Diff of the two buildlogs: -- --- b1/build.log 2021-07-17 11:38:19.698631220 +0000 +++ b2/build.log 2021-07-17 11:48:39.275305789 +0000 @@ -1,6 +1,6 @@ I: pbuilder: network access will be disabled during build -I: Current time: Fri Jul 16 23:34:57 -12 2021 -I: pbuilder-time-stamp: 1626521697 +I: Current time: Sat Aug 20 08:01:23 +14 2022 +I: pbuilder-time-stamp: 1660932083 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/buster-reproducible-base.tgz] I: copying local configuration @@ -17,7 +17,7 @@ I: Extracting source gpgv: unknown type of key resource 'trustedkeys.kbx' gpgv: keyblock resource '/root/.gnupg/trustedkeys.kbx': General error -gpgv: Signature made Mon Oct 29 10:00:37 2018 -12 +gpgv: Signature made Tue Oct 30 12:00:37 2018 +14 gpgv: using RSA key B8CE4DE21080DCF903E16C40F513C419E4B9D0AC gpgv: issuer "ebourg@apache.org" gpgv: Can't check signature: No public key @@ -36,136 +36,170 @@ dpkg-source: info: applying CVE-2015-5262.patch I: using fakeroot in build. I: Installing the build-deps -I: user script /srv/workspace/pbuilder/22595/tmp/hooks/D02_print_environment starting +I: user script /srv/workspace/pbuilder/54254/tmp/hooks/D01_modify_environment starting +debug: Running on ionos15-amd64. +I: Changing host+domainname to test build reproducibility +I: Adding a custom variable just for the fun of it... +I: Changing /bin/sh to bash +Removing 'diversion of /bin/sh to /bin/sh.distrib by dash' +Adding 'diversion of /bin/sh to /bin/sh.distrib by bash' +Removing 'diversion of /usr/share/man/man1/sh.1.gz to /usr/share/man/man1/sh.distrib.1.gz by dash' +Adding 'diversion of /usr/share/man/man1/sh.1.gz to /usr/share/man/man1/sh.distrib.1.gz by bash' +I: Setting pbuilder2's login shell to /bin/bash +I: Setting pbuilder2's GECOS to second user,second room,second work-phone,second home-phone,second other +I: user script /srv/workspace/pbuilder/54254/tmp/hooks/D01_modify_environment finished +I: user script /srv/workspace/pbuilder/54254/tmp/hooks/D02_print_environment starting I: set - BUILDDIR='/build' - BUILDUSERGECOS='first user,first room,first work-phone,first home-phone,first other' - BUILDUSERNAME='pbuilder1' - BUILD_ARCH='amd64' - DEBIAN_FRONTEND='noninteractive' - DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=15' - DISTRIBUTION='' - HOME='/root' - HOST_ARCH='amd64' + BASH=/bin/sh + BASHOPTS=checkwinsize:cmdhist:complete_fullquote:extquote:force_fignore:globasciiranges:hostcomplete:interactive_comments:progcomp:promptvars:sourcepath + BASH_ALIASES=() + BASH_ARGC=() + BASH_ARGV=() + BASH_CMDS=() + BASH_LINENO=([0]="12" [1]="0") + BASH_SOURCE=([0]="/tmp/hooks/D02_print_environment" [1]="/tmp/hooks/D02_print_environment") + BASH_VERSINFO=([0]="5" [1]="0" [2]="3" [3]="1" [4]="release" [5]="x86_64-pc-linux-gnu") + BASH_VERSION='5.0.3(1)-release' + BUILDDIR=/build + BUILDUSERGECOS='second user,second room,second work-phone,second home-phone,second other' + BUILDUSERNAME=pbuilder2 + BUILD_ARCH=amd64 + DEBIAN_FRONTEND=noninteractive + DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=16' + DIRSTACK=() + DISTRIBUTION= + EUID=0 + FUNCNAME=([0]="Echo" [1]="main") + GROUPS=() + HOME=/root + HOSTNAME=i-capture-the-hostname + HOSTTYPE=x86_64 + HOST_ARCH=amd64 IFS=' ' - INVOCATION_ID='f5856ee175f34193bd10fa867b57e86d' - LANG='C' - LANGUAGE='en_US:en' - LC_ALL='C' - MAIL='/var/mail/root' - OPTIND='1' - PATH='/usr/sbin:/usr/bin:/sbin:/bin:/usr/games' - PBCURRENTCOMMANDLINEOPERATION='build' - PBUILDER_OPERATION='build' - PBUILDER_PKGDATADIR='/usr/share/pbuilder' - PBUILDER_PKGLIBDIR='/usr/lib/pbuilder' - PBUILDER_SYSCONFDIR='/etc' - PPID='22595' - PS1='# ' - PS2='> ' + INVOCATION_ID=a78b63c361ec44c6b45311b8ed3f7c3f + LANG=C + LANGUAGE=et_EE:et + LC_ALL=C + MACHTYPE=x86_64-pc-linux-gnu + MAIL=/var/mail/root + OPTERR=1 + OPTIND=1 + OSTYPE=linux-gnu + PATH=/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path + PBCURRENTCOMMANDLINEOPERATION=build + PBUILDER_OPERATION=build + PBUILDER_PKGDATADIR=/usr/share/pbuilder + PBUILDER_PKGLIBDIR=/usr/lib/pbuilder + PBUILDER_SYSCONFDIR=/etc + PIPESTATUS=([0]="0") + POSIXLY_CORRECT=y + PPID=54254 PS4='+ ' - PWD='/' - SHELL='/bin/bash' - SHLVL='2' - SUDO_COMMAND='/usr/bin/timeout -k 18.1h 18h /usr/bin/ionice -c 3 /usr/bin/nice /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/tmp.U6CwVy3mqg/pbuilderrc_DV2Q --hookdir /etc/pbuilder/first-build-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/buster-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/tmp.U6CwVy3mqg/b1 --logfile b1/build.log commons-httpclient_3.1-15.dsc' - SUDO_GID='111' - SUDO_UID='106' - SUDO_USER='jenkins' - TERM='unknown' - TZ='/usr/share/zoneinfo/Etc/GMT+12' - USER='root' - _='/usr/bin/systemd-run' - http_proxy='http://78.137.99.97:3128' + PWD=/ + SHELL=/bin/bash + SHELLOPTS=braceexpand:errexit:hashall:interactive-comments:posix + SHLVL=3 + SUDO_COMMAND='/usr/bin/timeout -k 24.1h 24h /usr/bin/ionice -c 3 /usr/bin/nice -n 11 /usr/bin/unshare --uts -- /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/tmp.U6CwVy3mqg/pbuilderrc_iRxU --hookdir /etc/pbuilder/rebuild-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/buster-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/tmp.U6CwVy3mqg/b2 --logfile b2/build.log commons-httpclient_3.1-15.dsc' + SUDO_GID=111 + SUDO_UID=106 + SUDO_USER=jenkins + TERM=unknown + TZ=/usr/share/zoneinfo/Etc/GMT-14 + UID=0 + USER=root + _='I: set' + http_proxy=http://85.184.249.68:3128 I: uname -a - Linux ionos11-amd64 4.19.0-17-amd64 #1 SMP Debian 4.19.194-2 (2021-06-21) x86_64 GNU/Linux + Linux i-capture-the-hostname 5.10.0-0.bpo.7-amd64 #1 SMP Debian 5.10.40-1~bpo10+1 (2021-06-04) x86_64 GNU/Linux I: ls -l /bin total 5116 - -rwxr-xr-x 1 root root 1168776 Apr 17 2019 bash - -rwxr-xr-x 3 root root 38984 Jul 10 2019 bunzip2 - -rwxr-xr-x 3 root root 38984 Jul 10 2019 bzcat - lrwxrwxrwx 1 root root 6 Jul 10 2019 bzcmp -> bzdiff - -rwxr-xr-x 1 root root 2227 Jul 10 2019 bzdiff - lrwxrwxrwx 1 root root 6 Jul 10 2019 bzegrep -> bzgrep - -rwxr-xr-x 1 root root 4877 Jun 24 2019 bzexe - lrwxrwxrwx 1 root root 6 Jul 10 2019 bzfgrep -> bzgrep - -rwxr-xr-x 1 root root 3641 Jul 10 2019 bzgrep - -rwxr-xr-x 3 root root 38984 Jul 10 2019 bzip2 - -rwxr-xr-x 1 root root 14328 Jul 10 2019 bzip2recover - lrwxrwxrwx 1 root root 6 Jul 10 2019 bzless -> bzmore - -rwxr-xr-x 1 root root 1297 Jul 10 2019 bzmore - -rwxr-xr-x 1 root root 43744 Feb 28 2019 cat - -rwxr-xr-x 1 root root 64320 Feb 28 2019 chgrp - -rwxr-xr-x 1 root root 64288 Feb 28 2019 chmod - -rwxr-xr-x 1 root root 72512 Feb 28 2019 chown - -rwxr-xr-x 1 root root 146880 Feb 28 2019 cp - -rwxr-xr-x 1 root root 121464 Jan 17 2019 dash - -rwxr-xr-x 1 root root 109408 Feb 28 2019 date - -rwxr-xr-x 1 root root 76712 Feb 28 2019 dd - -rwxr-xr-x 1 root root 93744 Feb 28 2019 df - -rwxr-xr-x 1 root root 138856 Feb 28 2019 dir - -rwxr-xr-x 1 root root 84288 Jan 9 2019 dmesg - lrwxrwxrwx 1 root root 8 Sep 26 2018 dnsdomainname -> hostname - lrwxrwxrwx 1 root root 8 Sep 26 2018 domainname -> hostname - -rwxr-xr-x 1 root root 39520 Feb 28 2019 echo - -rwxr-xr-x 1 root root 28 Jan 7 2019 egrep - -rwxr-xr-x 1 root root 35424 Feb 28 2019 false - -rwxr-xr-x 1 root root 28 Jan 7 2019 fgrep - -rwxr-xr-x 1 root root 68880 Jan 9 2019 findmnt - -rwsr-xr-x 1 root root 34896 Apr 22 2020 fusermount - -rwxr-xr-x 1 root root 198976 Jan 7 2019 grep - -rwxr-xr-x 2 root root 2345 Jan 5 2019 gunzip - -rwxr-xr-x 1 root root 6375 Jan 5 2019 gzexe - -rwxr-xr-x 1 root root 98048 Jan 5 2019 gzip - -rwxr-xr-x 1 root root 26696 Sep 26 2018 hostname - -rwxr-xr-x 1 root root 68552 Feb 28 2019 ln - -rwxr-xr-x 1 root root 56760 Jul 26 2018 login - -rwxr-xr-x 1 root root 138856 Feb 28 2019 ls - -rwxr-xr-x 1 root root 108624 Jan 9 2019 lsblk - -rwxr-xr-x 1 root root 89088 Feb 28 2019 mkdir - -rwxr-xr-x 1 root root 68544 Feb 28 2019 mknod - -rwxr-xr-x 1 root root 43808 Feb 28 2019 mktemp - -rwxr-xr-x 1 root root 43008 Jan 9 2019 more - -rwsr-xr-x 1 root root 51280 Jan 9 2019 mount - -rwxr-xr-x 1 root root 14408 Jan 9 2019 mountpoint - -rwxr-xr-x 1 root root 138728 Feb 28 2019 mv - lrwxrwxrwx 1 root root 8 Sep 26 2018 nisdomainname -> hostname - lrwxrwxrwx 1 root root 14 Feb 14 2019 pidof -> /sbin/killall5 - -rwxr-xr-x 1 root root 39616 Feb 28 2019 pwd - lrwxrwxrwx 1 root root 4 Apr 17 2019 rbash -> bash - -rwxr-xr-x 1 root root 47776 Feb 28 2019 readlink - -rwxr-xr-x 1 root root 68416 Feb 28 2019 rm - -rwxr-xr-x 1 root root 47776 Feb 28 2019 rmdir - -rwxr-xr-x 1 root root 23312 Jan 21 2019 run-parts - -rwxr-xr-x 1 root root 122224 Dec 22 2018 sed - lrwxrwxrwx 1 root root 4 Jul 6 20:24 sh -> dash - -rwxr-xr-x 1 root root 39552 Feb 28 2019 