robotpkg/sysutils/y2l bulk build results
Log for y2l-1.0 on Distfiles: fetch(y2l.sourceforge.net)::y2l.tar.gz.log (Back)
== Info: Host y2l.sourceforge.net:80 was resolved.
== Info: IPv6: 2606:4700::6812:c95, 2606:4700::6812:d95
== Info: IPv4: 104.18.13.149, 104.18.12.149
== Info: Trying [2606:4700::6812:c95]:80...
== Info: Connected to y2l.sourceforge.net (2606:4700::6812:c95) port 80
=> Send header, 148 bytes (0x94)
0000: GET /download/y2l.tar.gz HTTP/1.1
0023: Host: y2l.sourceforge.net
003e: User-Agent: robotpkg http://robotpkg.openrobots.org
0073: Accept: */*
0080: Range: bytes=0-0
0092:
<= Recv header, 32 bytes (0x20)
0000: HTTP/1.1 301 Moved Permanently
<= Recv header, 37 bytes (0x25)
0000: Date: Tue, 17 Feb 2026 06:27:26 GMT
<= Recv header, 25 bytes (0x19)
0000: Content-Type: text/html
<= Recv header, 21 bytes (0x15)
0000: Content-Length: 167
<= Recv header, 24 bytes (0x18)
0000: Connection: keep-alive
<= Recv header, 29 bytes (0x1d)
0000: Cache-Control: max-age=3600
<= Recv header, 40 bytes (0x28)
0000: Expires: Tue, 17 Feb 2026 07:27:26 GMT
<= Recv header, 59 bytes (0x3b)
0000: Location: https://y2l.sourceforge.net/download/y2l.tar.gz
<= Recv header, 52 bytes (0x34)
0000: Content-Security-Policy: upgrade-insecure-requests
<= Recv header, 20 bytes (0x14)
0000: Server: cloudflare
<= Recv header, 30 bytes (0x1e)
0000: CF-RAY: 9cf33808af9fd7e7-CDG
<= Recv header, 30 bytes (0x1e)
0000: alt-svc: h3=":443"; ma=86400
<= Recv header, 2 bytes (0x2)
0000:
== Info: Ignoring the response-body
== Info: Connection #0 to host y2l.sourceforge.net left intact
== Info: Clear auth, redirects to port from 80 to 443
== Info: Issue another request to this URL: 'https://y2l.sourceforge.net/download/y2l.tar.gz'
== Info: Host y2l.sourceforge.net:443 was resolved.
== Info: IPv6: 2606:4700::6812:d95, 2606:4700::6812:c95
== Info: IPv4: 104.18.12.149, 104.18.13.149
== Info: Trying [2606:4700::6812:d95]:443...
== Info: Connected to y2l.sourceforge.net (2606:4700::6812:d95) port 443
== Info: ALPN: curl offers h2,http/1.1
=> Send SSL data, 5 bytes (0x5)
0000: .....
== Info: TLSv1.3 (OUT), TLS handshake, Client hello (1):
=> Send SSL data, 512 bytes (0x200)
0000: ......X...............b..2J..DHy~....P ...w.m..zu..z.Y.|...&.1Kr
0040: ........>.......,.0.........+./...$.(.k.#.'.g.....9.....3.....=.
0080: <.5./.....u.........y2l.sourceforge.net.........................
00c0: ................h2.http/1.1.........1.....*.(...................
0100: ......................+........-.....3.&.$... s2..w./ ....RN.Y..
0140: O{...=.A|W..pT..................................................
0180: ................................................................
01c0: ................................................................
<= Recv SSL data, 5 bytes (0x5)
0000: ....z
== Info: TLSv1.3 (IN), TLS handshake, Server hello (2):
<= Recv SSL data, 122 bytes (0x7a)
0000: ...v...U.v....E...:2.@<.t...r.......zm ...w.m..zu..z.Y.|...&.1Kr
0040: .............3.$... .*..6Cn.<..0-.._=..H......\.p.h..+....
<= Recv SSL data, 5 bytes (0x5)
0000: .....
<= Recv SSL data, 5 bytes (0x5)
0000: .....
<= Recv SSL data, 1 bytes (0x1)
0000: .
== Info: TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
<= Recv SSL data, 19 bytes (0x13)
0000: .................h2
== Info: TLSv1.3 (IN), TLS handshake, Certificate (11):
<= Recv SSL data, 2062 bytes (0x80e)
0000: ...........0...0..#..........:;.....Y..y...V0...*.H.=...021.0...
0040: U....US1.0...U....Let's Encrypt1.0...U....E80...260107233909Z..2
0080: 60407233908Z0.1.0...U....sourceforge.net0Y0...*.H.=....*.H.=....
