Package: src:trapperkeeper-status-clojure
Version: 1.1.1-2
Severity: serious
Control: close -1 1.1.1-5
Tags: ftbfs bullseye bookworm

Dear maintainer:

During a rebuild of all packages in bullseye, your package failed to build:

(Note: The build failure also happens in bookworm)

--------------------------------------------------------------------------------
[...]
 debian/rules binary
dh binary --with javahelper --with maven_repo_helper
   dh_update_autotools_config
   dh_autoreconf
   debian/rules override_dh_auto_configure
make[1]: Entering directory '/<<PKGBUILDDIR>>'
cd debian && ln -sf /usr/share/maven-repo .
make[1]: Leaving directory '/<<PKGBUILDDIR>>'
   jh_linkjars
   debian/rules override_dh_auto_build
make[1]: Entering directory '/<<PKGBUILDDIR>>'
lein pom debian/pom.xml
Wrote /<<PKGBUILDDIR>>/debian/pom.xml
lein i18n make
Running 'make i18n'
lein jar
Created /<<PKGBUILDDIR>>/target/trapperkeeper-status-1.1.1.jar
# symlink so we don't need a version in debian/*.poms
cd target && ln -sf trapperkeeper-status-1.1.1.jar trapperkeeper-status.jar
make[1]: Leaving directory '/<<PKGBUILDDIR>>'
   debian/rules override_dh_auto_test
make[1]: Entering directory '/<<PKGBUILDDIR>>'
lein test

lein test puppetlabs.trapperkeeper.services.status.check-test

lein test puppetlabs.trapperkeeper.services.status.status-core-test

lein test puppetlabs.trapperkeeper.services.status.status-proxy-service-test

lein test :only 
puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-only-proxies-what-it-should-test