sleep - -rwxr-xr-x 1 root root 80672 Feb 28 2019 stty - -rwsr-xr-x 1 root root 63568 Jan 9 2019 su - -rwxr-xr-x 1 root root 35488 Feb 28 2019 sync - -rwxr-xr-x 1 root root 445560 Apr 23 2019 tar - -rwxr-xr-x 1 root root 14440 Jan 21 2019 tempfile - -rwxr-xr-x 1 root root 97152 Feb 28 2019 touch - -rwxr-xr-x 1 root root 35424 Feb 28 2019 true - -rwxr-xr-x 1 root root 14328 Apr 22 2020 ulockmgr_server - -rwsr-xr-x 1 root root 34888 Jan 9 2019 umount - -rwxr-xr-x 1 root root 39584 Feb 28 2019 uname - -rwxr-xr-x 2 root root 2345 Jan 5 2019 uncompress - -rwxr-xr-x 1 root root 138856 Feb 28 2019 vdir - -rwxr-xr-x 1 root root 34896 Jan 9 2019 wdctl - -rwxr-xr-x 1 root root 946 Jan 21 2019 which - lrwxrwxrwx 1 root root 8 Sep 26 2018 ypdomainname -> hostname - -rwxr-xr-x 1 root root 1983 Jan 5 2019 zcat - -rwxr-xr-x 1 root root 1677 Jan 5 2019 zcmp - -rwxr-xr-x 1 root root 5879 Jan 5 2019 zdiff - -rwxr-xr-x 1 root root 29 Jan 5 2019 zegrep - -rwxr-xr-x 1 root root 29 Jan 5 2019 zfgrep - -rwxr-xr-x 1 root root 2080 Jan 5 2019 zforce - -rwxr-xr-x 1 root root 7584 Jan 5 2019 zgrep - -rwxr-xr-x 1 root root 2205 Jan 5 2019 zless - -rwxr-xr-x 1 root root 1841 Jan 5 2019 zmore - -rwxr-xr-x 1 root root 4552 Jan 5 2019 znew -I: user script /srv/workspace/pbuilder/22595/tmp/hooks/D02_print_environment finished + -rwxr-xr-x 1 root root 1168776 Apr 18 2019 bash + -rwxr-xr-x 3 root root 38984 Jul 11 2019 bunzip2 + -rwxr-xr-x 3 root root 38984 Jul 11 2019 bzcat + lrwxrwxrwx 1 root root 6 Jul 11 2019 bzcmp -> bzdiff + -rwxr-xr-x 1 root root 2227 Jul 11 2019 bzdiff + lrwxrwxrwx 1 root root 6 Jul 11 2019 bzegrep -> bzgrep + -rwxr-xr-x 1 root root 4877 Jun 25 2019 bzexe + lrwxrwxrwx 1 root root 6 Jul 11 2019 bzfgrep -> bzgrep + -rwxr-xr-x 1 root root 3641 Jul 11 2019 bzgrep + -rwxr-xr-x 3 root root 38984 Jul 11 2019 bzip2 + -rwxr-xr-x 1 root root 14328 Jul 11 2019 bzip2recover + lrwxrwxrwx 1 root root 6 Jul 11 2019 bzless -> bzmore + -rwxr-xr-x 1 root root 1297 Jul 11 2019 bzmore + -rwxr-xr-x 1 root root 43744 Mar 1 2019 cat + -rwxr-xr-x 1 root root 64320 Mar 1 2019 chgrp + -rwxr-xr-x 1 root root 64288 Mar 1 2019 chmod + -rwxr-xr-x 1 root root 72512 Mar 1 2019 chown + -rwxr-xr-x 1 root root 146880 Mar 1 2019 cp + -rwxr-xr-x 1 root root 121464 Jan 18 2019 dash + -rwxr-xr-x 1 root root 109408 Mar 1 2019 date + -rwxr-xr-x 1 root root 76712 Mar 1 2019 dd + -rwxr-xr-x 1 root root 93744 Mar 1 2019 df + -rwxr-xr-x 1 root root 138856 Mar 1 2019 dir + -rwxr-xr-x 1 root root 84288 Jan 10 2019 dmesg + lrwxrwxrwx 1 root root 8 Sep 27 2018 dnsdomainname -> hostname + lrwxrwxrwx 1 root root 8 Sep 27 2018 domainname -> hostname + -rwxr-xr-x 1 root root 39520 Mar 1 2019 echo + -rwxr-xr-x 1 root root 28 Jan 8 2019 egrep + -rwxr-xr-x 1 root root 35424 Mar 1 2019 false + -rwxr-xr-x 1 root root 28 Jan 8 2019 fgrep + -rwxr-xr-x 1 root root 68880 Jan 10 2019 findmnt + -rwsr-xr-x 1 root root 34896 Apr 23 2020 fusermount + -rwxr-xr-x 1 root root 198976 Jan 8 2019 grep + -rwxr-xr-x 2 root root 2345 Jan 6 2019 gunzip + -rwxr-xr-x 1 root root 6375 Jan 6 2019 gzexe + -rwxr-xr-x 1 root root 98048 Jan 6 2019 gzip + -rwxr-xr-x 1 root root 26696 Sep 27 2018 hostname + -rwxr-xr-x 1 root root 68552 Mar 1 2019 ln + -rwxr-xr-x 1 root root 56760 Jul 27 2018 login + -rwxr-xr-x 1 root root 138856 Mar 1 2019 ls + -rwxr-xr-x 1 root root 108624 Jan 10 2019 lsblk + -rwxr-xr-x 1 root root 89088 Mar 1 2019 mkdir + -rwxr-xr-x 1 root root 68544 Mar 1 2019 mknod + -rwxr-xr-x 1 root root 43808 Mar 1 2019 mktemp + -rwxr-xr-x 1 root root 43008 Jan 10 2019 more + -rwsr-xr-x 1 root root 51280 Jan 10 2019 mount + -rwxr-xr-x 1 root root 14408 Jan 10 2019 mountpoint + -rwxr-xr-x 1 root root 138728 Mar 1 2019 mv + lrwxrwxrwx 1 root root 8 Sep 27 2018 nisdomainname -> hostname + lrwxrwxrwx 1 root root 14 Feb 15 2019 pidof -> /sbin/killall5 + -rwxr-xr-x 1 root root 39616 Mar 1 2019 pwd + lrwxrwxrwx 1 root root 4 Apr 18 2019 rbash -> bash + -rwxr-xr-x 1 root root 47776 Mar 1 2019 readlink + -rwxr-xr-x 1 root root 68416 Mar 1 2019 rm + -rwxr-xr-x 1 root root 47776 Mar 1 2019 rmdir + -rwxr-xr-x 1 root root 23312 Jan 22 2019 run-parts + -rwxr-xr-x 1 root root 122224 Dec 23 2018 sed + lrwxrwxrwx 1 root root 4 Aug 20 08:01 sh -> bash + lrwxrwxrwx 1 root root 4 Aug 10 04:47 sh.distrib -> dash + -rwxr-xr-x 1 root root 39552 Mar 1 2019 sleep + -rwxr-xr-x 1 root root 80672 Mar 1 2019 stty + -rwsr-xr-x 1 root root 63568 Jan 10 2019 su + -rwxr-xr-x 1 root root 35488 Mar 1 2019 sync + -rwxr-xr-x 1 root root 445560 Apr 24 2019 tar + -rwxr-xr-x 1 root root 14440 Jan 22 2019 tempfile + -rwxr-xr-x 1 root root 97152 Mar 1 2019 touch + -rwxr-xr-x 1 root root 35424 Mar 1 2019 true + -rwxr-xr-x 1 root root 14328 Apr 23 2020 ulockmgr_server + -rwsr-xr-x 1 root root 34888 Jan 10 2019 umount + -rwxr-xr-x 1 root root 39584 Mar 1 2019 uname + -rwxr-xr-x 2 root root 2345 Jan 6 2019 uncompress + -rwxr-xr-x 1 root root 138856 Mar 1 2019 vdir + -rwxr-xr-x 1 root root 34896 Jan 10 2019 wdctl + -rwxr-xr-x 1 root root 946 Jan 22 2019 which + lrwxrwxrwx 1 root root 8 Sep 27 2018 ypdomainname -> hostname + -rwxr-xr-x 1 root root 1983 Jan 6 2019 zcat + -rwxr-xr-x 1 root root 1677 Jan 6 2019 zcmp + -rwxr-xr-x 1 root root 5879 Jan 6 2019 zdiff + -rwxr-xr-x 1 root root 29 Jan 6 2019 zegrep + -rwxr-xr-x 1 root root 29 Jan 6 2019 zfgrep + -rwxr-xr-x 1 root root 2080 Jan 6 2019 zforce + -rwxr-xr-x 1 root root 7584 Jan 6 2019 zgrep + -rwxr-xr-x 1 root root 2205 Jan 6 2019 zless + -rwxr-xr-x 1 root root 1841 Jan 6 2019 zmore + -rwxr-xr-x 1 root root 4552 Jan 6 2019 znew +I: user script /srv/workspace/pbuilder/54254/tmp/hooks/D02_print_environment finished -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy @@ -522,7 +556,7 @@ Get: 305 http://deb.debian.org/debian buster/main amd64 maven all 3.6.0-1 [22.1 kB] Get: 306 http://deb.debian.org/debian buster/main amd64 maven-repo-helper all 1.9.3 [142 kB] Get: 307 http://deb.debian.org/debian buster/main amd64 maven-debian-helper all 2.3.2 [122 kB] -Fetched 373 MB in 6s (59.8 MB/s) +Fetched 373 MB in 5s (68.8 MB/s) debconf: delaying package configuration, since apt-utils is not installed Selecting previously unselected package libbsd0:amd64. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19195 files and directories currently installed.) @@ -1964,7 +1998,7 @@ fakeroot is already the newest version (1.23-1). 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. I: Building the package -I: Running cd /build/commons-httpclient-3.1/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-buildpackage -us -uc -b +I: Running cd /build/commons-httpclient-3.1/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-buildpackage -us -uc -b dpkg-buildpackage: info: source package commons-httpclient dpkg-buildpackage: info: source version 3.1-15 dpkg-buildpackage: info: source distribution unstable @@ -2855,8 +2889,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 22.337 s -[INFO] Finished at: 2021-07-16T23:36:45-12:00 +[INFO] Total time: 28.459 s +[INFO] Finished at: 2022-08-20T08:07:35+14:00 [INFO] ------------------------------------------------------------------------ make[1]: Leaving directory '/build/commons-httpclient-3.1' jh_build -O--buildsystem=maven @@ -2893,487 +2927,444 @@ [INFO] T E S T S [INFO] ------------------------------------------------------- [INFO] Running org.apache.commons.httpclient.TestAll -Jul 16, 2021 11:36:50 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:07:40 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody WARNING: Chunk-encoded body missing -Jul 16, 2021 11:36:50 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:07:41 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody WARNING: Chunk-encoded body missing -Jul 16, 2021 11:36:50 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:07:41 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody WARNING: Chunk-encoded body missing -Jul 16, 2021 11:36:50 PM org.apache.commons.httpclient.server.ProxyRequestHandler httpProxy +Aug 20, 2022 8:07:41 AM org.apache.commons.httpclient.server.ProxyRequestHandler httpProxy WARNING: chunked stream ended unexpectedly -Jul 16, 2021 11:36:50 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:07:41 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody WARNING: Chunk-encoded body missing -Jul 16, 2021 11:36:50 PM org.apache.commons.httpclient.server.ProxyRequestHandler httpProxy +Aug 20, 2022 8:07:41 AM org.apache.commons.httpclient.server.ProxyRequestHandler httpProxy WARNING: chunked stream ended unexpectedly -Jul 16, 2021 11:36:50 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:07:41 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody WARNING: Chunk-encoded body missing -Jul 16, 2021 11:36:50 PM org.apache.commons.httpclient.server.ProxyRequestHandler httpProxy +Aug 20, 2022 8:07:41 AM org.apache.commons.httpclient.server.ProxyRequestHandler httpProxy WARNING: chunked stream ended unexpectedly -Jul 16, 2021 11:36:50 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:07:41 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody WARNING: Chunk-encoded body missing -Jul 16, 2021 11:36:51 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:07:41 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:36:51 PM org.apache.commons.httpclient.HttpMethodBase getResponseBody +Aug 20, 2022 8:07:41 AM org.apache.commons.httpclient.HttpMethodBase getResponseBody WARNING: Going to buffer response body of large or unknown size. Using getResponseBodyAsStream instead is recommended. -Jul 16, 2021 11:36:51 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:07:42 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:36:51 PM org.apache.commons.httpclient.HttpMethodBase getResponseBody +Aug 20, 2022 8:07:42 AM org.apache.commons.httpclient.HttpMethodBase getResponseBody WARNING: Going to buffer response body of large or unknown size. Using getResponseBodyAsStream instead is recommended. -Jul 16, 2021 11:36:51 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:07:42 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:36:51 PM org.apache.commons.httpclient.HttpMethodBase getResponseBody +Aug 20, 2022 8:07:42 AM org.apache.commons.httpclient.HttpMethodBase getResponseBody WARNING: Going to buffer response body of large or unknown size. Using getResponseBodyAsStream instead is recommended. -Jul 16, 2021 11:36:51 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:07:42 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:36:51 PM org.apache.commons.httpclient.HttpMethodBase getResponseBody +Aug 20, 2022 8:07:42 AM org.apache.commons.httpclient.HttpMethodBase getResponseBody WARNING: Going to buffer response body of large or unknown size. Using getResponseBodyAsStream instead is recommended. -Jul 16, 2021 11:36:51 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:07:42 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:36:51 PM org.apache.commons.httpclient.HttpMethodBase responseBodyConsumed +Aug 20, 2022 8:07:42 AM org.apache.commons.httpclient.HttpMethodBase responseBodyConsumed WARNING: Extra response data detected - closing connection -Jul 16, 2021 11:36:51 PM org.apache.commons.httpclient.HttpMethodBase responseBodyConsumed +Aug 20, 2022 8:07:42 AM org.apache.commons.httpclient.HttpMethodBase responseBodyConsumed WARNING: Extra response data detected - closing connection -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.cookie.CookieSpec match +Aug 20, 2022 8:07:42 AM org.apache.commons.httpclient.cookie.CookieSpec match WARNING: Invalid cookie state: domain not specified -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.cookie.CookieSpec match +Aug 20, 2022 8:07:42 AM org.apache.commons.httpclient.cookie.CookieSpec match WARNING: Invalid cookie state: path not specified -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: Basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: unsupported1 authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge -INFO: No credentials available for BASIC 'test'@localhost:43985 -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge +INFO: No credentials available for BASIC 'test'@localhost:33171 +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge -INFO: No credentials available for BASIC 'test'@localhost:44209 -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge +INFO: No credentials available for BASIC 'test'@localhost:35573 +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge -INFO: Failure authenticating with BASIC 'test'@localhost:42299 -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge +INFO: Failure authenticating with BASIC 'test'@localhost:36173 +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.HttpMethodDirector authenticateHost -WARNING: Required credentials not available for BASIC @localhost:40683 -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.HttpMethodDirector authenticateHost +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector authenticateHost +WARNING: Required credentials not available for BASIC @localhost:40097 +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector authenticateHost WARNING: Preemptive authentication requested but no default credentials available -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge -INFO: Failure authenticating with BASIC 'test'@localhost:40683 -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge +INFO: Failure authenticating with BASIC 'test'@localhost:40097 +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge -INFO: Failure authenticating with BASIC 'test'@localhost:39829 -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge +INFO: Failure authenticating with BASIC 'test'@localhost:39083 +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge -INFO: No credentials available for BASIC 'test'@localhost:33927 -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge +INFO: No credentials available for BASIC 'test'@localhost:38931 +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge -INFO: No credentials available for BASIC 'test'@localhost:44903 -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge +INFO: No credentials available for BASIC 'test'@localhost:34819 +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:52 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge -INFO: Failure authenticating with BASIC 'test'@localhost:40073 -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge +INFO: Failure authenticating with BASIC 'test'@localhost:40629 +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.HttpMethodDirector authenticateProxy -WARNING: Required proxy credentials not available for BASIC @localhost:46539 -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.HttpMethodDirector authenticateProxy +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector authenticateProxy +WARNING: Required proxy credentials not available for BASIC @localhost:37535 +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector authenticateProxy WARNING: Preemptive authentication requested but no default proxy credentials available -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.HttpMethodDirector authenticateProxy -WARNING: Required proxy credentials not available for BASIC @localhost:45535 -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.HttpMethodDirector authenticateProxy +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector authenticateProxy +WARNING: Required proxy credentials not available for BASIC @localhost:44007 +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector authenticateProxy WARNING: Preemptive authentication requested but no default proxy credentials available -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.HttpMethodDirector authenticateHost -WARNING: Required credentials not available for BASIC @localhost:35017 -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.HttpMethodDirector authenticateHost +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector authenticateHost +WARNING: Required credentials not available for BASIC @localhost:38151 +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector authenticateHost WARNING: Preemptive authentication requested but no default credentials available -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge -INFO: Failure authenticating with BASIC 'test'@localhost:35017 -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge +INFO: Failure authenticating with BASIC 'test'@localhost:38151 +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.HttpMethodDirector authenticateProxy -WARNING: Required proxy credentials not available for BASIC @localhost:38455 -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.HttpMethodDirector authenticateProxy +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector authenticateProxy +WARNING: Required proxy credentials not available for BASIC @localhost:45015 +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector authenticateProxy WARNING: Preemptive authentication requested but no default proxy credentials available -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge -INFO: Failure authenticating with BASIC 'test'@localhost:33877 -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.auth.DigestScheme processChallenge +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge +INFO: Failure