robotpkg/sysutils/y2l bulk build results

Log for y2l-1.0 on Distfiles: fetch(y2l.sourceforge.net)::y2l.tar.gz.log (Back)

== Info: Host y2l.sourceforge.net:80 was resolved. == Info: IPv6: 2606:4700::6812:c95, 2606:4700::6812:d95 == Info: IPv4: 104.18.12.149, 104.18.13.149 == Info: Trying [2606:4700::6812:c95]:80... == Info: Connected to y2l.sourceforge.net (2606:4700::6812:c95) port 80 => Send header, 148 bytes (0x94) 0000: GET /download/y2l.tar.gz HTTP/1.1 0023: Host: y2l.sourceforge.net 003e: User-Agent: robotpkg http://robotpkg.openrobots.org 0073: Accept: */* 0080: Range: bytes=0-0 0092: <= Recv header, 32 bytes (0x20) 0000: HTTP/1.1 301 Moved Permanently <= Recv header, 37 bytes (0x25) 0000: Date: Tue, 04 Nov 2025 06:27:30 GMT <= Recv header, 25 bytes (0x19) 0000: Content-Type: text/html <= Recv header, 21 bytes (0x15) 0000: Content-Length: 167 <= Recv header, 24 bytes (0x18) 0000: Connection: keep-alive <= Recv header, 29 bytes (0x1d) 0000: Cache-Control: max-age=3600 <= Recv header, 40 bytes (0x28) 0000: Expires: Tue, 04 Nov 2025 07:27:30 GMT <= Recv header, 59 bytes (0x3b) 0000: Location: https://y2l.sourceforge.net/download/y2l.tar.gz <= Recv header, 52 bytes (0x34) 0000: Content-Security-Policy: upgrade-insecure-requests <= Recv header, 20 bytes (0x14) 0000: Server: cloudflare <= Recv header, 30 bytes (0x1e) 0000: CF-RAY: 99920bc31a28701c-CDG <= Recv header, 30 bytes (0x1e) 0000: alt-svc: h3=":443"; ma=86400 <= Recv header, 2 bytes (0x2) 0000: == Info: Ignoring the response-body == Info: Connection #0 to host y2l.sourceforge.net left intact == Info: Clear auth, redirects to port from 80 to 443 == Info: Issue another request to this URL: 'https://y2l.sourceforge.net/download/y2l.tar.gz' == Info: Host y2l.sourceforge.net:443 was resolved. == Info: IPv6: 2606:4700::6812:c95, 2606:4700::6812:d95 == Info: IPv4: 104.18.13.149, 104.18.12.149 == Info: Trying [2606:4700::6812:c95]:443... == Info: Connected to y2l.sourceforge.net (2606:4700::6812:c95) port 443 == Info: ALPN: curl offers h2,http/1.1 => Send SSL data, 5 bytes (0x5) 0000: ..... == Info: TLSv1.3 (OUT), TLS handshake, Client hello (1): => Send SSL data, 512 bytes (0x200) 0000: .........D.q..U<$.>,...(.o.W.......... `..m1.g.a...TS..2...Jy),. 0040: Q.LHI...>.......,.0.........+./...$.(.k.#.'.g.....9.....3.....=. 0080: <.5./.....u.........y2l.sourceforge.net......................... 00c0: ................h2.http/1.1.........1.....*.(................... 0100: ......................+........-.....3.&.$... .....-9F.......... 0140: ..\.A.t~x8Hl.b.................................................. 0180: ................................................................ 01c0: ................................................................ <= Recv SSL data, 5 bytes (0x5) 0000: ....z == Info: TLSv1.3 (IN), TLS handshake, Server hello (2): <= Recv SSL data, 122 bytes (0x7a) 0000: ...v.....?.:.....1...0GA......O\.....z `..m1.g.a...TS..2...Jy),. 0040: Q.LHI........3.$... P|..>M...g....S....]<..d.I"...u..