00c0: B.......}\._.....nL....i8.#d4s..+....T}'.w..L.d....+..}.#f..l./&
0100: ....../0..+0...U...........0...U.%..0...+.........+.......0...U.
0140: ......0.0...U......R.LR...H...RV.6..W.i0...U.#..0.........~.Pl3.
0180: 8]Y.#r..02..+........&0$0"..+.....0...http://e8.i.lencr.org/0-..
01c0: U...&0$..*.sourceforge.net..sourceforge.net0...U. ..0.0...g.....
0200: 0-..U...&0$0". ....http://e8.c.lencr.org/87.crl0.....+.....y....
0240: ........v...-...%...:.E....#..K..)'...3................G0E. VMr.
0280: ....3.,........=q2%.!.%.a.N!.............F0D. (p.aR.Q.t...
0300: JY....1.ej....P....x. ).#...:b.G).XT..5.... v(r....B.50...*.H.=.
0340: ...i.0f.1.......;..mU(.....=~Q.B.0...$:...............A[...1..}.
0380: ...s.........iS..$..1..{.`}0m)..fR._...A.........Z0..V0..>......
03c0: .c..c.Np.qY.....V0...*.H........0O1.0...U....US1)0'..U... Intern
0400: et Security Research Group1.0...U....ISRG Root X10...24031300000
0440: 0Z..270312235959Z021.0...U....US1.0...U....Let's Encrypt1.0...U.
0480: ...E80v0...*.H.=....+...".b...e.^.K.........l.:.8...923.B..3.4.!
04c0: .p\.b/.q.B.y.F...G......&c;....=.32..+...:..g.{k>.H.....m>.L...
0500: 0..0...U...........0...U.%..0...+.........+.......0...U.......0.
0540: ......0...U............~.Pl3.8]Y.#r..0...U.#..0...y.Y.{....s....
0580: .X...n02..+........&0$0"..+.....0...http://x1.i.lencr.org/0...U.
05c0: ..0.0...g.....0'..U... 0.0.......http://x1.c.lencr.org/0...*.H.
0600: ............g.HF ......|u..C....6tD..M......vp`.).......=c...!..
0640: .)..h..>m...el......M...&B.t.......qs..x.u.. K181..../"...d.;.<.
0680: .....p..Q.....Y....;.F..U.q..e.B....v..u.S.+..<35@h4......z.Au..
06c0: gG[.W ...a...EY..8..#.N.e3...%y.JfS...^.........(_.g.GZ.+...9.`.
0700: SO....9......O...6...z.i...T-8...3......T.....p.{-.....?X3.k..#.
0740: o.._.....{.e.#.....b..V..... t.B.+'...'.P:...........zL:...!.d..
0780: ..7.:.....k..&..%......?.F..( ..=.......~...]..+...j#.u..3*.."4.
07c0: ..*..R..i..!_gm.......S.gA.gLR..Q.s..fgaqT..cMc......&....e....c
0800: x..X..s.~u.I..
== Info: TLSv1.3 (IN), TLS handshake, CERT verify (15):
<= Recv SSL data, 78 bytes (0x4e)
0000: ...J...F0D. rd..f...'....p[.g..h.1T.".....;.. vS..i..t;..rH..~.M
0040: ........p*S.G.
== Info: TLSv1.3 (IN), TLS handshake, Finished (20):
<= Recv SSL data, 52 bytes (0x34)
0000: ...0\.....#..~.s...k.#.Q..,..uI/.+.b.G.zh.4k......Y.
=> Send SSL data, 5 bytes (0x5)
0000: .....
== Info: TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
=> Send SSL data, 1 bytes (0x1)
0000: .
=> Send SSL data, 5 bytes (0x5)
0000: ....E
=> Send SSL data, 1 bytes (0x1)
0000: .
== Info: TLSv1.3 (OUT), TLS handshake, Finished (20):
=> Send SSL data, 52 bytes (0x34)
0000: ...0...=...h...}...u..<.g...my.......T:..[...!~.q.@.
== Info: SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519 / id-ecPublicKey
== Info: ALPN: server accepted h2
== Info: Server certificate:
== Info: subject: CN=sourceforge.net
== Info: start date: Jan 7 23:39:09 2026 GMT
== Info: expire date: Apr 7 23:39:08 2026 GMT
== Info: issuer: C=US; O=Let's Encrypt; CN=E8
== Info: SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
== Info: Certificate level 0: Public key type EC/prime256v1 (256/128 Bits/secBits), signed using ecdsa-with-SHA384
== Info: Certificate level 1: Public key type EC/secp384r1 (384/192 Bits/secBits), signed using sha256WithRSAEncryption
=> Send SSL data, 5 bytes (0x5)
0000: ....Q
=> Send SSL data, 1 bytes (0x1)
0000: .