authenticating with BASIC 'test'@localhost:46803 +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.DigestScheme processChallenge WARNING: Unsupported qop detected: jakarta -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: digest authentication scheme selected -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: ntlm authentication scheme selected -Jul 16, 2021 11:36:53 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:43 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: ntlm authentication scheme selected -Jul 16, 2021 11:36:54 PM org.apache.commons.httpclient.HttpMethodDirector executeMethod +Aug 20, 2022 8:07:44 AM org.apache.commons.httpclient.HttpMethodDirector executeMethod SEVERE: Narrowly avoided an infinite loop in execute -Jul 16, 2021 11:36:54 PM org.apache.commons.httpclient.HttpMethodDirector processRedirectResponse +Aug 20, 2022 8:07:44 AM org.apache.commons.httpclient.HttpMethodDirector processRedirectResponse WARNING: Relative redirect location '/relativelocation/' not allowed -Jul 16, 2021 11:36:54 PM org.apache.commons.httpclient.HttpMethodDirector executeMethod +Aug 20, 2022 8:07:44 AM org.apache.commons.httpclient.HttpMethodDirector executeMethod SEVERE: Narrowly avoided an infinite loop in execute -Jul 16, 2021 11:36:55 PM org.apache.commons.httpclient.HttpMethodDirector processRedirectResponse +Aug 20, 2022 8:07:45 AM org.apache.commons.httpclient.HttpMethodDirector processRedirectResponse WARNING: Relative redirect location '/relativelocation/' not allowed -Jul 16, 2021 11:36:56 PM org.apache.commons.httpclient.HttpMethodDirector executeWithRetry +Aug 20, 2022 8:07:46 AM org.apache.commons.httpclient.HttpMethodDirector executeWithRetry INFO: I/O exception (java.io.IOException) caught when processing request: Oh no!! -Jul 16, 2021 11:36:56 PM org.apache.commons.httpclient.HttpMethodDirector executeWithRetry +Aug 20, 2022 8:07:46 AM org.apache.commons.httpclient.HttpMethodDirector executeWithRetry INFO: Retrying request -Jul 16, 2021 11:36:56 PM org.apache.commons.httpclient.HttpMethodDirector executeWithRetry +Aug 20, 2022 8:07:46 AM org.apache.commons.httpclient.HttpMethodDirector executeWithRetry INFO: I/O exception (java.net.ConnectException) caught when processing request: Connection refused (Connection refused) -Jul 16, 2021 11:36:56 PM org.apache.commons.httpclient.HttpMethodDirector executeWithRetry +Aug 20, 2022 8:07:46 AM org.apache.commons.httpclient.HttpMethodDirector executeWithRetry INFO: Retrying request -Jul 16, 2021 11:36:56 PM org.apache.commons.httpclient.HttpMethodDirector executeWithRetry +Aug 20, 2022 8:07:46 AM org.apache.commons.httpclient.HttpMethodDirector executeWithRetry INFO: I/O exception (java.net.ConnectException) caught when processing request: Connection refused (Connection refused) -Jul 16, 2021 11:36:56 PM org.apache.commons.httpclient.HttpMethodDirector executeWithRetry +Aug 20, 2022 8:07:46 AM org.apache.commons.httpclient.HttpMethodDirector executeWithRetry INFO: Retrying request -Jul 16, 2021 11:36:56 PM org.apache.commons.httpclient.HttpConnection releaseConnection +Aug 20, 2022 8:07:46 AM org.apache.commons.httpclient.HttpConnection releaseConnection WARNING: HttpConnectionManager is null. Connection cannot be released. -Jul 16, 2021 11:36:56 PM org.apache.commons.httpclient.HttpConnection releaseConnection +Aug 20, 2022 8:07:46 AM org.apache.commons.httpclient.HttpConnection releaseConnection WARNING: HttpConnectionManager is null. Connection cannot be released. -Jul 16, 2021 11:36:56 PM org.apache.commons.httpclient.HttpConnection releaseConnection +Aug 20, 2022 8:07:46 AM org.apache.commons.httpclient.HttpConnection releaseConnection WARNING: HttpConnectionManager is null. Connection cannot be released. -Jul 16, 2021 11:36:56 PM org.apache.commons.httpclient.HttpConnection releaseConnection +Aug 20, 2022 8:07:46 AM org.apache.commons.httpclient.HttpConnection releaseConnection WARNING: HttpConnectionManager is null. Connection cannot be released. -Jul 16, 2021 11:36:56 PM org.apache.commons.httpclient.HttpConnection releaseConnection +Aug 20, 2022 8:07:46 AM org.apache.commons.httpclient.HttpConnection releaseConnection WARNING: HttpConnectionManager is null. Connection cannot be released. -Jul 16, 2021 11:36:56 PM org.apache.commons.httpclient.HttpConnection releaseConnection +Aug 20, 2022 8:07:46 AM org.apache.commons.httpclient.HttpConnection releaseConnection WARNING: HttpConnectionManager is null. Connection cannot be released. -Jul 16, 2021 11:36:56 PM org.apache.commons.httpclient.HttpConnection releaseConnection +Aug 20, 2022 8:07:46 AM org.apache.commons.httpclient.HttpConnection releaseConnection WARNING: HttpConnectionManager is null. Connection cannot be released. -Jul 16, 2021 11:37:00 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:07:50 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testAbortMethod thread 0] I/O error: Connection reset by peer (Write failed) -Jul 16, 2021 11:37:01 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:07:52 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:01 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [testTunnellingParamsAgentLevel thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:01 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 1] I/O error: Connection reset -Jul 16, 2021 11:37:01 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:07:53 AM org.apache.commons.httpclient.HttpMethodDirector executeWithRetry +INFO: I/O exception (java.net.SocketException) caught when processing request: Connection or outbound has closed +Aug 20, 2022 8:07:53 AM org.apache.commons.httpclient.HttpMethodDirector executeWithRetry +INFO: Retrying request +Aug 20, 2022 8:07:53 AM org.apache.commons.httpclient.server.SimpleConnectionThread run +WARNING: [testTunnellingParamsAgentLevel thread 1] I/O error: No available authentication scheme +Aug 20, 2022 8:07:54 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:01 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:07:54 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testTunnellingParamsHostLevel thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:01 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:07:54 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testTunnellingParamsHostHTTP10AndMethodHTTP11 thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:01 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:02 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:55 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:02 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:55 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:02 PM org.apache.commons.httpclient.methods.HeadMethod readResponseBody +Aug 20, 2022 8:07:56 AM org.apache.commons.httpclient.methods.HeadMethod readResponseBody WARNING: Body content returned in response to HTTP HEAD -Jul 16, 2021 11:37:02 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:57 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:02 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:57 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:02 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:57 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:02 PM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge -INFO: Failure authenticating with BASIC 'test'@localhost:45371 -Jul 16, 2021 11:37:02 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:57 AM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge +INFO: Failure authenticating with BASIC 'test'@localhost:37287 +Aug 20, 2022 8:07:57 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:02 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:57 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:03 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:58 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:03 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:58 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:03 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:58 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:03 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:58 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:03 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:58 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:03 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:58 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:03 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:58 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:03 PM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge -INFO: Failure