robotpkg/sysutils/y2l bulk build results

Log for y2l-1.0 on Distfiles: fetch(y2l.sourceforge.net)::y2l.tar.gz.log (Back)

== Info: Host y2l.sourceforge.net:80 was resolved. == Info: IPv6: 2606:4700::6812:c95, 2606:4700::6812:d95 == Info: IPv4: 104.18.13.149, 104.18.12.149 == Info: Trying [2606:4700::6812:c95]:80... == Info: Connected to y2l.sourceforge.net (2606:4700::6812:c95) port 80 => Send header, 148 bytes (0x94) 0000: GET /download/y2l.tar.gz HTTP/1.1 0023: Host: y2l.sourceforge.net 003e: User-Agent: robotpkg http://robotpkg.openrobots.org 0073: Accept: */* 0080: Range: bytes=0-0 0092: <= Recv header, 32 bytes (0x20) 0000: HTTP/1.1 301 Moved Permanently <= Recv header, 37 bytes (0x25) 0000: Date: Tue, 10 Mar 2026 06:29:45 GMT <= Recv header, 25 bytes (0x19) 0000: Content-Type: text/html <= Recv header, 21 bytes (0x15) 0000: Content-Length: 167 <= Recv header, 24 bytes (0x18) 0000: Connection: keep-alive <= Recv header, 29 bytes (0x1d) 0000: Cache-Control: max-age=3600 <= Recv header, 40 bytes (0x28) 0000: Expires: Tue, 10 Mar 2026 07:29:45 GMT <= Recv header, 59 bytes (0x3b) 0000: Location: https://y2l.sourceforge.net/download/y2l.tar.gz <= Recv header, 52 bytes (0x34) 0000: Content-Security-Policy: upgrade-insecure-requests <= Recv header, 20 bytes (0x14) 0000: Server: cloudflare <= Recv header, 30 bytes (0x1e) 0000: CF-RAY: 9da044510a069cbe-CDG <= Recv header, 30 bytes (0x1e) 0000: alt-svc: h3=":443"; ma=86400 <= Recv header, 2 bytes (0x2) 0000: == Info: Ignoring the response-body == Info: Connection #0 to host y2l.sourceforge.net left intact == Info: Clear auth, redirects to port from 80 to 443 == Info: Issue another request to this URL: 'https://y2l.sourceforge.net/download/y2l.tar.gz' == Info: Host y2l.sourceforge.net:443 was resolved. == Info: IPv6: 2606:4700::6812:d95, 2606:4700::6812:c95 == Info: IPv4: 104.18.12.149, 104.18.13.149 == Info: Trying [2606:4700::6812:d95]:443... == Info: Connected to y2l.sourceforge.net (2606:4700::6812:d95) port 443 == Info: ALPN: curl offers h2,http/1.1 => Send SSL data, 5 bytes (0x5) 0000: ..... == Info: TLSv1.3 (OUT), TLS handshake, Client hello (1): => Send SSL data, 512 bytes (0x200) 0000: ................ ....Qk....[I.[.Z.4=`. .hE.......i6...Y.G....b.. 0040: ....v.}.>.......,.0.........+./...$.(.k.#.'.g.....9.....3.....=. 0080: <.5./.....u.........y2l.sourceforge.net......................... 00c0: ................h2.http/1.1.........1.....*.(................... 0100: ......................+........-.....3.&.$... .s..S.X..H|..w.... 0140: .|.......7...a.................................................. 0180: ................................................................ 01c0: ................................................................ <= Recv SSL data, 5 bytes (0x5) 0000: ....z == Info: TLSv1.3 (IN), TLS handshake, Server hello (2): <= Recv SSL data, 122 bytes (0x7a) 0000: ...v..J.E.*....;....xP..l.@p.9~].8.... .hE.......i6...Y.G....b.. 0040: ....v.}......3.$... .'nH1..i..w.#...y..A~....K....hO.+.... <= Recv SSL data, 5 bytes (0x5) 0000: ..... <= Recv SSL data, 5 bytes (0x5) 0000: ..... <= Recv SSL data, 1 bytes (0x1) 0000: . == Info: TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): <= Recv SSL data, 19 bytes (0x13) 0000: .................h2 == Info: TLSv1.3 (IN), TLS handshake, Certificate (11): <= Recv SSL data, 2062 bytes (0x80e) 0000: ...........0...0..