> "active_alerts" [], "status" "foo status 2 :debug"}} nil))
> 
> lein test :only 
> puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test
> 
> FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:110)
> status-proxy-service can connect to https status-service service correctly 
> proxying specific service
> expected: (= 200 (:status resp))
>   actual: (not (= 200 502))
> 
> lein test :only 
> puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test
> 
> FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:111)
> status-proxy-service can connect to https status-service service correctly 
> proxying specific service
> expected: (= {"service_version" "1.1.0", "service_status_version" 2, "state" 
> "running", "detail_level" "info", "status" "foo status 2 :info", 
> "active_alerts" [], "service_name" "foo"} body)
>   actual: (not (= {"service_version" "1.1.0", "service_status_version" 2, 
> "state" "running", "detail_level" "info", "status" "foo status 2 :info", 
> "active_alerts" [], "service_name" "foo"} nil))
> 
> lein test puppetlabs.trapperkeeper.services.status.status-service-test
> 2024-06-16 11:51:35,464 DEBUG [o.e.j.i.ManagedSelector] Destroyed 
> SocketChannelEndPoint@31c10df9{l=/127.0.0.1:8180,r=/127.0.0.1:48570,CLOSED,fill=-,flush=-,to=1/30000}{io=0/0,kio=-1,kro=-1}->HttpConnection@430675c6[p=HttpParser{s=CLOSED,0
>  of 
> -1},g=HttpGenerator@3d3120e0{s=START}]=>HttpChannelOverHttp@6014ee76{s=HttpChannelState@78a0448c{s=IDLE
>  rs=BLOCKING os=OPEN is=IDLE awp=false se=false i=true 
> al=0},r=1,c=false/false,a=IDLE,uri=null,age=0}
> 
> lein test :only 
> puppetlabs.trapperkeeper.services.status.status-service-test/auth-service-ssl-status-endpoint-test
> 
> ERROR in (auth-service-ssl-status-endpoint-test) (Alert.java:131)
> Uncaught exception, not in assertion.
> expected: nil
>   actual: javax.net.ssl.SSLHandshakeException: PKIX path validation failed: 
> java.security.cert.CertPathValidatorException: validity check failed
>  at sun.security.ssl.Alert.createSSLException (Alert.java:131)
>     sun.security.ssl.TransportContext.fatal (TransportContext.java:378)
>     sun.security.ssl.TransportContext.fatal (TransportContext.java:321)
>     sun.security.ssl.TransportContext.fatal (TransportContext.java:316)
>     
> sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts 
> (CertificateMessage.java:1351)
>     
> sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate
>  (CertificateMessage.java:1226)
>     sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume 
> (CertificateMessage.java:1169)
>     sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396)
>     sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
> (SSLEngineImpl.java:1277)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
> (SSLEngineImpl.java:1264)
>     java.security.AccessController.doPrivileged (AccessController.java:712)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask 
> (SSLIOSession.java:289)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake 
> (SSLIOSession.java:357)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady 
> (SSLIOSession.java:545)
>     org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady 
> (AbstractIODispatch.java:120)
>     org.apache.http.impl.nio.reactor.BaseIOReactor.readable 
> (BaseIOReactor.java:162)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent 
> (AbstractIOReactor.java:337)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents 
> (AbstractIOReactor.java:315)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.execute 
> (AbstractIOReactor.java:276)
>     org.apache.http.impl.nio.reactor.BaseIOReactor.execute 
> (BaseIOReactor.java:104)
>     org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run 
> (AbstractMultiworkerIOReactor.java:591)
>     java.lang.Thread.run (Thread.java:840)
> Caused by: sun.security.validator.ValidatorException: PKIX path validation 
> failed: java.security.cert.CertPathValidatorException: validity check failed
>  at sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:369)
>     sun.security.validator.PKIXValidator.engineValidate 
> (PKIXValidator.java:275)
>     sun.security.validator.Validator.validate (Validator.java:264)
>     sun.security.ssl.X509TrustManagerImpl.checkTrusted 
> (X509TrustManagerImpl.java:285)
>     sun.security.ssl.X509TrustManagerImpl.checkServerTrusted 
> (X509TrustManagerImpl.java:144)
>     
> sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts 
> (CertificateMessage.java:1329)
>     
> sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate
>  (CertificateMessage.java:1226)
>     sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume 
> (CertificateMessage.java:1169)
>     sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396)
>     sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
> (SSLEngineImpl.java:1277)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
> (SSLEngineImpl.java:1264)
>     java.security.AccessController.doPrivileged (AccessController.java:712)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask 
> (SSLIOSession.java:289)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake 
> (SSLIOSession.java:357)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady 
> (SSLIOSession.java:545)
>     org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady 
> (AbstractIODispatch.java:120)
>     org.apache.http.impl.nio.reactor.BaseIOReactor.readable 
> (BaseIOReactor.java:162)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent 
> (AbstractIOReactor.java:337)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents 
> (AbstractIOReactor.java:315)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.execute 
> (AbstractIOReactor.java:276)
>     org.apache.http.impl.nio.reactor.BaseIOReactor.execute 
> (BaseIOReactor.java:104)
>     org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run 
> (AbstractMultiworkerIOReactor.java:591)
>     java.lang.Thread.run (Thread.java:840)
> Caused by: java.security.cert.CertPathValidatorException: validity check 
> failed