+.... <= Recv SSL data, 5 bytes (0x5) 0000: ..... <= Recv SSL data, 5 bytes (0x5) 0000: ..... <= Recv SSL data, 1 bytes (0x1) 0000: . == Info: TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): <= Recv SSL data, 19 bytes (0x13) 0000: .................h2 == Info: TLSv1.3 (IN), TLS handshake, Certificate (11): <= Recv SSL data, 2087 bytes (0x827) 0000: ...#.......0...0..=.........y7.o..w?B...|.."0...*.H.=...021.0... 0040: U....US1.0...U....Let's Encrypt1.0...U....E70...251027220807Z..2 0080: 60125220806Z0.1.0...U....sourceforge.net0Y0...*.H.=....*.H.=.... 00c0: B.....p.~.....e....Hpi.]..........3.`.!...3i*U._ 02c0: i.....VW....FX..>.o$...M.v..8...|..D_[....n..Y.G.i.......X.....' 0300: .n......G0E. '.r.U.......&.R..:..n8y".@.R.....!..we.S......#..Pe 0340: 4|...o....jo(...0...*.H.=....g.0d./v.ck..NA....`.P."...,.r..J..0 0380: ...i.$..vC.........1..$`.P.y?.I?0....y9J..[.7/......_.>........R 03c0: ..c......[0..W0..?.........u..+..".f......0...*.H........0O1.0.. 0400: .U....US1)0'..U... Internet Security Research Group1.0...U....IS 0440: RG Root X10...240313000000Z..270312235959Z021.0...U....US1.0...U 0480: ....Let's Encrypt1.0...U....E70v0...*.H.=....+...".b..A....X..70 04c0: ...A..V...>....g...OS.../.)...F.[bN...A...@rE.,\J2.....je....u.@ 0500: ;.h....jq.teQS....'.3....0..0...U...........0...U.%..0...+...... 0540: ...+.......0...U.......0.......0...U.......H....D.o...`t.x....0. 0580: ..U.#..0...y.Y.{....s.....X...n02..+........&0$0"..+.....0...htt 05c0: p://x1.i.lencr.org/0...U. ..0.0...g.....0'..U... 0.0.......http: 0600: //x1.c.lencr.org/0...*.H................|7K....}...p....u.hG.A.W 0640: p..u.FI..P..5.M..5..e^^..(f.p..._r.......E..j..Q.....-..v.D`..'. 0680: x..&./B.|pY..z..'.$X...9.....*wz..L....y.BP .............MF..S.. 06c0: KL0.<..uC+8..V2.....)=zz....B....W...-...Y"....{..:..D5n-h.S@.w. 0700: iE..`....l....~3..c..|..K..A..a.Kg....U...3...1.h.X.2...N.1.}p.. 0740: .9.G....{.6.........\D....Qrq.o.&....R.......~.5.S.1..D._H,n0.k. 0780: .......G.j=.......|.i.....pwK...F&sIi{].....H$.Kk..(B........... 07c0: ......-.i....o...........X..i|...{{...F..Ia......c..UK....x5p... 0800: .....d...K....sO.A.=}..+Kr.U0.?m.lrG... == Info: TLSv1.3 (IN), TLS handshake, CERT verify (15): <= Recv SSL data, 78 bytes (0x4e) 0000: ...J...F0D. ....H..n.ox3...{.Lt_q...m..-Z.p.. _!..*.>4..vP.#p?.. 0040: .O..|6^....... == Info: TLSv1.3 (IN), TLS handshake, Finished (20): <= Recv SSL data, 52 bytes (0x34) 0000: ...0.o...L..+B..-(...lz4.l:..8~M@p.FJ.Z....e]..+.F>$ => Send SSL data, 5 bytes (0x5) 0000: ..... == Info: TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): => Send SSL data, 1 bytes (0x1) 0000: . => Send SSL data, 5 bytes (0x5) 0000: ....E => Send SSL data, 1 bytes (0x1) 0000: . == Info: TLSv1.3 (OUT), TLS handshake, Finished (20): => Send SSL data, 52 bytes (0x34) 0000: ...0../~=.6.....h........7......%.R.1.