== Info: using HTTP/2
== Info: [HTTP/2] [1] OPENED stream for https://y2l.sourceforge.net/download/y2l.tar.gz
== Info: [HTTP/2] [1] [:method: GET]
== Info: [HTTP/2] [1] [:scheme: https]
== Info: [HTTP/2] [1] [:authority: y2l.sourceforge.net]
== Info: [HTTP/2] [1] [:path: /download/y2l.tar.gz]
== Info: [HTTP/2] [1] [user-agent: robotpkg http://robotpkg.openrobots.org]
== Info: [HTTP/2] [1] [accept: */*]
== Info: [HTTP/2] [1] [range: bytes=0-0]
=> Send SSL data, 5 bytes (0x5)
0000: ....i
=> Send SSL data, 1 bytes (0x1)
0000: .
=> Send header, 146 bytes (0x92)
0000: GET /download/y2l.tar.gz HTTP/2
0021: Host: y2l.sourceforge.net
003c: User-Agent: robotpkg http://robotpkg.openrobots.org
0071: Accept: */*
007e: Range: bytes=0-0
0090:
<= Recv SSL data, 5 bytes (0x5)
0000: .....
<= Recv SSL data, 1 bytes (0x1)
0000: .
== Info: TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
<= Recv SSL data, 238 bytes (0xee)
0000: ....... PGV....... Q.9dQk? ...3.`..{h%@.R....[.Z/.L.5.....8:..G.
0040: ....$...K4@.,c.."E....).2.a{........Lg.8......e.L.>.....6JNy(.I.
0080: >.........P..t...y....(.........`.gG..........I;*.....!....A.x..
00c0: _.......@...;..>+.....*.kn.........*....8.....
== Info: TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
<= Recv SSL data, 238 bytes (0xee)
0000: ....... ;.o'...... Q.9dQk? ...3.....}e!.,....IoW.M.X3.%p..sR....
0040: .~..J....X_!9....w.<....8J.yEz.CGr.%@.._..R.\....gf.A..s..-.}.c.
0080: nU.Xb.....$.o0....0.........g.H..~\.....g.L]..)$..D..tI.-.D..B.E
00c0: *......v...1...J...o....?....I.....*....8.....
== Info: old SSL session ID is stale, removing
<= Recv SSL data, 5 bytes (0x5)
0000: ....9
<= Recv SSL data, 1 bytes (0x1)
0000: .
<= Recv SSL data, 5 bytes (0x5)
0000: .....
<= Recv SSL data, 1 bytes (0x1)
0000: .
=> Send SSL data, 5 bytes (0x5)
0000: .....
=> Send SSL data, 1 bytes (0x1)
0000: .
<= Recv SSL data, 5 bytes (0x5)
0000: .....
<= Recv SSL data, 1 bytes (0x1)
0000: .
<= Recv SSL data, 5 bytes (0x5)
0000: .....
<= Recv SSL data, 1 bytes (0x1)
0000: .
<= Recv SSL data, 5 bytes (0x5)
0000: .....
<= Recv SSL data, 1 bytes (0x1)
0000: .
<= Recv header, 13 bytes (0xd)
0000: HTTP/2 404
<= Recv header, 37 bytes (0x25)
0000: date: Tue, 17 Feb 2026 06:27:26 GMT
<= Recv header, 25 bytes (0x19)
0000: content-type: text/html
<= Recv header, 21 bytes (0x15)
0000: content-length: 146
<= Recv header, 30 bytes (0x1e)
0000: cf-ray: 9cf338091e686ed9-CDG
<= Recv header, 25 bytes (0x19)
0000: x-from: sfp-staticweb-2
<= Recv header, 8 bytes (0x8)
0000: age: 0
<= Recv header, 22 bytes (0x16)
0000: cf-cache-status: HIT
<= Recv header, 295 bytes (0x127)
0000: set-cookie: __cf_bm=9WhvwWMCBBMMdHiAOm0qHfKhhYQ7hR_dvz5w8SXCTuU-
0040: 1771309646-1.0.1.1-mKzYESYvqo0_qUcz5mEi7e2c5s9KMSt4jgDs23zv7bBJV
0080: mLF9C_Z_iuxjt4chsHGOKO7pmJsKYhwBOI6a9SFWh6sVJGuomLVvRecX4F0jpo;
00c0: path=/; expires=Tue, 17-Feb-26 06:57:26 GMT; domain=.sourceforge
0100: .net; HttpOnly; Secure; SameSite=None
<= Recv header, 52 bytes (0x34)
0000: content-security-policy: upgrade-insecure-requests
<= Recv header, 20 bytes (0x14)
0000: server: cloudflare
<= Recv header, 30 bytes (0x1e)
0000: alt-svc: h3=":443"; ma=86400
== Info: The requested URL returned error: 404
== Info: Connection #1 to host y2l.sourceforge.net left intact