ERROR in (proxy-only-proxies-what-it-should-test) (Alert.java:131)
Uncaught exception, not in assertion.
expected: nil
  actual: javax.net.ssl.SSLHandshakeException: PKIX path validation failed: 
java.security.cert.CertPathValidatorException: validity check failed
 at sun.security.ssl.Alert.createSSLException (Alert.java:131)
    sun.security.ssl.TransportContext.fatal (TransportContext.java:360)
    sun.security.ssl.TransportContext.fatal (TransportContext.java:303)
    sun.security.ssl.TransportContext.fatal (TransportContext.java:298)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts 
(CertificateMessage.java:654)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate 
(CertificateMessage.java:473)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume 
(CertificateMessage.java:369)
    sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:392)
    sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:443)
    sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
(SSLEngineImpl.java:1076)
    sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
(SSLEngineImpl.java:1063)
    java.security.AccessController.doPrivileged (AccessController.java:-2)
    sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1010)
    org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask 
(SSLIOSession.java:288)
    org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake 
(SSLIOSession.java:356)
    org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady 
(SSLIOSession.java:541)
    org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady 
(AbstractIODispatch.java:120)
    org.apache.http.impl.nio.reactor.BaseIOReactor.readable 
(BaseIOReactor.java:162)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent 
(AbstractIOReactor.java:337)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents 
(AbstractIOReactor.java:315)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.execute 
(AbstractIOReactor.java:276)
    org.apache.http.impl.nio.reactor.BaseIOReactor.execute 
(BaseIOReactor.java:104)
    org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run 
(AbstractMultiworkerIOReactor.java:591)
    java.lang.Thread.run (Thread.java:829)
Caused by: sun.security.validator.ValidatorException: PKIX path validation 
failed: java.security.cert.CertPathValidatorException: validity check failed
 at sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:369)
    sun.security.validator.PKIXValidator.engineValidate (PKIXValidator.java:275)
    sun.security.validator.Validator.validate (Validator.java:264)
    sun.security.ssl.X509TrustManagerImpl.validate 
(X509TrustManagerImpl.java:313)
    sun.security.ssl.X509TrustManagerImpl.checkTrusted 
(X509TrustManagerImpl.java:276)
    sun.security.ssl.X509TrustManagerImpl.checkServerTrusted 
(X509TrustManagerImpl.java:141)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts 
(CertificateMessage.java:632)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate 
(CertificateMessage.java:473)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume 
(CertificateMessage.java:369)
    sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:392)
    sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:443)
    sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
(SSLEngineImpl.java:1076)
    sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
(SSLEngineImpl.java:1063)
    java.security.AccessController.doPrivileged (AccessController.java:-2)
    sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1010)
    org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask 
(SSLIOSession.java:288)
    org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake 
(SSLIOSession.java:356)
    org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady 
(SSLIOSession.java:541)
    org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady 
(AbstractIODispatch.java:120)
    org.apache.http.impl.nio.reactor.BaseIOReactor.readable 
(BaseIOReactor.java:162)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent 
(AbstractIOReactor.java:337)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents 
(AbstractIOReactor.java:315)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.execute 
(AbstractIOReactor.java:276)
    org.apache.http.impl.nio.reactor.BaseIOReactor.execute 
(BaseIOReactor.java:104)
    org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run 
(AbstractMultiworkerIOReactor.java:591)
    java.lang.Thread.run (Thread.java:829)
Caused by: java.security.cert.CertPathValidatorException: validity check failed
 at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate 
(PKIXMasterCertPathValidator.java:135)
    sun.security.provider.certpath.PKIXCertPathValidator.validate 
(PKIXCertPathValidator.java:224)
    sun.security.provider.certpath.PKIXCertPathValidator.validate 
(PKIXCertPathValidator.java:144)
    sun.security.provider.certpath.PKIXCertPathValidator.engineValidate 
(PKIXCertPathValidator.java:83)
    java.security.cert.CertPathValidator.validate (CertPathValidator.java:309)
    sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364)
    sun.security.validator.PKIXValidator.engineValidate (PKIXValidator.java:275)
    sun.security.validator.Validator.validate (Validator.java:264)
    sun.security.ssl.X509TrustManagerImpl.validate 
(X509TrustManagerImpl.java:313)
    sun.security.ssl.X509TrustManagerImpl.checkTrusted 
(X509TrustManagerImpl.java:276)
    sun.security.ssl.X509TrustManagerImpl.checkServerTrusted 
(X509TrustManagerImpl.java:141)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts 
(CertificateMessage.java:632)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate 
(CertificateMessage.java:473)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume 
(CertificateMessage.java:369)
    sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:392)
    sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:443)
    sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
(SSLEngineImpl.java:1076)
    sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
(SSLEngineImpl.java:1063)
    java.security.AccessController.doPrivileged (AccessController.java:-2)
    sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1010)
    org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask 
(SSLIOSession.java:288)
    org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake 
(SSLIOSession.java:356)
    org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady 
(SSLIOSession.java:541)
    org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady 
(AbstractIODispatch.java:120)
    org.apache.http.impl.nio.reactor.BaseIOReactor.readable 
(BaseIOReactor.java:162)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent 
(AbstractIOReactor.java:337)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents 
(AbstractIOReactor.java:315)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.execute 
(AbstractIOReactor.java:276)
    org.apache.http.impl.nio.reactor.BaseIOReactor.execute 
(BaseIOReactor.java:104)
    org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run 
(AbstractMultiworkerIOReactor.java:591)
    java.lang.Thread.run (Thread.java:829)
Caused by: java.security.cert.CertificateExpiredException: NotAfter: Sat Jun 08 
21:21:40 UTC 2024
 at sun.security.x509.CertificateValidity.valid (CertificateValidity.java:277)
    sun.security.x509.X509CertImpl.checkValidity (X509CertImpl.java:669)
    sun.security.provider.certpath.BasicChecker.verifyValidity 
(BasicChecker.java:190)
    sun.security.provider.certpath.BasicChecker.check (BasicChecker.java:144)
    sun.security.provider.certpath.PKIXMasterCertPathValidator.validate 
(PKIXMasterCertPathValidator.java:125)
    sun.security.provider.certpath.PKIXCertPathValidator.validate 
(PKIXCertPathValidator.java:224)
    sun.security.provider.certpath.PKIXCertPathValidator.validate 
(PKIXCertPathValidator.java:144)
    sun.security.provider2024-08-14 05:19:36,061 DEBUG [p.t.internal] Lifecycle 
worker completed :boot lifecycle task; awaiting next task.
.certpath.PKIXCertPathValidator.engineValidate (PKIXCertPathValidator.java:83)
    java.security.cert.CertPathValidator.validate (CertPathValidator.java:309)
    sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364)
    sun.security.validator.PKIXValidator.engineValidate (PKIXValidator.java:275)
    sun.security.validator.Validator.validate (Validator.java:264)
    sun.security.ssl.X509TrustManagerImpl.validate 
(X509TrustManagerImpl.java:313)
    sun.security.ssl.X509TrustManagerImpl.checkTrusted 
(X509TrustManagerImpl.java:276)
    sun.security.ssl.X509TrustManagerImpl.checkServerTrusted 
(X509TrustManagerImpl.java:141)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts 
(CertificateMessage.java:632)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate 
(CertificateMessage.java:473)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume 
(CertificateMessage.java:369)
    sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:392)
    sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:443)
    sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
(SSLEngineImpl.java:1076)
    sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
(SSLEngineImpl.java:1063)
    java.security.AccessController.doPrivileged (AccessController.java:-2)
    sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1010)
    org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask 
(SSLIOSession.java:288)
    org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake 
(SSLIOSession.java:356)
    org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady 
(SSLIOSession.java:541)
    org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady 
(AbstractIODispatch.java:120)
    org.apache.http.impl.nio.reactor.BaseIOReactor.readable 
(BaseIOReactor.java:162)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent 
(AbstractIOReactor.java:337)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents 
(AbstractIOReactor.java:315)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.execute 
(AbstractIOReactor.java:276)
    org.apache.http.impl.nio.reactor.BaseIOReactor.execute 
(BaseIOReactor.java:104)
    org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run 
(AbstractMultiworkerIOReactor.java:591)
    java.lang.Thread.run (Thread.java:829)