}y4....E..YV.. == Info: SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519 / id-ecPublicKey == Info: ALPN: server accepted h2 == Info: Server certificate: == Info: subject: CN=sourceforge.net == Info: start date: Oct 27 22:08:07 2025 GMT == Info: expire date: Jan 25 22:08:06 2026 GMT == Info: issuer: C=US; O=Let's Encrypt; CN=E7 == Info: SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. == Info: Certificate level 0: Public key type EC/prime256v1 (256/128 Bits/secBits), signed using ecdsa-with-SHA384 == Info: Certificate level 1: Public key type EC/secp384r1 (384/192 Bits/secBits), signed using sha256WithRSAEncryption => Send SSL data, 5 bytes (0x5) 0000: ....Q => Send SSL data, 1 bytes (0x1) 0000: . == Info: using HTTP/2 == Info: [HTTP/2] [1] OPENED stream for https://y2l.sourceforge.net/download/y2l.tar.gz == Info: [HTTP/2] [1] [:method: GET] == Info: [HTTP/2] [1] [:scheme: https] == Info: [HTTP/2] [1] [:authority: y2l.sourceforge.net] == Info: [HTTP/2] [1] [:path: /download/y2l.tar.gz] == Info: [HTTP/2] [1] [user-agent: robotpkg http://robotpkg.openrobots.org] == Info: [HTTP/2] [1] [accept: */*] == Info: [HTTP/2] [1] [range: bytes=0-0] => Send SSL data, 5 bytes (0x5) 0000: ....i => Send SSL data, 1 bytes (0x1) 0000: . => Send header, 146 bytes (0x92) 0000: GET /download/y2l.tar.gz HTTP/2 0021: Host: y2l.sourceforge.net 003c: User-Agent: robotpkg http://robotpkg.openrobots.org 0071: Accept: */* 007e: Range: bytes=0-0 0090: <= Recv SSL data, 5 bytes (0x5) 0000: ..... <= Recv SSL data, 1 bytes (0x1) 0000: . == Info: TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): <= Recv SSL data, 238 bytes (0xee) 0000: ....... :.........&[.......F8.....BI9.`..............*....8..... == Info: TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): <= Recv SSL data, 238 bytes (0xee) 0000: ....... .R#.......&[.......F8....Z...Z.#R......i......a.....;... 0040: ...nsD.M..&P..=J...).u....'FXNg..r ..h/..RC%&...)i..a+.j.....f.S 0080: b.9.F\.5..,y@n.&...8hi....Y.$..m....vR.9......5.!...!T.%...|O... 00c0: ...3..%...oSz...r..O......hK./.n...*....8..... == Info: old SSL session ID is stale, removing <= Recv SSL data, 5 bytes (0x5) 0000: ....9 <= Recv SSL data, 1 bytes (0x1) 0000: . <= Recv SSL data, 5 bytes (0x5) 0000: ..... <= Recv SSL data, 1 bytes (0x1) 0000: . => Send SSL data, 5 bytes (0x5) 0000: ..... => Send SSL data, 1 bytes (0x1) 0000: . <= Recv SSL data, 5 bytes (0x5) 0000: ..... <= Recv SSL data, 1 bytes (0x1) 0000: . <= Recv header, 13 bytes (0xd) 0000: HTTP/2 404 <= Recv header, 37 bytes (0x25) 0000: date: Tue, 04 Nov 2025 06:27:30 GMT <= Recv header, 25 bytes (0x19) 0000: content-type: text/html <= Recv header, 21 bytes (0x15) 0000: content-length: 146 <= Recv header, 30 bytes (0x1e) 0000: cf-ray: 99920bc39fdf22aa-CDG <= Recv header, 25 bytes (0x19) 0000: x-from: sfp-staticweb-2 <= Recv header, 8 bytes (0x8) 0000: age: 0 <= Recv header, 22 bytes (0x16) 0000: cf-cache-status: HIT <= Recv header, 295 bytes (0x127) 0000: set-cookie: __cf_bm=fjg98E0DmnNdmNRJhxQVzXkzp6GvDCYsH26FSpzPTfs- 0040: 1762237650-1.0.1.1-.B0yl0Q8W5.3ZH1MLG9qXGNaoUr7nHz37grQvqKMTDyqV 0080: rZ8YwsvsSPLV4hfD8BaOXVOajPYJ5ugkSih2SmAJONt_GadBz4_aDr0T96I0zo; 00c0: path=/; expires=Tue, 04-Nov-25 06:57:30 GMT; domain=.sourceforge 0100: .net; HttpOnly; Secure; SameSite=None <= Recv header, 52 bytes (0x34) 0000: content-security-policy: upgrade-insecure-requests <= Recv header, 20 bytes (0x14) 0000: server: cloudflare <= Recv header, 30 bytes (0x1e) 0000: alt-svc: h3=":443"; ma=86400 == Info: The requested URL returned error: 404 == Info: Connection #1 to host y2l.sourceforge.net left intact