authenticating with BASIC 'test'@localhost:35647 -Jul 16, 2021 11:37:03 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:58 AM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge +INFO: Failure authenticating with BASIC 'test'@localhost:33689 +Aug 20, 2022 8:07:58 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:03 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:58 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:03 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:58 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:03 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:58 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:03 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:59 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:04 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:59 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:04 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:59 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:04 PM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge -INFO: Failure authenticating with BASIC 'test'@localhost:36595 -Jul 16, 2021 11:37:04 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:59 AM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge +INFO: Failure authenticating with BASIC 'test'@localhost:44341 +Aug 20, 2022 8:07:59 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:04 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:07:59 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:04 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:00 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:04 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:00 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:04 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:00 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:04 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:00 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:04 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:00 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:04 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:00 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:04 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:00 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:05 PM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge -INFO: Failure authenticating with BASIC 'test'@localhost:43213 -Jul 16, 2021 11:37:05 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:00 AM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge +INFO: Failure authenticating with BASIC 'test'@localhost:42461 +Aug 20, 2022 8:08:00 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:05 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:00 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:05 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:00 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:05 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:00 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:05 PM org.apache.commons.httpclient.HttpMethodDirector authenticateHost -WARNING: Required credentials not available for BASIC @localhost:41649 -Jul 16, 2021 11:37:05 PM org.apache.commons.httpclient.HttpMethodDirector authenticateHost +Aug 20, 2022 8:08:01 AM org.apache.commons.httpclient.HttpMethodDirector authenticateHost +WARNING: Required credentials not available for BASIC @localhost:37783 +Aug 20, 2022 8:08:01 AM org.apache.commons.httpclient.HttpMethodDirector authenticateHost WARNING: Preemptive authentication requested but no default credentials available -Jul 16, 2021 11:37:05 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:01 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:05 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:01 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:05 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:01 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:05 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:01 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testSimpleGet thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:06 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:06 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:01 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:06 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:01 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testGetHostAuthConnKeepAlive thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:06 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:06 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:01 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:06 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:02 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testGetHostAuthConnClose thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:06 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:06 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:02 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:06 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:02 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testGetHostInvalidAuth thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:06 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:06 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:02 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:06 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:02 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testGetInteractiveHostAuthConnKeepAlive thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:06 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:06 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:02 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:06 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [testGetInteractiveHostAuthConnClose thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:02 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:02 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:02 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testGetProxyAuthHostAuthConnKeepAlive thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:03 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:03 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:03 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testGetAuthProxy thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:03 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:03 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:03 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testGetProxyAuthHostAuthConnClose thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:03 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:03 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:03 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testGetProxyAuthHostInvalidAuth thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:03 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody -INFO: Response content length is not known -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [testGetInteractiveProxyAuthHostAuthConnKeepAlive thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:07 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:03 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:08 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [testPostHostAuthConnKeepAlive thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:08 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:08 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:03 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:08 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:03 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:08 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:03 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testGetInteractiveProxyAuthHostAuthConnClose thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:08 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:08 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:04 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:08 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:04 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testSimplePost thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:08 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:04 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody +INFO: Response content length is not known +Aug 20, 2022 8:08:04 AM org.apache.commons.httpclient.server.SimpleConnectionThread run +WARNING: [testPostHostAuthConnKeepAlive thread 0] I/O error: No available authentication scheme +Aug 20, 2022 8:08:04 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:08 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:04 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testPostHostAuthConnClose thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:08 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:08 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:04 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:08 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:04 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testPostHostInvalidAuth thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:08 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:08 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:05 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:08 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:05 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testPostInteractiveHostAuthConnKeepAlive thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:05 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:05 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testPostInteractiveHostAuthConnClose thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:05 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:05 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:05 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testPostAuthProxy thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:05 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:05 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:05 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testPostProxyAuthHostAuthConnKeepAlive thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:05 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:05 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:06 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testPostProxyAuthHostAuthConnClose thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:06 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:06 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:06 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testPostProxyAuthHostInvalidAuth thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:06 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:06 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:09 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:06 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testPostInteractiveProxyAuthHostAuthConnKeepAlive thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:10 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:10 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:06 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:10 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:06 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:10 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:06 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testPostInteractiveProxyAuthHostAuthConnClose thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:10 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:10 PM org.apache.commons.httpclient.HttpMethodDirector authenticateHost -WARNING: Required credentials not available for BASIC @localhost:40893 -Jul 16, 2021 11:37:10 PM org.apache.commons.httpclient.HttpMethodDirector authenticateHost +Aug 20, 2022 8:08:06 AM org.apache.commons.httpclient.HttpMethodDirector authenticateHost +WARNING: Required credentials not available for BASIC @localhost:43951 +Aug 20, 2022 8:08:06 AM org.apache.commons.httpclient.HttpMethodDirector authenticateHost WARNING: Preemptive authentication requested but no default credentials available -Jul 16, 2021 11:37:10 PM org.apache.commons.httpclient.HttpMethodBase readResponseBody +Aug 20, 2022 8:08:06 AM org.apache.commons.httpclient.HttpMethodBase readResponseBody INFO: Response content length is not known -Jul 16, 2021 11:37:10 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:06 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testPreemptiveAuthProxy thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:10 PM org.apache.commons.httpclient.server.SimpleConnectionThread run -WARNING: [Simple test thread 0] I/O error: Connection reset -Jul 16, 2021 11:37:10 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:06 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:10 PM org.apache.commons.httpclient.server.SimpleConnectionThread run +Aug 20, 2022 8:08:07 AM org.apache.commons.httpclient.server.SimpleConnectionThread run WARNING: [testGetProxyAuthHostAuthHTTP10 thread 0] I/O error: No available authentication scheme -Jul 16, 2021 11:37:10 PM org.apache.commons.httpclient.HttpMethodDirector authenticateHost -WARNING: Required credentials not available for BASIC @localhost:45797 -Jul 16, 2021 11:37:10 PM org.apache.commons.httpclient.HttpMethodDirector authenticateHost +Aug 20, 2022 8:08:07 AM org.apache.commons.httpclient.HttpMethodDirector authenticateHost +WARNING: Required credentials not available for BASIC @localhost:35279 +Aug 20, 2022 8:08:07 AM org.apache.commons.httpclient.HttpMethodDirector authenticateHost WARNING: Preemptive authentication requested but no default credentials available -Jul 16, 2021 11:37:10 PM org.apache.commons.httpclient.HttpMethodDirector authenticateHost -WARNING: Required credentials not available for BASIC @127.0.0.1:45797 -Jul 16, 2021 11:37:10 PM org.apache.commons.httpclient.HttpMethodDirector authenticateHost +Aug 20, 2022 8:08:07 AM org.apache.commons.httpclient.HttpMethodDirector authenticateHost +WARNING: Required credentials not available for BASIC @127.0.0.1:35279 +Aug 20, 2022 8:08:07 AM org.apache.commons.httpclient.HttpMethodDirector authenticateHost WARNING: Preemptive authentication requested but no default credentials available -Jul 16, 2021 11:37:10 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:07 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -Jul 16, 2021 11:37:11 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme +Aug 20, 2022 8:08:07 AM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected -[ERROR] Tests run: 591, Failures: 0, Errors: 29, Skipped: 0, Time elapsed: 21.31 s <<< FAILURE! - in org.apache.commons.httpclient.TestAll -[ERROR] testTunnellingParamsAgentLevel(org.apache.commons.httpclient.params.TestSSLTunnelParams) Time elapsed: 0.778 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] Tests run: 591, Failures: 0, Errors: 29, Skipped: 0, Time elapsed: 27.112 s <<< FAILURE! - in org.apache.commons.httpclient.TestAll +[ERROR] testTunnellingParamsAgentLevel(org.apache.commons.httpclient.params.TestSSLTunnelParams) Time elapsed: 3.118 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3388,15 +3379,8 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.params.TestSSLTunnelParams.testTunnellingParamsAgentLevel(TestSSLTunnelParams.java:127) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 41 more -[ERROR] testTunnellingParamsHostLevel(org.apache.commons.httpclient.params.TestSSLTunnelParams) Time elapsed: 0.155 s <<< ERROR! +[ERROR] testTunnellingParamsHostLevel(org.apache.commons.httpclient.params.TestSSLTunnelParams) Time elapsed: 0.468 s <<< ERROR! javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) @@ -3420,10 +3404,15 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.params.TestSSLTunnelParams.testTunnellingParamsHostLevel(TestSSLTunnelParams.java:160) -[ERROR] testTunnellingParamsHostHTTP10AndMethodHTTP11(org.apache.commons.httpclient.params.TestSSLTunnelParams) Time elapsed: 0.236 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testTunnellingParamsHostHTTP10AndMethodHTTP11(org.apache.commons.httpclient.params.TestSSLTunnelParams) Time elapsed: 0.328 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3438,18 +3427,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.params.TestSSLTunnelParams.testTunnellingParamsHostHTTP10AndMethodHTTP11(TestSSLTunnelParams.java:182) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 41 more -[ERROR] testSimpleGet(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.244 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testSimpleGet(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.195 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3464,18 +3451,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testSimpleGet(TestProxy.java:137) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 45 more -[ERROR] testGetHostAuthConnKeepAlive(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.245 