lein test :only 
puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test

FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:76)
status-proxy-service can connect to https status-service service correctly 
proxying plain url
expected: (= 200 (:status resp))
  actual: (not (= 200 502))

lein test :only 
puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test

FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:77)
status-proxy-service can connect to https status-service service correctly 
proxying plain url
expected: (= {"bar" {"service_version" "0.1.0", "service_status_version" 1, "state" "running", "detail_level" "info", "active_alerts" [], "status" "bar status 1 :info"}, "foo" 
{"service_version" "1.1.0", "service_status_version" 2, "state" "running", "detail_level" "info", "active_alerts" [], "status" "foo status 2 :info"}} (dissoc body "status-service"))
  actual: (not (= {"bar" {"service_version" "0.1.0", "service_status_version" 1, "state" "running", "detail_level" "info", "active_alerts" [], "status" "bar status 1 :info"}, 
"foo" {"service_version" "1.1.0", "service_status_version" 2, "state" "running", "detail_level" "info", "active_alerts" [], "status" "foo status 2 :info"}} nil))

lein test :only 
puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test

FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:93)
status-proxy-service can connect to https status-service service correctly 
proxying url with query param
expected: (= 200 (:status resp))
  actual: (not (= 200 502))

lein test :only 
puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test

FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:94)
status-proxy-service can connect to https status-service service correctly 
proxying url with query param
expected: (= {"bar" {"service_version" "0.1.0", "service_status_version" 1, "state" "running", "detail_level" "debug", "active_alerts" [], "status" "bar status 1 :debug"}, "foo" 
{"service_version" "1.1.0", "service_status_version" 2, "state" "running", "detail_level" "debug", "active_alerts" [], "status" "foo status 2 :debug"}} (dissoc body "status-service"))
  actual: (not (= {"bar" {"service_version" "0.1.0", "service_status_version" 1, "state" "running", "detail_level" "debug", "active_alerts" [], "status" "bar status 1 :debug"}, 
"foo" {"service_version" "1.1.0", "service_status_version" 2, "state" "running", "detail_level" "debug", "active_alerts" [], "status" "foo status 2 :debug"}} nil))

lein test :only 
puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test

FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:110)
status-proxy-service can connect to https status-service service correctly 
proxying specific service
expected: (= 200 (:status resp))
  actual: (not (= 200 502))

lein test :only 
puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test

FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:111)
status-proxy-service can connect to https status-service service correctly 
proxying specific service
expected: (= {"service_version" "1.1.0", "service_status_version" 2, "state" "running", "detail_level" "info", "status" 
"foo status 2 :info", "active_alerts" [], "service_name" "foo"} body)
  actual: (not (= {"service_version" "1.1.0", "service_status_version" 2, "state" "running", "detail_level" "info", 
"status" "foo status 2 :info", "active_alerts" [], "service_name" "foo"} nil))

lein test puppetlabs.trapperkeeper.services.status.status-service-test
2024-08-14 05:19:36,754 DEBUG [o.e.j.s.HttpChannel] onContentComplete 
HttpChannelOverHttp@52e0d8c0{s=HttpChannelState@5b014549{s=IDLE rs=COMPLETED 
os=COMPLETED is=IDLE awp=false se=false i=false 
al=0},r=1,c=true/true,a=IDLE,uri=//localhost:8180/status/v1/services?timeout=-3,age=5}
2024-08-14 05:19:43,783 DEBUG [o.a.h.i.n.c.PoolingNHttpClientConnectionManager] 
Releasing connection: [id: http-outgoing-35][route: 
{s}->https://localhost:8180][total kept alive: 0; route allocated: 0 of 2; 
total allocated: 0 of 20]

lein test :only 
puppetlabs.trapperkeeper.services.status.status-service-test/auth-service-ssl-status-endpoint-test