#..........:;.....Y..y...V0...*.H.=...021.0... 0040: U....US1.0...U....Let's Encrypt1.0...U....E80...260107233909Z..2 0080: 60407233908Z0.1.0...U....sourceforge.net0Y0...*.H.=....*.H.=.... 00c0: B.......}\._.....nL....i8.#d4s..+....T}'.w..L.d....+..}.#f..l./& 0100: ....../0..+0...U...........0...U.%..0...+.........+.......0...U. 0140: ......0.0...U......R.LR...H...RV.6..W.i0...U.#..0.........~.Pl3. 0180: 8]Y.#r..02..+........&0$0"..+.....0...http://e8.i.lencr.org/0-.. 01c0: U...&0$..*.sourceforge.net..sourceforge.net0...U. ..0.0...g..... 0200: 0-..U...&0$0". ....http://e8.c.lencr.org/87.crl0.....+.....y.... 0240: ........v...-...%...:.E....#..K..)'...3................G0E. VMr. 0280: ....3.,........=q2%.!.%.a.N!.............F0D. (p.aR.Q.t... 0300: JY....1.ej....P....x. ).#...:b.G).XT..5.... v(r....B.50...*.H.=. 0340: ...i.0f.1.......;..mU(.....=~Q.B.0...$:...............A[...1..}. 0380: ...s.........iS..$..1..{.`}0m)..fR._...A.........Z0..V0..>...... 03c0: .c..c.Np.qY.....V0...*.H........0O1.0...U....US1)0'..U... Intern 0400: et Security Research Group1.0...U....ISRG Root X10...24031300000 0440: 0Z..270312235959Z021.0...U....US1.0...U....Let's Encrypt1.0...U. 0480: ...E80v0...*.H.=....+...".b...e.^.K.........l.:.8...923.B..3.4.! 04c0: .p\.b/.q.B.y.F...G......&c;....=.32..+...:..g.{k>.H.....m>.L... 0500: 0..0...U...........0...U.%..0...+.........+.......0...U.......0. 0540: ......0...U............~.Pl3.8]Y.#r..0...U.#..0...y.Y.{....s.... 0580: .X...n02..+........&0$0"..+.....0...http://x1.i.lencr.org/0...U. 05c0: ..0.0...g.....0'..U... 0.0.......http://x1.c.lencr.org/0...*.H. 0600: ............g.HF ......|u..C....6tD..M......vp`.).......=c...!.. 0640: .)..h..>m...el......M...&B.t.......qs..x.u.. K181..../"...d.;.<. 0680: .....p..Q.....Y....;.F..U.q..e.B....v..u.S.+..<35@h4......z.Au.. 06c0: gG[.W ...a...EY..8..#.N.e3...%y.JfS...^.........(_.g.GZ.+...9.`. 0700: SO....9......O...6...z.i...T-8...3......T.....p.{-.....?X3.k..#. 0740: o.._.....{.e.#.....b..V..... t.B.+'...'.P:...........zL:...!.d.. 0780: ..7.:.....k..&..%......?.F..( ..=.......~...]..+...j#.u..3*.."4. 07c0: ..*..R..i..!_gm.......S.gA.gLR..Q.s..fgaqT..cMc......&....e....c 0800: x..X..s.~u.I.. == Info: TLSv1.3 (IN), TLS handshake, CERT verify (15): <= Recv SSL data, 78 bytes (0x4e) 0000: ...J...F0D. Z.x.tZmo...sM..B../..3......P..@. a...}3f.Ur]..8..6T 0040: .Y='.......R.) == Info: TLSv1.3 (IN), TLS handshake, Finished (20): <= Recv SSL data, 52 bytes (0x34) 0000: ...0V...._.$F...q..C..j......upb...eX.uF....Moi:.A.. => Send SSL data, 5 bytes (0x5) 0000: ..... == Info: TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): => Send SSL data, 1 bytes (0x1) 0000: . => Send SSL data, 5 bytes (0x5) 0000: ....E => Send SSL data, 1 bytes (0x1) 0000: . == Info: TLSv1.3 (OUT), TLS handshake, Finished (20): => Send SSL data, 52 bytes (0x34) 0000: ...0..H.0.7E..[.....{.jyB>....h2..rtD......z.