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testGetHostAuthConnKeepAlive(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.18 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3490,18 +3475,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testGetHostAuthConnKeepAlive(TestProxy.java:162) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 45 more -[ERROR] testGetHostAuthConnClose(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.142 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testGetHostAuthConnClose(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.276 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3516,18 +3499,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testGetHostAuthConnClose(TestProxy.java:187) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 45 more -[ERROR] testGetHostInvalidAuth(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.243 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testGetHostInvalidAuth(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.258 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3542,18 +3523,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testGetHostInvalidAuth(TestProxy.java:215) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 45 more -[ERROR] testGetInteractiveHostAuthConnKeepAlive(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.237 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testGetInteractiveHostAuthConnKeepAlive(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.246 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3568,18 +3547,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testGetInteractiveHostAuthConnKeepAlive(TestProxy.java:241) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 45 more -[ERROR] testGetInteractiveHostAuthConnClose(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.241 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testGetInteractiveHostAuthConnClose(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.183 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3594,18 +3571,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testGetInteractiveHostAuthConnClose(TestProxy.java:267) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 45 more -[ERROR] testGetProxyAuthHostAuthConnKeepAlive(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.136 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testGetProxyAuthHostAuthConnKeepAlive(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.245 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3620,18 +3595,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testGetProxyAuthHostAuthConnKeepAlive(TestProxy.java:295) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 45 more -[ERROR] testGetAuthProxy(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.139 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testGetAuthProxy(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.167 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3646,18 +3619,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testGetAuthProxy(TestProxy.java:316) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 45 more -[ERROR] testGetProxyAuthHostAuthConnClose(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.239 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testGetProxyAuthHostAuthConnClose(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.169 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3672,18 +3643,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testGetProxyAuthHostAuthConnClose(TestProxy.java:344) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 45 more -[ERROR] testGetProxyAuthHostInvalidAuth(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.239 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testGetProxyAuthHostInvalidAuth(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.265 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3698,15 +3667,8 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testGetProxyAuthHostInvalidAuth(TestProxy.java:373) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 45 more -[ERROR] testGetInteractiveProxyAuthHostAuthConnKeepAlive(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.084 s <<< ERROR! +[ERROR] testGetInteractiveProxyAuthHostAuthConnKeepAlive(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.186 s <<< ERROR! javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) @@ -3730,60 +3692,56 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testGetInteractiveProxyAuthHostAuthConnKeepAlive(TestProxy.java:401) -[ERROR] testPostHostAuthConnKeepAlive(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.134 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testGetInteractiveProxyAuthHostAuthConnClose(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.217 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) at java.base/sun.security.ssl.SSLSocketImpl$AppOutputStream.write(SSLSocketImpl.java:1199) at java.base/java.io.BufferedOutputStream.flushBuffer(BufferedOutputStream.java:81) at java.base/java.io.BufferedOutputStream.flush(BufferedOutputStream.java:142) - at org.apache.commons.httpclient.methods.StringRequestEntity.writeRequest(StringRequestEntity.java:146) - at org.apache.commons.httpclient.methods.EntityEnclosingMethod.writeRequestBody(EntityEnclosingMethod.java:499) - at org.apache.commons.httpclient.HttpMethodBase.writeRequest(HttpMethodBase.java:2114) + at org.apache.commons.httpclient.HttpConnection.flushRequestOutputStream(HttpConnection.java:828) + at org.apache.commons.httpclient.HttpMethodBase.writeRequest(HttpMethodBase.java:2116) at org.apache.commons.httpclient.HttpMethodBase.execute(HttpMethodBase.java:1096) at org.apache.commons.httpclient.HttpMethodDirector.executeWithRetry(HttpMethodDirector.java:398) at org.apache.commons.httpclient.HttpMethodDirector.executeMethod(HttpMethodDirector.java:171) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) - at org.apache.commons.httpclient.TestProxy.testPostHostAuthConnKeepAlive(TestProxy.java:470) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 46 more + at org.apache.commons.httpclient.TestProxy.testGetInteractiveProxyAuthHostAuthConnClose(TestProxy.java:429) -[ERROR] testGetInteractiveProxyAuthHostAuthConnClose(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.276 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testSimplePost(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.144 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) at java.base/sun.security.ssl.SSLSocketImpl$AppOutputStream.write(SSLSocketImpl.java:1199) at java.base/java.io.BufferedOutputStream.flushBuffer(BufferedOutputStream.java:81) at java.base/java.io.BufferedOutputStream.flush(BufferedOutputStream.java:142) - at org.apache.commons.httpclient.HttpConnection.flushRequestOutputStream(HttpConnection.java:828) - at org.apache.commons.httpclient.HttpMethodBase.writeRequest(HttpMethodBase.java:2116) + at org.apache.commons.httpclient.methods.StringRequestEntity.writeRequest(StringRequestEntity.java:146) + at org.apache.commons.httpclient.methods.EntityEnclosingMethod.writeRequestBody(EntityEnclosingMethod.java:499) + at org.apache.commons.httpclient.HttpMethodBase.writeRequest(HttpMethodBase.java:2114) at org.apache.commons.httpclient.HttpMethodBase.execute(HttpMethodBase.java:1096) at org.apache.commons.httpclient.HttpMethodDirector.executeWithRetry(HttpMethodDirector.java:398) at org.apache.commons.httpclient.HttpMethodDirector.executeMethod(HttpMethodDirector.java:171) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) - at org.apache.commons.httpclient.TestProxy.testGetInteractiveProxyAuthHostAuthConnClose(TestProxy.java:429) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 45 more + at org.apache.commons.httpclient.TestProxy.testSimplePost(TestProxy.java:444) -[ERROR] testSimplePost(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.032 s <<< ERROR! +[ERROR] testPostHostAuthConnKeepAlive(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.196 s <<< ERROR! javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) @@ -3806,12 +3764,17 @@ at org.apache.commons.httpclient.HttpMethodDirector.executeMethod(HttpMethodDirector.java:171) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) - at org.apache.commons.httpclient.TestProxy.testSimplePost(TestProxy.java:444) + at org.apache.commons.httpclient.TestProxy.testPostHostAuthConnKeepAlive(TestProxy.java:470) -[ERROR] testPostHostAuthConnClose(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.231 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testPostHostAuthConnClose(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.251 