ERROR in (auth-service-ssl-status-endpoint-test) (Alert.java:131)
Uncaught exception, not in assertion.
expected: nil
  actual: javax.net.ssl.SSLHandshakeException: PKIX path validation failed: 
java.security.cert.CertPathValidatorException: validity check failed
 at sun.security.ssl.Alert.createSSLException (Alert.java:131)
    sun.security.ssl.TransportContext.fatal (TransportContext.java:360)
    sun.security.ssl.TransportContext.fatal (TransportContext.java:303)
    sun.security.ssl.TransportContext.fatal (TransportContext.java:298)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts 
(CertificateMessage.java:654)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate 
(CertificateMessage.java:473)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume 
(CertificateMessage.java:369)
    sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:392)
    sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:443)
    sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
(SSLEngineImpl.java:1076)
    sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
(SSLEngineImpl.java:1063)
    java.security.AccessController.doPrivileged (AccessController.java:-2)
    sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1010)
    org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask 
(SSLIOSession.java:288)
    org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake 
(SSLIOSession.java:356)
    org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady 
(SSLIOSession.java:541)
    org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady 
(AbstractIODispatch.java:120)
    org.apache.http.impl.nio.reactor.BaseIOReactor.readable 
(BaseIOReactor.java:162)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent 
(AbstractIOReactor.java:337)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents 
(AbstractIOReactor.java:315)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.execute 
(AbstractIOReactor.java:276)
    org.apache.http.impl.nio.reactor.BaseIOReactor.execute 
(BaseIOReactor.java:104)
    org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run 
(AbstractMultiworkerIOReactor.java:591)
    java.lang.Thread.run (Thread.java:829)
Caused by: sun.security.validator.ValidatorException: PKIX path validation 
failed: java.security.cert.CertPathValidatorException: validity check failed
 at sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:369)
    sun.security.validator.PKIXValidator.engineValidate (PKIXValidator.java:275)
    sun.security.validator.Validator.validate (Validator.java:264)
    sun.security.ssl.X509TrustManagerImpl.validate 
(X509TrustManagerImpl.java:313)
    sun.security.ssl.X509TrustManagerImpl.checkTrusted 
(X509TrustManagerImpl.java:276)
    sun.security.ssl.X509TrustManagerImpl.checkServerTrusted 
(X509TrustManagerImpl.java:141)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts 
(CertificateMessage.java:632)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate 
(CertificateMessage.java:473)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume 
(CertificateMessage.java:369)
    sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:392)
    sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:443)
    sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
(SSLEngineImpl.java:1076)
    sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
(SSLEngineImpl.java:1063)
    java.security.AccessController.doPrivileged (AccessController.java:-2)
    sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1010)
    org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask 
(SSLIOSession.java:288)
    org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake 
(SSLIOSession.java:356)
    org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady 
(SSLIOSession.java:541)
    org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady 
(AbstractIODispatch.java:120)
    org.apache.http.impl.nio.reactor.BaseIOReactor.readable 
(BaseIOReactor.java:162)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent 
(AbstractIOReactor.java:337)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents 
(AbstractIOReactor.java:315)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.execute 
(AbstractIOReactor.java:276)
    org.apache.http.impl.nio.reactor.BaseIOReactor.execute 
(BaseIOReactor.java:104)
    org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run 
(AbstractMultiworkerIOReactor.java:591)
    java.lang.Thread.run (Thread.java:829)
Caused by: java.security.cert.CertPathValidatorException: validity check failed
 at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate 
(PKIXMasterCertPathValidator.java:135)
    sun.security.provider.certpath.PKIXCertPathValidator.validate 
(PKIXCertPathValidator.java:224)
    sun.security.provider.certpath.PKIXCertPathValidator.validate 
(PKIXCertPathValidator.java:144)
    sun.security.provider.certpath.PKIXCertPathValidator.engineValidate 
(PKIXCertPathValidator.java:83)
    java.security.cert.CertPathValidator.validate (CertPathValidator.java:309)
    sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364)
    sun.security.validator.PKIXValidator.engineValidate (PKIXValidator.java:275)
    sun.security.validator.Validator.validate (Validator.java:264)
    sun.security.ssl.X509TrustManagerImpl.validate 
(X509TrustManagerImpl.java:313)
    sun.security.ssl.X509TrustManagerImpl.checkTrusted 
(X509TrustManagerImpl.java:276)
    sun.security.ssl.X509TrustManagerImpl.checkServerTrusted 
(X509TrustManagerImpl.java:141)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts 
(CertificateMessage.java:632)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate 