>  at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate 
> (PKIXMasterCertPathValidator.java:135)
>     sun.security.provider.certpath.PKIXCertPathValidator.validate 
> (PKIXCertPathValidator.java:224)
>     sun.security.provider.certpath.PKIXCertPathValidator.validate 
> (PKIXCertPathValidator.java:144)
>     sun.security.provider.certpath.PKIXCertPathValidator.engineValidate 
> (PKIXCertPathValidator.java:83)
>     java.security.cert.CertPathValidator.validate (CertPathValidator.java:309)
>     sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364)
>     sun.security.validator.PKIXValidator.engineValidate 
> (PKIXValidator.java:275)
>     sun.security.validator.Validator.validate (Validator.java:264)
>     sun.security.ssl.X509TrustManagerImpl.checkTrusted 
> (X509TrustManagerImpl.java:285)
>     sun.security.ssl.X509TrustManagerImpl.checkServerTrusted 
> (X509TrustManagerImpl.java:144)
>     
> sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts 
> (CertificateMessage.java:1329)
>     
> sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate
>  (CertificateMessage.java:1226)
>     sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume 
> (CertificateMessage.java:1169)
>     sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396)
>     sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
> (SSLEngineImpl.java:1277)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
> (SSLEngineImpl.java:1264)
>     java.security.AccessController.doPrivileged (AccessController.java:712)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask 
> (SSLIOSession.java:289)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake 
> (SSLIOSession.java:357)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady 
> (SSLIOSession.java:545)
>     org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady 
> (AbstractIODispatch.java:120)
>     org.apache.http.impl.nio.reactor.BaseIOReactor.readable 
> (BaseIOReactor.java:162)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent 
> (AbstractIOReactor.java:337)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents 
> (AbstractIOReactor.java:315)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.execute 
> (AbstractIOReactor.java:276)
>     org.apache.http.impl.nio.reactor.BaseIOReactor.execute 
> (BaseIOReactor.java:104)
>     org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run 
> (AbstractMultiworkerIOReactor.java:591)
>     java.lang.Thread.run (Thread.java:840)
> Caused by: java.security.cert.CertificateExpiredException: NotAfter: Sat Jun 
> 08 21:21:40 UTC 2024
>  at sun.security.x509.CertificateValidity.valid (CertificateValidity.java:277)
>     sun.security.x509.X509CertImpl.checkValidity (X509CertImpl.java:621)
>     sun.security.provider.certpath.BasicChecker.verifyValidity 
> (BasicChecker.java:190)
>     sun.security.provider.certpath.BasicChecker.check (BasicChecker.java:144)
>     sun.security.provider.certpath.PKIXMasterCertPathValidator.validate 
> (PKIXMasterCertPathValidator.java:125)
>     sun.security.provider.certpath.PKIXCertPathValidator.validate 
> (PKIXCertPathValidator.java:224)
>     sun.security.provider.certpath.PKIXCertPathValidator.validate 
> (PKIXCertPathValidator.java:144)
>     sun.security.provider.certpath.PKIXCertPathValidator.engineValidate 
> (PKIXCertPathValidator.java:83)
>     java.security.cert.CertPathValidator.validate (CertPathValidator.java:309)
>     sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364)
>     sun.security.validator.PKIXValidator.engineValidate 
> (PKIXValidator.java:275)
>     sun.security.validator.Validator.validate (Validator.java:264)
>     sun.security.ssl.X509TrustManagerImpl.checkTrusted 
> (X509TrustManagerImpl.java:285)
>     sun.security.ssl.X509TrustManagerImpl.checkServerTrusted 
> (X509TrustManagerImpl.java:144)
>     
> sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts 
> (CertificateMessage.java:1329)
>     
> sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate
>  (CertificateMessage.java:1226)
>     sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume 
> (CertificateMessage.java:1169)
>     sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396)
>     sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
> (SSLEngineImpl.java:1277)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
> (SSLEngineImpl.java:1264)
>     java.security.AccessController.doPrivileged (AccessController.java:712)
>     sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask 
> (SSLIOSession.java:289)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake 
> (SSLIOSession.java:357)
>     org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady 
> (SSLIOSession.java:545)
>     org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady 
> (AbstractIODispatch.java:120)
>     org.apache.http.impl.nio.reactor.BaseIOReactor.readable 
> (BaseIOReactor.java:162)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent 
> (AbstractIOReactor.java:337)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents 
> (AbstractIOReactor.java:315)
>     org.apache.http.impl.nio.reactor.AbstractIOReactor.execute 
> (AbstractIOReactor.java:276)
>     org.apache.http.impl.nio.reactor.BaseIOReactor.execute 
> (BaseIOReactor.java:104)
>     org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run 
> (AbstractMultiworkerIOReactor.java:591)
>     java.lang.Thread.run (Thread.java:840)
> 
> Ran 24 tests containing 152 assertions.
> 6 failures, 2 errors.
> Tests failed.
> make[1]: *** [debian/rules:25: override_dh_auto_test] Error 1


The full build log is available from:
http://qa-logs.debian.net/2024/06/15/trapperkeeper-status-clojure_1.1.1-4_unstable.log

All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20240615;users=lu...@debian.org
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20240615&fusertaguser=lu...@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

If you reassign this bug to another package, please mark it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.

Reply via email to