Source: trapperkeeper-status-clojure Version: 1.1.1-4 Severity: serious Justification: FTBFS Tags: trixie sid ftbfs User: lu...@debian.org Usertags: ftbfs-20240615 ftbfs-trixie
Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part (hopefully): > make[1]: Entering directory '/<<PKGBUILDDIR>>' > lein test > SLF4J: Class path contains multiple SLF4J bindings. > SLF4J: Found binding in > [jar:file:/usr/share/java/logback-classic.jar!/org/slf4j/impl/StaticLoggerBinder.class] > SLF4J: Found binding in > [jar:file:/usr/share/java/logback-classic-1.2.11.jar!/org/slf4j/impl/StaticLoggerBinder.class] > SLF4J: See http://www.slf4j.org/codes.html#multiple_bindings for an > explanation. > SLF4J: Actual binding is of type > [ch.qos.logback.classic.util.ContextSelectorStaticBinder] > > lein test puppetlabs.trapperkeeper.services.status.check-test > > lein test puppetlabs.trapperkeeper.services.status.status-core-test > > lein test puppetlabs.trapperkeeper.services.status.status-proxy-service-test > > lein test :only > puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-only-proxies-what-it-should-test > > ERROR in (proxy-only-proxies-what-it-should-test) (Alert.java:131) > Uncaught exception, not in assertion. > expected: nil > actual: javax.net.ssl.SSLHandshakeException: PKIX path validation failed: > java.security.cert.CertPathValidatorException: validity check failed > at sun.security.ssl.Alert.createSSLException (Alert.java:131) > sun.security.ssl.TransportContext.fatal (TransportContext.java:378) > sun.security.ssl.TransportContext.fatal (TransportContext.java:321) > sun.security.ssl.TransportContext.fatal (TransportContext.java:316) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts > (CertificateMessage.java:1351) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate > (CertificateMessage.java:1226) > sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume > (CertificateMessage.java:1169) > sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396) > sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1277) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1264) > java.security.AccessController.doPrivileged (AccessController.java:712) > sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209) > org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask > (SSLIOSession.java:289) > org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake > (SSLIOSession.java:357) > org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady > (SSLIOSession.java:545) > org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady > (AbstractIODispatch.java:120) > org.apache.http.impl.nio.reactor.BaseIOReactor.readable > (BaseIOReactor.java:162) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent > (AbstractIOReactor.java:337) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents > (AbstractIOReactor.java:315) > org.apache.http.impl.nio.reactor.AbstractIOReactor.execute > (AbstractIOReactor.java:276) > org.apache.http.impl.nio.reactor.BaseIOReactor.execute > (BaseIOReactor.java:104) > org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run > (AbstractMultiworkerIOReactor.java:591) > java.lang.Thread.run (Thread.java:840) > Caused by: sun.security.validator.ValidatorException: PKIX path validation > failed: java.security.cert.CertPathValidatorException: validity check failed > at sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:369) > sun.security.validator.PKIXValidator.engineValidate > (PKIXValidator.java:275) > sun.security.validator.Validator.validate (Validator.java:264) > sun.security.ssl.X509TrustManagerImpl.checkTrusted > (X509TrustManagerImpl.java:285) > sun.security.ssl.X509TrustManagerImpl.checkServerTrusted > (X509TrustManagerImpl.java:144) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts > (CertificateMessage.java:1329) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate > (CertificateMessage.java:1226) > sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume > (CertificateMessage.java:1169) > sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396) > sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1277) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1264) > java.security.AccessController.doPrivileged (AccessController.java:712) > sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209) > org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask > (SSLIOSession.java:289) > org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake > (SSLIOSession.java:357) > org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady > (SSLIOSession.java:545) > org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady > (AbstractIODispatch.java:120) > org.apache.http.impl.nio.reactor.BaseIOReactor.readable > (BaseIOReactor.java:162) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent > (AbstractIOReactor.java:337) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents > (AbstractIOReactor.java:315) > org.apache.http.impl.nio.reactor.AbstractIOReactor.execute > (AbstractIOReactor.java:276) > org.apache.http.impl.nio.reactor.BaseIOReactor.execute > (BaseIOReactor.java:104) > org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run > (AbstractMultiworkerIOReactor.java:591) > java.lang.Thread.run (Thread.java:840) > Caused by: java.security.cert.CertPathValidatorException: validity check > failed > at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate > (PKIXMasterCertPathValidator.java:135) > sun.security.provider.certpath.PKIXCertPathValidator.validate > (PKIXCertPathValidator.java:224) > sun.security.provider.certpath.PKIXCertPathValidator.validate > (PKIXCertPathValidator.java:144) > sun.security.provider.certpath.PKIXCertPathValidator.engineValidate > (PKIXCertPathValidator.java:83) > java.security.cert.CertPathValidator.validate (CertPathValidator.java:309) > sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364) > sun.security.validator.PKIXValidator.engineValidate > (PKIXValidator.java:275) > sun.security.validator.Validator.validate (Validator.java:264) > sun.security.ssl.X509TrustManagerImpl.checkTrusted > (X509TrustManagerImpl.java:285) > sun.security.ssl.X509TrustManagerImpl.checkServerTrusted > (X509TrustManagerImpl.java:144) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts > (CertificateMessage.java:1329) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate > (CertificateMessage.java:1226) > sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume > (CertificateMessage.java:1169) > sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396) > sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1277) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1264) > java.security.AccessController.doPrivileged (AccessController.java:712) > sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209) > org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask > (SSLIOSession.java:289) > org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake > (SSLIOSession.java:357) > org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady > (SSLIOSession.java:545) > org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady > (AbstractIODispatch.java:120) > org.apache.http.impl.nio.reactor.BaseIOReactor.readable > (BaseIOReactor.java:162) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent > (AbstractIOReactor.java:337) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents > (AbstractIOReactor.java:315) > org.apache.http.impl.nio.reactor.AbstractIOReactor.execute > (AbstractIOReactor.java:276) > org.apache.http.impl.nio.reactor.BaseIOReactor.execute > (BaseIOReactor.java:104) > org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run > (AbstractMultiworkerIOReactor.java:591) > java.lang.Thread.run (Thread.java:840) > Caused by: java.security.cert.CertificateExpiredException: NotAfter: Sat Jun > 08 21:21:40 UTC 2024 > at sun.security.x509.CertificateValidity.valid (CertificateValidity.java:277) > sun.security.x509.X509CertImpl.checkValidity (X509CertImpl.java:621) > sun.security.provider.certpath.BasicChecker.verifyValidity > (BasicChecker.java:190) > sun.security.provider.certpath.BasicChecker.check (BasicChecker.java:144) > sun.security.provider.certpath.PKIXMasterCertPathValidator.validate > (PKIXMasterCertPathValidator.java:125) > sun.security.provider.certpath.PKIXCertPathValidator.validate > (PKIXCertPathValidator.java:224) > sun.security.provider.certpath.PKIXCertPathValidator.validate > (PKIXCertPathValidator.java:144) > sun.security.provider.certpath.PKIXCertPathValidator.engineValidate > (PKIXCertPathValidator.java:83) > java.security.cert.CertPathValidator.validate (CertPathValidator.java:309) > sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364) > sun.security.validator.PKIXValidator.engineValidate > (PKIXValidator.java:275) > sun.security.validator.Validator.validate (Validator.java:264) > sun.security.ssl.X509TrustManagerImpl.checkTrusted > (X509TrustManagerImpl.java:285) > sun.security.ssl.X509TrustManagerImpl.checkServerTrusted > (X509TrustManagerImpl.java:144) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts > (CertificateMessage.java:1329) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate > (CertificateMessage.java:1226) > sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume > (CertificateMessage.java:1169) > sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396) > sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1277) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1264) > java.security.AccessController.doPrivileged (AccessController.java:712) > sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209) > org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask > (SSLIOSession.java:289) > org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake > (SSLIOSession.java:357) > org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady > (SSLIOSession.java:545) > org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady > (AbstractIODispatch.java:120) > org.apache.http.impl.nio.reactor.BaseIOReactor.readable > (BaseIOReactor.java:162) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent > (AbstractIOReactor.java:337) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents > (AbstractIOReactor.java:315) > org.apache.http.impl.nio.reactor.AbstractIOReactor.execute > (AbstractIOReactor.java:276) > org.apache.http.impl.nio.reactor.BaseIOReactor.execute > (BaseIOReactor.java:104) > org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run > (AbstractMultiworkerIOReactor.java:591) > java.lang.Thread.run (Thread.java:840) > > lein test :only > puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test > > FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:76) > status-proxy-service can connect to https status-service service correctly > proxying plain url > expected: (= 200 (:status resp)) > actual: (not (= 200 502)) > > lein test :only > puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test > > FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:77) > status-proxy-service can connect to https status-service service correctly > proxying plain url > expected: (= {"bar" {"service_version" "0.1.0", "service_status_version" 1, > "state" "running", "detail_level" "info", "active_alerts" [], "status" "bar > status 1 :info"}, "foo" {"service_version" "1.1.0", "service_status_version" > 2, "state" "running", "detail_level" "info", "active_alerts" [], "status" > "foo status 2 :info"}} (dissoc body "status-service")) > actual: (not (= {"bar" {"service_version" "0.1.0", "service_status_version" > 1, "state" "running", "detail_level" "info", "active_alerts" [], "status" > "bar status 1 :info"}, "foo" {"service_version" "1.1.0", > "service_status_version" 2, "state" "running", "detail_level" "info", > "active_alerts" [], "status" "foo status 2 :info"}} nil)) > > lein test :only > puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test > > FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:93) > status-proxy-service can connect to https status-service service correctly > proxying url with query param > expected: (= 200 (:status resp)) > actual: (not (= 200 502)) > > lein test :only > puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test > > FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:94) > status-proxy-service can connect to https status-service service correctly > proxying url with query param > expected: (= {"bar" {"service_version" "0.1.0", "service_status_version" 1, > "state" "running", "detail_level" "debug", "active_alerts" [], "status" "bar > status 1 :debug"}, "foo" {"service_version" "1.1.0", "service_status_version" > 2, "state" "running", "detail_level" "debug", "active_alerts" [], "status" > "foo status 2 :debug"}} (dissoc body "status-service")) > actual: (not (= {"bar" {"service_version" "0.1.0", "service_status_version" > 1, "state" "running", "detail_level" "debug", "active_alerts" [], "status" > "bar status 1 :debug"}, "foo" {"service_version" "1.1.0", > "service_status_version" 2, "state" "running", "detail_level" "debug", > "active_alerts" [], "status" "foo status 2 :debug"}} nil)) > > lein test :only > puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test > > FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:110) > status-proxy-service can connect to https status-service service correctly > proxying specific service > expected: (= 200 (:status resp)) > actual: (not (= 200 502)) > > lein test :only > puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test > > FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:111) > status-proxy-service can connect to https status-service service correctly > proxying specific service > expected: (= {"service_version" "1.1.0", "service_status_version" 2, "state" > "running", "detail_level" "info", "status" "foo status 2 :info", > "active_alerts" [], "service_name" "foo"} body) > actual: (not (= {"service_version" "1.1.0", "service_status_version" 2, > "state" "running", "detail_level" "info", "status" "foo status 2 :info", > "active_alerts" [], "service_name" "foo"} nil)) > > lein test puppetlabs.trapperkeeper.services.status.status-service-test > 2024-06-16 11:51:35,464 DEBUG [o.e.j.i.ManagedSelector] Destroyed > SocketChannelEndPoint@31c10df9{l=/127.0.0.1:8180,r=/127.0.0.1:48570,CLOSED,fill=-,flush=-,to=1/30000}{io=0/0,kio=-1,kro=-1}->HttpConnection@430675c6[p=HttpParser{s=CLOSED,0 > of > -1},g=HttpGenerator@3d3120e0{s=START}]=>HttpChannelOverHttp@6014ee76{s=HttpChannelState@78a0448c{s=IDLE > rs=BLOCKING os=OPEN is=IDLE awp=false se=false i=true > al=0},r=1,c=false/false,a=IDLE,uri=null,age=0} > > lein test :only > puppetlabs.trapperkeeper.services.status.status-service-test/auth-service-ssl-status-endpoint-test > > ERROR in (auth-service-ssl-status-endpoint-test) (Alert.java:131) > Uncaught exception, not in assertion. > expected: nil > actual: javax.net.ssl.SSLHandshakeException: PKIX path validation failed: > java.security.cert.CertPathValidatorException: validity check failed > at sun.security.ssl.Alert.createSSLException (Alert.java:131) > sun.security.ssl.TransportContext.fatal (TransportContext.java:378) > sun.security.ssl.TransportContext.fatal (TransportContext.java:321) > sun.security.ssl.TransportContext.fatal (TransportContext.java:316) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts > (CertificateMessage.java:1351) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate > (CertificateMessage.java:1226) > sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume > (CertificateMessage.java:1169) > sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396) > sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1277) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1264) > java.security.AccessController.doPrivileged (AccessController.java:712) > sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209) > org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask > (SSLIOSession.java:289) > org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake > (SSLIOSession.java:357) > org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady > (SSLIOSession.java:545) > org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady > (AbstractIODispatch.java:120) > org.apache.http.impl.nio.reactor.BaseIOReactor.readable > (BaseIOReactor.java:162) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent > (AbstractIOReactor.java:337) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents > (AbstractIOReactor.java:315) > org.apache.http.impl.nio.reactor.AbstractIOReactor.execute > (AbstractIOReactor.java:276) > org.apache.http.impl.nio.reactor.BaseIOReactor.execute > (BaseIOReactor.java:104) > org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run > (AbstractMultiworkerIOReactor.java:591) > java.lang.Thread.run (Thread.java:840) > Caused by: sun.security.validator.ValidatorException: PKIX path validation > failed: java.security.cert.CertPathValidatorException: validity check failed > at sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:369) > sun.security.validator.PKIXValidator.engineValidate > (PKIXValidator.java:275) > sun.security.validator.Validator.validate (Validator.java:264) > sun.security.ssl.X509TrustManagerImpl.checkTrusted > (X509TrustManagerImpl.java:285) > sun.security.ssl.X509TrustManagerImpl.checkServerTrusted > (X509TrustManagerImpl.java:144) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts > (CertificateMessage.java:1329) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate > (CertificateMessage.java:1226) > sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume > (CertificateMessage.java:1169) > sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396) > sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1277) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1264) > java.security.AccessController.doPrivileged (AccessController.java:712) > sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209) > org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask > (SSLIOSession.java:289) > org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake > (SSLIOSession.java:357) > org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady > (SSLIOSession.java:545) > org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady > (AbstractIODispatch.java:120) > org.apache.http.impl.nio.reactor.BaseIOReactor.readable > (BaseIOReactor.java:162) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent > (AbstractIOReactor.java:337) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents > (AbstractIOReactor.java:315) > org.apache.http.impl.nio.reactor.AbstractIOReactor.execute > (AbstractIOReactor.java:276) > org.apache.http.impl.nio.reactor.BaseIOReactor.execute > (BaseIOReactor.java:104) > org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run > (AbstractMultiworkerIOReactor.java:591) > java.lang.Thread.run (Thread.java:840) > Caused by: java.security.cert.CertPathValidatorException: validity check > failed > at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate > (PKIXMasterCertPathValidator.java:135) > sun.security.provider.certpath.PKIXCertPathValidator.validate > (PKIXCertPathValidator.java:224) > sun.security.provider.certpath.PKIXCertPathValidator.validate > (PKIXCertPathValidator.java:144) > sun.security.provider.certpath.PKIXCertPathValidator.engineValidate > (PKIXCertPathValidator.java:83) > java.security.cert.CertPathValidator.validate (CertPathValidator.java:309) > sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364) > sun.security.validator.PKIXValidator.engineValidate > (PKIXValidator.java:275) > sun.security.validator.Validator.validate (Validator.java:264) > sun.security.ssl.X509TrustManagerImpl.checkTrusted > (X509TrustManagerImpl.java:285) > sun.security.ssl.X509TrustManagerImpl.checkServerTrusted > (X509TrustManagerImpl.java:144) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts > (CertificateMessage.java:1329) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate > (CertificateMessage.java:1226) > sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume > (CertificateMessage.java:1169) > sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396) > sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1277) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1264) > java.security.AccessController.doPrivileged (AccessController.java:712) > sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209) > org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask > (SSLIOSession.java:289) > org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake > (SSLIOSession.java:357) > org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady > (SSLIOSession.java:545) > org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady > (AbstractIODispatch.java:120) > org.apache.http.impl.nio.reactor.BaseIOReactor.readable > (BaseIOReactor.java:162) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent > (AbstractIOReactor.java:337) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents > (AbstractIOReactor.java:315) > org.apache.http.impl.nio.reactor.AbstractIOReactor.execute > (AbstractIOReactor.java:276) > org.apache.http.impl.nio.reactor.BaseIOReactor.execute > (BaseIOReactor.java:104) > org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run > (AbstractMultiworkerIOReactor.java:591) > java.lang.Thread.run (Thread.java:840) > Caused by: java.security.cert.CertificateExpiredException: NotAfter: Sat Jun > 08 21:21:40 UTC 2024 > at sun.security.x509.CertificateValidity.valid (CertificateValidity.java:277) > sun.security.x509.X509CertImpl.checkValidity (X509CertImpl.java:621) > sun.security.provider.certpath.BasicChecker.verifyValidity > (BasicChecker.java:190) > sun.security.provider.certpath.BasicChecker.check (BasicChecker.java:144) > sun.security.provider.certpath.PKIXMasterCertPathValidator.validate > (PKIXMasterCertPathValidator.java:125) > sun.security.provider.certpath.PKIXCertPathValidator.validate > (PKIXCertPathValidator.java:224) > sun.security.provider.certpath.PKIXCertPathValidator.validate > (PKIXCertPathValidator.java:144) > sun.security.provider.certpath.PKIXCertPathValidator.engineValidate > (PKIXCertPathValidator.java:83) > java.security.cert.CertPathValidator.validate (CertPathValidator.java:309) > sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364) > sun.security.validator.PKIXValidator.engineValidate > (PKIXValidator.java:275) > sun.security.validator.Validator.validate (Validator.java:264) > sun.security.ssl.X509TrustManagerImpl.checkTrusted > (X509TrustManagerImpl.java:285) > sun.security.ssl.X509TrustManagerImpl.checkServerTrusted > (X509TrustManagerImpl.java:144) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts > (CertificateMessage.java:1329) > > sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate > (CertificateMessage.java:1226) > sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume > (CertificateMessage.java:1169) > sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:396) > sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:480) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1277) > sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run > (SSLEngineImpl.java:1264) > java.security.AccessController.doPrivileged (AccessController.java:712) > sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1209) > org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask > (SSLIOSession.java:289) > org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake > (SSLIOSession.java:357) > org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady > (SSLIOSession.java:545) > org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady > (AbstractIODispatch.java:120) > org.apache.http.impl.nio.reactor.BaseIOReactor.readable > (BaseIOReactor.java:162) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent > (AbstractIOReactor.java:337) > org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents > (AbstractIOReactor.java:315) > org.apache.http.impl.nio.reactor.AbstractIOReactor.execute > (AbstractIOReactor.java:276) > org.apache.http.impl.nio.reactor.BaseIOReactor.execute > (BaseIOReactor.java:104) > org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run > (AbstractMultiworkerIOReactor.java:591) > java.lang.Thread.run (Thread.java:840) > > Ran 24 tests containing 152 assertions. > 6 failures, 2 errors. > Tests failed. > make[1]: *** [debian/rules:25: override_dh_auto_test] Error 1 The full build log is available from: http://qa-logs.debian.net/2024/06/15/trapperkeeper-status-clojure_1.1.1-4_unstable.log All bugs filed during this archive rebuild are listed at: https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20240615;users=lu...@debian.org or: https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20240615&fusertaguser=lu...@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! If you reassign this bug to another package, please mark it as 'affects'-ing this package. See https://www.debian.org/Bugs/server-control#affects If you fail to reproduce this, please provide a build log and diff it with mine so that we can identify if something relevant changed in the meantime.