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3827,18 +3790,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testPostHostAuthConnClose(TestProxy.java:496) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 46 more -[ERROR] testPostHostInvalidAuth(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.234 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testPostHostInvalidAuth(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.385 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3854,18 +3815,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testPostHostInvalidAuth(TestProxy.java:526) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 46 more -[ERROR] testPostInteractiveHostAuthConnKeepAlive(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.13 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testPostInteractiveHostAuthConnKeepAlive(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.14 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3881,18 +3840,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testPostInteractiveHostAuthConnKeepAlive(TestProxy.java:552) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 46 more -[ERROR] testPostInteractiveHostAuthConnClose(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.13 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testPostInteractiveHostAuthConnClose(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.184 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3908,15 +3865,8 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testPostInteractiveHostAuthConnClose(TestProxy.java:579) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 46 more -[ERROR] testPostAuthProxy(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.031 s <<< ERROR! +[ERROR] testPostAuthProxy(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.272 s <<< ERROR! javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) @@ -3941,10 +3891,15 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testPostAuthProxy(TestProxy.java:602) -[ERROR] testPostProxyAuthHostAuthConnKeepAlive(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.233 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testPostProxyAuthHostAuthConnKeepAlive(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.196 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3960,18 +3915,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testPostProxyAuthHostAuthConnKeepAlive(TestProxy.java:631) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 46 more -[ERROR] testPostProxyAuthHostAuthConnClose(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.132 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testPostProxyAuthHostAuthConnClose(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.168 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -3987,18 +3940,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testPostProxyAuthHostAuthConnClose(TestProxy.java:660) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 46 more -[ERROR] testPostProxyAuthHostInvalidAuth(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.232 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testPostProxyAuthHostInvalidAuth(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.179 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -4014,18 +3965,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testPostProxyAuthHostInvalidAuth(TestProxy.java:692) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 46 more -[ERROR] testPostInteractiveProxyAuthHostAuthConnKeepAlive(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.279 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testPostInteractiveProxyAuthHostAuthConnKeepAlive(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.209 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -4041,18 +3990,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testPostInteractiveProxyAuthHostAuthConnKeepAlive(TestProxy.java:720) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 46 more -[ERROR] testPostInteractiveProxyAuthHostAuthConnClose(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.281 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testPostInteractiveProxyAuthHostAuthConnClose(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.163 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -4068,18 +4015,16 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testPostInteractiveProxyAuthHostAuthConnClose(TestProxy.java:749) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 46 more -[ERROR] testPreemptiveAuthProxy(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.23 s <<< ERROR! -javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake - at java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1598) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1426) +[ERROR] testPreemptiveAuthProxy(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.171 s <<< ERROR! +javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) + at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) + at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:336) + at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) + at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:185) + at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:171) + at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1324) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:829) @@ -4094,15 +4039,8 @@ at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at org.apache.commons.httpclient.TestProxy.testPreemptiveAuthProxy(TestProxy.java:769) -Caused by: java.io.EOFException: SSL peer shut down incorrectly - at java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:483) - at java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) - at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) - at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) - at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1418) - ... 45 more -[ERROR] testGetProxyAuthHostAuthHTTP10(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.232 s <<< ERROR! +[ERROR] testGetProxyAuthHostAuthHTTP10(org.apache.commons.httpclient.TestProxy) Time elapsed: 0.292 s <<< ERROR! javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) @@ -4247,8 +4185,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 31.360 s -[INFO] Finished at: 2021-07-16T23:37:19-12:00 +[INFO] Total time: 31.923 s +[INFO] Finished at: 2022-08-20T08:08:10+14:00 [INFO] ------------------------------------------------------------------------ create-stamp debian/debhelper-build-stamp fakeroot debian/rules binary @@ -4278,8 +4216,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 0.861 s -[INFO] Finished at: 2021-07-16T23:37:22-12:00 +[INFO] Total time: 3.690 s +[INFO] Finished at: 2022-08-20T08:08:26+14:00 [INFO] ------------------------------------------------------------------------ mh_resolve_dependencies --non-interactive --offline --build -plibcommons-httpclient-java --javadoc --base-directory=/build/commons-httpclient-3.1 --non-explore Analysing debian/pom.xml... @@ -4333,20 +4271,22 @@ dpkg-gencontrol: warning: package libcommons-httpclient-java-doc: substitution variable ${maven:Depends} unused, but is defined dh_md5sums -O--buildsystem=maven dh_builddeb -O--buildsystem=maven -dpkg-deb: building package 'libcommons-httpclient-java-doc' in '../libcommons-httpclient-java-doc_3.1-15_all.deb'. dpkg-deb: building package 'libcommons-httpclient-java' in '../libcommons-httpclient-java_3.1-15_all.deb'. +dpkg-deb: building package 'libcommons-httpclient-java-doc' in '../libcommons-httpclient-java-doc_3.1-15_all.deb'. dpkg-genbuildinfo --build=binary dpkg-genchanges --build=binary >../commons-httpclient_3.1-15_amd64.changes dpkg-genchanges: info: binary-only upload (no source code included) dpkg-source --after-build . dpkg-buildpackage: info: binary-only upload (no source included) I: copying local configuration +I: user script /srv/workspace/pbuilder/54254/tmp/hooks/B01_cleanup starting +I: user script /srv/workspace/pbuilder/54254/tmp/hooks/B01_cleanup finished I: unmounting dev/ptmx filesystem I: unmounting dev/pts filesystem I: unmounting dev/shm filesystem I: unmounting proc filesystem I: unmounting sys filesystem I: cleaning the build env -I: removing directory /srv/workspace/pbuilder/22595 and its subdirectories -I: Current time: Fri Jul 16 23:38:19 -12 2021 -I: pbuilder-time-stamp: 1626521899 +I: removing directory /srv/workspace/pbuilder/54254 and its subdirectories +I: Current time: Sat Aug 20 08:11:38 +14 2022 +I: pbuilder-time-stamp: 1660932698