Package: src:trapperkeeper-status-clojure Version: 1.1.1-2 Severity: serious Control: close -1 1.1.1-5 Tags: ftbfs bullseye bookworm
Dear maintainer: During a rebuild of all packages in bullseye, your package failed to build: (Note: The build failure also happens in bookworm) -------------------------------------------------------------------------------- [...] debian/rules binary dh binary --with javahelper --with maven_repo_helper dh_update_autotools_config dh_autoreconf debian/rules override_dh_auto_configure make[1]: Entering directory '/<<PKGBUILDDIR>>' cd debian && ln -sf /usr/share/maven-repo . make[1]: Leaving directory '/<<PKGBUILDDIR>>' jh_linkjars debian/rules override_dh_auto_build make[1]: Entering directory '/<<PKGBUILDDIR>>' lein pom debian/pom.xml Wrote /<<PKGBUILDDIR>>/debian/pom.xml lein i18n make Running 'make i18n' lein jar Created /<<PKGBUILDDIR>>/target/trapperkeeper-status-1.1.1.jar # symlink so we don't need a version in debian/*.poms cd target && ln -sf trapperkeeper-status-1.1.1.jar trapperkeeper-status.jar make[1]: Leaving directory '/<<PKGBUILDDIR>>' debian/rules override_dh_auto_test make[1]: Entering directory '/<<PKGBUILDDIR>>' lein test lein test puppetlabs.trapperkeeper.services.status.check-test lein test puppetlabs.trapperkeeper.services.status.status-core-test lein test puppetlabs.trapperkeeper.services.status.status-proxy-service-test lein test :only puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-only-proxies-what-it-should-test ERROR in (proxy-only-proxies-what-it-should-test) (Alert.java:131) Uncaught exception, not in assertion. expected: nil actual: javax.net.ssl.SSLHandshakeException: PKIX path validation failed: java.security.cert.CertPathValidatorException: validity check failed at sun.security.ssl.Alert.createSSLException (Alert.java:131) sun.security.ssl.TransportContext.fatal (TransportContext.java:360) sun.security.ssl.TransportContext.fatal (TransportContext.java:303) sun.security.ssl.TransportContext.fatal (TransportContext.java:298) sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts (CertificateMessage.java:654) sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate (CertificateMessage.java:473) sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume (CertificateMessage.java:369) sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:392) sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:443) sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run (SSLEngineImpl.java:1076) sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run (SSLEngineImpl.java:1063) java.security.AccessController.doPrivileged (AccessController.java:-2) sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1010) org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask (SSLIOSession.java:288) org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake (SSLIOSession.java:356) org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady (SSLIOSession.java:541) org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady (AbstractIODispatch.java:120) org.apache.http.impl.nio.reactor.BaseIOReactor.readable (BaseIOReactor.java:162) org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent (AbstractIOReactor.java:337) org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents (AbstractIOReactor.java:315) org.apache.http.impl.nio.reactor.AbstractIOReactor.execute (AbstractIOReactor.java:276) org.apache.http.impl.nio.reactor.BaseIOReactor.execute (BaseIOReactor.java:104) org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run (AbstractMultiworkerIOReactor.java:591) java.lang.Thread.run (Thread.java:829) Caused by: sun.security.validator.ValidatorException: PKIX path validation failed: java.security.cert.CertPathValidatorException: validity check failed at sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:369) sun.security.validator.PKIXValidator.engineValidate (PKIXValidator.java:275) sun.security.validator.Validator.validate (Validator.java:264) sun.security.ssl.X509TrustManagerImpl.validate (X509TrustManagerImpl.java:313) sun.security.ssl.X509TrustManagerImpl.checkTrusted (X509TrustManagerImpl.java:276) sun.security.ssl.X509TrustManagerImpl.checkServerTrusted (X509TrustManagerImpl.java:141) sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts (CertificateMessage.java:632) sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate (CertificateMessage.java:473) sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume (CertificateMessage.java:369) sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:392) sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:443) sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run (SSLEngineImpl.java:1076) sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run (SSLEngineImpl.java:1063) java.security.AccessController.doPrivileged (AccessController.java:-2) sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1010) org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask (SSLIOSession.java:288) org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake (SSLIOSession.java:356) org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady (SSLIOSession.java:541) org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady (AbstractIODispatch.java:120) org.apache.http.impl.nio.reactor.BaseIOReactor.readable (BaseIOReactor.java:162) org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent (AbstractIOReactor.java:337) org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents (AbstractIOReactor.java:315) org.apache.http.impl.nio.reactor.AbstractIOReactor.execute (AbstractIOReactor.java:276) org.apache.http.impl.nio.reactor.BaseIOReactor.execute (BaseIOReactor.java:104) org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run (AbstractMultiworkerIOReactor.java:591) java.lang.Thread.run (Thread.java:829) Caused by: java.security.cert.CertPathValidatorException: validity check failed at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate (PKIXMasterCertPathValidator.java:135) sun.security.provider.certpath.PKIXCertPathValidator.validate (PKIXCertPathValidator.java:224) sun.security.provider.certpath.PKIXCertPathValidator.validate (PKIXCertPathValidator.java:144) sun.security.provider.certpath.PKIXCertPathValidator.engineValidate (PKIXCertPathValidator.java:83) java.security.cert.CertPathValidator.validate (CertPathValidator.java:309) sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364) sun.security.validator.PKIXValidator.engineValidate (PKIXValidator.java:275) sun.security.validator.Validator.validate (Validator.java:264) sun.security.ssl.X509TrustManagerImpl.validate (X509TrustManagerImpl.java:313) sun.security.ssl.X509TrustManagerImpl.checkTrusted (X509TrustManagerImpl.java:276) sun.security.ssl.X509TrustManagerImpl.checkServerTrusted (X509TrustManagerImpl.java:141) sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts (CertificateMessage.java:632) sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate (CertificateMessage.java:473) sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume (CertificateMessage.java:369) sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:392) sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:443) sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run (SSLEngineImpl.java:1076) sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run (SSLEngineImpl.java:1063) java.security.AccessController.doPrivileged (AccessController.java:-2) sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1010) org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask (SSLIOSession.java:288) org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake (SSLIOSession.java:356) org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady (SSLIOSession.java:541) org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady (AbstractIODispatch.java:120) org.apache.http.impl.nio.reactor.BaseIOReactor.readable (BaseIOReactor.java:162) org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent (AbstractIOReactor.java:337) org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents (AbstractIOReactor.java:315) org.apache.http.impl.nio.reactor.AbstractIOReactor.execute (AbstractIOReactor.java:276) org.apache.http.impl.nio.reactor.BaseIOReactor.execute (BaseIOReactor.java:104) org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run (AbstractMultiworkerIOReactor.java:591) java.lang.Thread.run (Thread.java:829) Caused by: java.security.cert.CertificateExpiredException: NotAfter: Sat Jun 08 21:21:40 UTC 2024 at sun.security.x509.CertificateValidity.valid (CertificateValidity.java:277) sun.security.x509.X509CertImpl.checkValidity (X509CertImpl.java:669) sun.security.provider.certpath.BasicChecker.verifyValidity (BasicChecker.java:190) sun.security.provider.certpath.BasicChecker.check (BasicChecker.java:144) sun.security.provider.certpath.PKIXMasterCertPathValidator.validate (PKIXMasterCertPathValidator.java:125) sun.security.provider.certpath.PKIXCertPathValidator.validate (PKIXCertPathValidator.java:224) sun.security.provider.certpath.PKIXCertPathValidator.validate (PKIXCertPathValidator.java:144) sun.security.provider2024-08-14 05:19:36,061 DEBUG [p.t.internal] Lifecycle worker completed :boot lifecycle task; awaiting next task. .certpath.PKIXCertPathValidator.engineValidate (PKIXCertPathValidator.java:83) java.security.cert.CertPathValidator.validate (CertPathValidator.java:309) sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364) sun.security.validator.PKIXValidator.engineValidate (PKIXValidator.java:275) sun.security.validator.Validator.validate (Validator.java:264) sun.security.ssl.X509TrustManagerImpl.validate (X509TrustManagerImpl.java:313) sun.security.ssl.X509TrustManagerImpl.checkTrusted (X509TrustManagerImpl.java:276) sun.security.ssl.X509TrustManagerImpl.checkServerTrusted (X509TrustManagerImpl.java:141) sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts (CertificateMessage.java:632) sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate (CertificateMessage.java:473) sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume (CertificateMessage.java:369) sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:392) sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:443) sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run (SSLEngineImpl.java:1076) sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run (SSLEngineImpl.java:1063) java.security.AccessController.doPrivileged (AccessController.java:-2) sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1010) org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask (SSLIOSession.java:288) org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake (SSLIOSession.java:356) org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady (SSLIOSession.java:541) org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady (AbstractIODispatch.java:120) org.apache.http.impl.nio.reactor.BaseIOReactor.readable (BaseIOReactor.java:162) org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent (AbstractIOReactor.java:337) org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents (AbstractIOReactor.java:315) org.apache.http.impl.nio.reactor.AbstractIOReactor.execute (AbstractIOReactor.java:276) org.apache.http.impl.nio.reactor.BaseIOReactor.execute (BaseIOReactor.java:104) org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run (AbstractMultiworkerIOReactor.java:591) java.lang.Thread.run (Thread.java:829) lein test :only puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:76) status-proxy-service can connect to https status-service service correctly proxying plain url expected: (= 200 (:status resp)) actual: (not (= 200 502)) lein test :only puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:77) status-proxy-service can connect to https status-service service correctly proxying plain url expected: (= {"bar" {"service_version" "0.1.0", "service_status_version" 1, "state" "running", "detail_level" "info", "active_alerts" [], "status" "bar status 1 :info"}, "foo" {"service_version" "1.1.0", "service_status_version" 2, "state" "running", "detail_level" "info", "active_alerts" [], "status" "foo status 2 :info"}} (dissoc body "status-service")) actual: (not (= {"bar" {"service_version" "0.1.0", "service_status_version" 1, "state" "running", "detail_level" "info", "active_alerts" [], "status" "bar status 1 :info"}, "foo" {"service_version" "1.1.0", "service_status_version" 2, "state" "running", "detail_level" "info", "active_alerts" [], "status" "foo status 2 :info"}} nil)) lein test :only puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:93) status-proxy-service can connect to https status-service service correctly proxying url with query param expected: (= 200 (:status resp)) actual: (not (= 200 502)) lein test :only puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:94) status-proxy-service can connect to https status-service service correctly proxying url with query param expected: (= {"bar" {"service_version" "0.1.0", "service_status_version" 1, "state" "running", "detail_level" "debug", "active_alerts" [], "status" "bar status 1 :debug"}, "foo" {"service_version" "1.1.0", "service_status_version" 2, "state" "running", "detail_level" "debug", "active_alerts" [], "status" "foo status 2 :debug"}} (dissoc body "status-service")) actual: (not (= {"bar" {"service_version" "0.1.0", "service_status_version" 1, "state" "running", "detail_level" "debug", "active_alerts" [], "status" "bar status 1 :debug"}, "foo" {"service_version" "1.1.0", "service_status_version" 2, "state" "running", "detail_level" "debug", "active_alerts" [], "status" "foo status 2 :debug"}} nil)) lein test :only puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:110) status-proxy-service can connect to https status-service service correctly proxying specific service expected: (= 200 (:status resp)) actual: (not (= 200 502)) lein test :only puppetlabs.trapperkeeper.services.status.status-proxy-service-test/proxy-ssl-status-endpoint-test FAIL in (proxy-ssl-status-endpoint-test) (status_proxy_service_test.clj:111) status-proxy-service can connect to https status-service service correctly proxying specific service expected: (= {"service_version" "1.1.0", "service_status_version" 2, "state" "running", "detail_level" "info", "status" "foo status 2 :info", "active_alerts" [], "service_name" "foo"} body) actual: (not (= {"service_version" "1.1.0", "service_status_version" 2, "state" "running", "detail_level" "info", "status" "foo status 2 :info", "active_alerts" [], "service_name" "foo"} nil)) lein test puppetlabs.trapperkeeper.services.status.status-service-test 2024-08-14 05:19:36,754 DEBUG [o.e.j.s.HttpChannel] onContentComplete HttpChannelOverHttp@52e0d8c0{s=HttpChannelState@5b014549{s=IDLE rs=COMPLETED os=COMPLETED is=IDLE awp=false se=false i=false al=0},r=1,c=true/true,a=IDLE,uri=//localhost:8180/status/v1/services?timeout=-3,age=5} 2024-08-14 05:19:43,783 DEBUG [o.a.h.i.n.c.PoolingNHttpClientConnectionManager] Releasing connection: [id: http-outgoing-35][route: {s}->https://localhost:8180][total kept alive: 0; route allocated: 0 of 2; total allocated: 0 of 20] lein test :only puppetlabs.trapperkeeper.services.status.status-service-test/auth-service-ssl-status-endpoint-test ERROR in (auth-service-ssl-status-endpoint-test) (Alert.java:131) Uncaught exception, not in assertion. expected: nil actual: javax.net.ssl.SSLHandshakeException: PKIX path validation failed: java.security.cert.CertPathValidatorException: validity check failed at sun.security.ssl.Alert.createSSLException (Alert.java:131) sun.security.ssl.TransportContext.fatal (TransportContext.java:360) sun.security.ssl.TransportContext.fatal (TransportContext.java:303) sun.security.ssl.TransportContext.fatal (TransportContext.java:298) sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts (CertificateMessage.java:654) sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate (CertificateMessage.java:473) sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume (CertificateMessage.java:369) sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:392) sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:443) sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run (SSLEngineImpl.java:1076) sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run (SSLEngineImpl.java:1063) java.security.AccessController.doPrivileged (AccessController.java:-2) sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1010) org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask (SSLIOSession.java:288) org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake (SSLIOSession.java:356) org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady (SSLIOSession.java:541) org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady (AbstractIODispatch.java:120) org.apache.http.impl.nio.reactor.BaseIOReactor.readable (BaseIOReactor.java:162) org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent (AbstractIOReactor.java:337) org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents (AbstractIOReactor.java:315) org.apache.http.impl.nio.reactor.AbstractIOReactor.execute (AbstractIOReactor.java:276) org.apache.http.impl.nio.reactor.BaseIOReactor.execute (BaseIOReactor.java:104) org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run (AbstractMultiworkerIOReactor.java:591) java.lang.Thread.run (Thread.java:829) Caused by: sun.security.validator.ValidatorException: PKIX path validation failed: java.security.cert.CertPathValidatorException: validity check failed at sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:369) sun.security.validator.PKIXValidator.engineValidate (PKIXValidator.java:275) sun.security.validator.Validator.validate (Validator.java:264) sun.security.ssl.X509TrustManagerImpl.validate (X509TrustManagerImpl.java:313) sun.security.ssl.X509TrustManagerImpl.checkTrusted (X509TrustManagerImpl.java:276) sun.security.ssl.X509TrustManagerImpl.checkServerTrusted (X509TrustManagerImpl.java:141) sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts (CertificateMessage.java:632) sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate (CertificateMessage.java:473) sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume (CertificateMessage.java:369) sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:392) sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:443) sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run (SSLEngineImpl.java:1076) sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run (SSLEngineImpl.java:1063) java.security.AccessController.doPrivileged (AccessController.java:-2) sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1010) org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask (SSLIOSession.java:288) org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake (SSLIOSession.java:356) org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady (SSLIOSession.java:541) org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady (AbstractIODispatch.java:120) org.apache.http.impl.nio.reactor.BaseIOReactor.readable (BaseIOReactor.java:162) org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent (AbstractIOReactor.java:337) org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents (AbstractIOReactor.java:315) org.apache.http.impl.nio.reactor.AbstractIOReactor.execute (AbstractIOReactor.java:276) org.apache.http.impl.nio.reactor.BaseIOReactor.execute (BaseIOReactor.java:104) org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run (AbstractMultiworkerIOReactor.java:591) java.lang.Thread.run (Thread.java:829) Caused by: java.security.cert.CertPathValidatorException: validity check failed at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate (PKIXMasterCertPathValidator.java:135) sun.security.provider.certpath.PKIXCertPathValidator.validate (PKIXCertPathValidator.java:224) sun.security.provider.certpath.PKIXCertPathValidator.validate (PKIXCertPathValidator.java:144) sun.security.provider.certpath.PKIXCertPathValidator.engineValidate (PKIXCertPathValidator.java:83) java.security.cert.CertPathValidator.validate (CertPathValidator.java:309) sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364) sun.security.validator.PKIXValidator.engineValidate (PKIXValidator.java:275) sun.security.validator.Validator.validate (Validator.java:264) sun.security.ssl.X509TrustManagerImpl.validate (X509TrustManagerImpl.java:313) sun.security.ssl.X509TrustManagerImpl.checkTrusted (X509TrustManagerImpl.java:276) sun.security.ssl.X509TrustManagerImpl.checkServerTrusted (X509TrustManagerImpl.java:141) sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts (CertificateMessage.java:632) sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate (CertificateMessage.java:473) sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume (CertificateMessage.java:369) sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:392) sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:443) sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run (SSLEngineImpl.java:1076) sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run (SSLEngineImpl.java:1063) java.security.AccessController.doPrivileged (AccessController.java:-2) sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1010) org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask (SSLIOSession.java:288) org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake (SSLIOSession.java:356) org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady (SSLIOSession.java:541) org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady (AbstractIODispatch.java:120) org.apache.http.impl.nio.reactor.BaseIOReactor.readable (BaseIOReactor.java:162) org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent (AbstractIOReactor.java:337) org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents (AbstractIOReactor.java:315) org.apache.http.impl.nio.reactor.AbstractIOReactor.execute (AbstractIOReactor.java:276) org.apache.http.impl.nio.reactor.BaseIOReactor.execute (BaseIOReactor.java:104) org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run (AbstractMultiworkerIOReactor.java:591) java.lang.Thread.run (Thread.java:829) Caused by: java.security.cert.CertificateExpiredException: NotAfter: Sat Jun 08 21:21:40 UTC 2024 at sun.security.x509.CertificateValidity.valid (CertificateValidity.java:277) sun.security.x509.X509CertImpl.checkValidity (X509CertImpl.java:669) sun.security.provider.certpath.BasicChecker.verifyValidity (BasicChecker.java:190) sun.security.provider.certpath.BasicChecker.check (BasicChecker.java:144) sun.security.provider.certpath.PKIXMasterCertPathValidator.validate (PKIXMasterCertPathValidator.java:125) sun.security.provider.certpath.PKIXCertPathValidator.validate (PKIXCertPathValidator.java:224) sun.security.provider.certpath.PKIXCertPathValidator.validate (PKIXCertPathValidator.java:144) sun.security.provider.certpath.PKIXCertPathValidator.engineValidate (PKIXCertPathValidator.java:83) java.security.cert.CertPathValidator.validate (CertPathValidator.java:309) sun.security.validator.PKIXValidator.doValidate (PKIXValidator.java:364) sun.security.validator.PKIXValidator.engineValidate (PKIXValidator.java:275) sun.security.validator.Validator.validate (Validator.java:264) sun.security.ssl.X509TrustManagerImpl.validate (X509TrustManagerImpl.java:313) sun.security.ssl.X509TrustManagerImpl.checkTrusted (X509TrustManagerImpl.java:276) sun.security.ssl.X509TrustManagerImpl.checkServerTrusted (X509TrustManagerImpl.java:141) sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts (CertificateMessage.java:632) sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate (CertificateMessage.java:473) sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume (CertificateMessage.java:369) sun.security.ssl.SSLHandshake.consume (SSLHandshake.java:392) sun.security.ssl.HandshakeContext.dispatch (HandshakeContext.java:443) sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run (SSLEngineImpl.java:1076) sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run (SSLEngineImpl.java:1063) java.security.AccessController.doPrivileged (AccessController.java:-2) sun.security.ssl.SSLEngineImpl$DelegatedTask.run (SSLEngineImpl.java:1010) org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask (SSLIOSession.java:288) org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake (SSLIOSession.java:356) org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady (SSLIOSession.java:541) org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady (AbstractIODispatch.java:120) org.apache.http.impl.nio.reactor.BaseIOReactor.readable (BaseIOReactor.java:162) org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent (AbstractIOReactor.java:337) org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents (AbstractIOReactor.java:315) org.apache.http.impl.nio.reactor.AbstractIOReactor.execute (AbstractIOReactor.java:276) org.apache.http.impl.nio.reactor.BaseIOReactor.execute (BaseIOReactor.java:104) org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run (AbstractMultiworkerIOReactor.java:591) java.lang.Thread.run (Thread.java:829) Ran 24 tests containing 152 assertions. 6 failures, 2 errors. Tests failed. make[1]: *** [debian/rules:24: override_dh_auto_test] Error 1 make[1]: Leaving directory '/<<PKGBUILDDIR>>' make: *** [debian/rules:11: binary] Error 2 dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2 -------------------------------------------------------------------------------- The above is just how the build ends and not necessarily the most relevant part. If required, the full build log is available here: https://people.debian.org/~sanvila/build-logs/bullseye/ About the archive rebuild: The build was made on virtual machines of type m6a.large and r6a.large from AWS, using sbuild and a reduced chroot with only build-essential packages. If you could not reproduce the bug please contact me privately, as I am willing to provide ssh access to a virtual machine where the bug is fully reproducible. If this is really a bug in one of the build-depends, please use reassign and affects, so that this is still visible in the BTS web page for this package. Thanks.