%...... == Info: SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519 / id-ecPublicKey == Info: ALPN: server accepted h2 == Info: Server certificate: == Info: subject: CN=sourceforge.net == Info: start date: Jan 7 23:39:09 2026 GMT == Info: expire date: Apr 7 23:39:08 2026 GMT == Info: issuer: C=US; O=Let's Encrypt; CN=E8 == Info: SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. == Info: Certificate level 0: Public key type EC/prime256v1 (256/128 Bits/secBits), signed using ecdsa-with-SHA384 == Info: Certificate level 1: Public key type EC/secp384r1 (384/192 Bits/secBits), signed using sha256WithRSAEncryption => Send SSL data, 5 bytes (0x5) 0000: ....Q => Send SSL data, 1 bytes (0x1) 0000: . == Info: using HTTP/2 == Info: [HTTP/2] [1] OPENED stream for https://y2l.sourceforge.net/download/y2l.tar.gz == Info: [HTTP/2] [1] [:method: GET] == Info: [HTTP/2] [1] [:scheme: https] == Info: [HTTP/2] [1] [:authority: y2l.sourceforge.net] == Info: [HTTP/2] [1] [:path: /download/y2l.tar.gz] == Info: [HTTP/2] [1] [user-agent: robotpkg http://robotpkg.openrobots.org] == Info: [HTTP/2] [1] [accept: */*] == Info: [HTTP/2] [1] [range: bytes=0-0] => Send SSL data, 5 bytes (0x5) 0000: ....i => Send SSL data, 1 bytes (0x1) 0000: . => Send header, 146 bytes (0x92) 0000: GET /download/y2l.tar.gz HTTP/2 0021: Host: y2l.sourceforge.net 003c: User-Agent: robotpkg http://robotpkg.openrobots.org 0071: Accept: */* 007e: Range: bytes=0-0 0090: <= Recv SSL data, 5 bytes (0x5) 0000: ..... <= Recv SSL data, 1 bytes (0x1) 0000: . == Info: TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): <= Recv SSL data, 238 bytes (0xee) 0000: ....... .e.J....dH........^...Q...AL.....F.:...P...... ......... 0040: 1j%..P*\x...;w.hN.W%.yQm.P.o.`....W....1MX>w.l...gw.F..:...J.B.. 0080: ..3.?i..z....s..............a.P....N...+.zS04T..s....O.....F.$.f 00c0: ............4,.7\+...}..n....$1....*....8.JJ.. == Info: TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): <= Recv SSL data, 238 bytes (0xee) 0000: ....... M.M.....dH........^...Q.a...P.e.....N.A.F...........^... 0040: ......+...og....q...;Rl..u.m..%..8$..d./y..f.......h"a4.cZ..yRr. 0080: ..!...N.J..@.../.....j..4.^.....T...aD..Vs7E.......1..e.H.O....! 00c0: !.d._.D?R..(S?..k.+m.-.>5.,...\C...*....8.JJ.. == Info: old SSL session ID is stale, removing <= Recv SSL data, 5 bytes (0x5) 0000: ....9 <= Recv SSL data, 1 bytes (0x1) 0000: . <= Recv SSL data, 5 bytes (0x5) 0000: ..... <= Recv SSL data, 1 bytes (0x1) 0000: . => Send SSL data, 5 bytes (0x5) 0000: ..... => Send SSL data, 1 bytes (0x1) 0000: . <= Recv SSL data, 5 bytes (0x5) 0000: ..... <= Recv SSL data, 1 bytes (0x1) 0000: . <= Recv header, 13 bytes (0xd) 0000: HTTP/2 404 <= Recv header, 37 bytes (0x25) 0000: date: Tue, 10 Mar 2026 06:29:45 GMT <= Recv header, 25 bytes (0x19) 0000: content-type: text/html <= Recv header, 21 bytes (0x15) 0000: content-length: 146 <= Recv header, 30 bytes (0x1e) 0000: cf-ray: 9da044517a94d10d-CDG <= Recv header, 25 bytes (0x19) 0000: x-from: sfp-staticweb-2 <= Recv header, 8 bytes (0x8) 0000: age: 0 <= Recv header, 22 bytes (0x16) 0000: cf-cache-status: HIT <= Recv header, 295 bytes (0x127) 0000: set-cookie: __cf_bm=dqSs0Ze2q2bSyIr5dVKoeOd0Tpo8vO4GMcWpUHnrH3Q- 0040: 1773124185-1.0.1.1-7fHMH33XFOqP.Utc31gYuKBjQXzBCbAoHdkUTm0uDXTBC 0080: 3irISG6kYsa2nHenWY0P3IVixrxiyjGYDPUt2J5rR9.sNs9LPBNiKe7Eyfcfck; 00c0: path=/; expires=Tue, 10-Mar-26 06:59:45 GMT; domain=.sourceforge 0100: .net; HttpOnly; Secure; SameSite=None <= Recv header, 52 bytes (0x34) 0000: content-security-policy: upgrade-insecure-requests <= Recv header, 20 bytes (0x14) 0000: server: cloudflare <= Recv header, 30 bytes (0x1e) 0000: alt-svc: h3=":443"; ma=86400 == Info: The requested URL returned error: 404 == Info: Connection #1 to host y2l.sourceforge.net left intact