(CertificateMessage.java:473)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume 
(CertificateMessage.java:369)
    sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:392)
    sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:443)
    sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
(SSLEngineImpl.java:1076)
    sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
(SSLEngineImpl.java:1063)
    java.security.AccessController.doPrivileged (AccessController.java:-2)
    sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1010)
    org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask 
(SSLIOSession.java:288)
    org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake 
(SSLIOSession.java:356)
    org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady 
(SSLIOSession.java:541)
    org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady 
(AbstractIODispatch.java:120)
    org.apache.http.impl.nio.reactor.BaseIOReactor.readable 
(BaseIOReactor.java:162)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent 
(AbstractIOReactor.java:337)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents 
(AbstractIOReactor.java:315)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.execute 
(AbstractIOReactor.java:276)
    org.apache.http.impl.nio.reactor.BaseIOReactor.execute 
(BaseIOReactor.java:104)
    org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run 
(AbstractMultiworkerIOReactor.java:591)
    java.lang.Thread.run (Thread.java:829)
Caused by: java.security.cert.CertificateExpiredException: NotAfter: Sat Jun 08 
21:21:40 UTC 2024
 at sun.security.x509.CertificateValidity.valid (CertificateValidity.java:277)
    sun.security.x509.X509CertImpl.checkValidity (X509CertImpl.java:669)
    sun.security.provider.certpath.BasicChecker.verifyValidity 
(BasicChecker.java:190)
    sun.security.provider.certpath.BasicChecker.check (BasicChecker.java:144)
    sun.security.provider.certpath.PKIXMasterCertPathValidator.validate 
(PKIXMasterCertPathValidator.java:125)
    sun.security.provider.certpath.PKIXCertPathValidator.validate 
(PKIXCertPathValidator.java:224)
    sun.security.provider.certpath.PKIXCertPathValidator.validate 
(PKIXCertPathValidator.java:144)
    sun.security.provider.certpath.PKIXCertPathValidator.engineValidate 
(PKIXCertPathValidator.java:83)
    java.security.cert.CertPathValidator.validate (CertPathValidator.java:309)
    sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364)
    sun.security.validator.PKIXValidator.engineValidate (PKIXValidator.java:275)
    sun.security.validator.Validator.validate (Validator.java:264)
    sun.security.ssl.X509TrustManagerImpl.validate 
(X509TrustManagerImpl.java:313)
    sun.security.ssl.X509TrustManagerImpl.checkTrusted 
(X509TrustManagerImpl.java:276)
    sun.security.ssl.X509TrustManagerImpl.checkServerTrusted 
(X509TrustManagerImpl.java:141)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts 
(CertificateMessage.java:632)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate 
(CertificateMessage.java:473)
    sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume 
(CertificateMessage.java:369)
    sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:392)
    sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:443)
    sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
(SSLEngineImpl.java:1076)
    sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run 
(SSLEngineImpl.java:1063)
    java.security.AccessController.doPrivileged (AccessController.java:-2)
    sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1010)
    org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask 
(SSLIOSession.java:288)
    org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake 
(SSLIOSession.java:356)
    org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady 
(SSLIOSession.java:541)
    org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady 
(AbstractIODispatch.java:120)
    org.apache.http.impl.nio.reactor.BaseIOReactor.readable 
(BaseIOReactor.java:162)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent 
(AbstractIOReactor.java:337)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents 
(AbstractIOReactor.java:315)
    org.apache.http.impl.nio.reactor.AbstractIOReactor.execute 
(AbstractIOReactor.java:276)
    org.apache.http.impl.nio.reactor.BaseIOReactor.execute 
(BaseIOReactor.java:104)
    org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run 
(AbstractMultiworkerIOReactor.java:591)
    java.lang.Thread.run (Thread.java:829)

Ran 24 tests containing 152 assertions.
6 failures, 2 errors.
Tests failed.
make[1]: *** [debian/rules:24: override_dh_auto_test] Error 1
make[1]: Leaving directory '/<<PKGBUILDDIR>>'
make: *** [debian/rules:11: binary] Error 2
dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2
--------------------------------------------------------------------------------

The above is just how the build ends and not necessarily the most relevant part.
If required, the full build log is available here:

https://people.debian.org/~sanvila/build-logs/bullseye/

About the archive rebuild: The build was made on virtual machines
of type m6a.large and r6a.large from AWS, using sbuild and a
reduced chroot with only build-essential packages.

If you could not reproduce the bug please contact me privately, as I
am willing to provide ssh access to a virtual machine where the bug is
fully reproducible.

If this is really a bug in one of the build-depends, please use
reassign and affects, so that this is still visible in the BTS web
page for this package.

Thanks.

Reply via email to