robotpkg/sysutils/y2l bulk build results

Log for y2l-1.0 on Distfiles: fetch(y2l.sourceforge.net)::y2l.tar.gz.log (Back)

== Info: Host y2l.sourceforge.net:80 was resolved. == Info: IPv6: 2606:4700::6812:c95, 2606:4700::6812:d95 == Info: IPv4: 104.18.13.149, 104.18.12.149 == Info: Trying [2606:4700::6812:c95]:80... == Info: Connected to y2l.sourceforge.net (2606:4700::6812:c95) port 80 => Send header, 148 bytes (0x94) 0000: GET /download/y2l.tar.gz HTTP/1.1 0023: Host: y2l.sourceforge.net 003e: User-Agent: robotpkg http://robotpkg.openrobots.org 0073: Accept: */* 0080: Range: bytes=0-0 0092: <= Recv header, 32 bytes (0x20) 0000: HTTP/1.1 301 Moved Permanently <= Recv header, 37 bytes (0x25) 0000: Date: Tue, 27 May 2025 05:27:37 GMT <= Recv header, 25 bytes (0x19) 0000: Content-Type: text/html <= Recv header, 21 bytes (0x15) 0000: Content-Length: 167 <= Recv header, 24 bytes (0x18) 0000: Connection: keep-alive <= Recv header, 29 bytes (0x1d) 0000: Cache-Control: max-age=3600 <= Recv header, 40 bytes (0x28) 0000: Expires: Tue, 27 May 2025 06:27:37 GMT <= Recv header, 59 bytes (0x3b) 0000: Location: https://y2l.sourceforge.net/download/y2l.tar.gz <= Recv header, 52 bytes (0x34) 0000: Content-Security-Policy: upgrade-insecure-requests <= Recv header, 20 bytes (0x14) 0000: Server: cloudflare <= Recv header, 30 bytes (0x1e) 0000: CF-RAY: 94631aa94de5f84c-CDG <= Recv header, 30 bytes (0x1e) 0000: alt-svc: h3=":443"; ma=86400 <= Recv header, 2 bytes (0x2) 0000: == Info: Ignoring the response-body == Info: Connection #0 to host y2l.sourceforge.net left intact == Info: Clear auth, redirects to port from 80 to 443 == Info: Issue another request to this URL: 'https://y2l.sourceforge.net/download/y2l.tar.gz' == Info: Host y2l.sourceforge.net:443 was resolved. == Info: IPv6: 2606:4700::6812:d95, 2606:4700::6812:c95 == Info: IPv4: 104.18.12.149, 104.18.13.149 == Info: Trying [2606:4700::6812:d95]:443... == Info: Connected to y2l.sourceforge.net (2606:4700::6812:d95) port 443 == Info: ALPN: curl offers h2,http/1.1 => Send SSL data, 5 bytes (0x5) 0000: ..... == Info: TLSv1.3 (OUT), TLS handshake, Client hello (1): => Send SSL data, 512 bytes (0x200) 0000: ......?....fN.3;...*'X.n/u.o.8....WhD. .RB..R......x.%..p-..G.@@ 0040: ........>.......,.0.........+./...$.(.k.#.'.g.....9.....3.....=. 0080: <.5./.....u.........y2l.sourceforge.net......................... 00c0: ................h2.http/1.1.........1.....*.(................... 0100: ......................+........-.....3.&.$... n.u4.f.O...vi..... 0140: b_..xO'..kFj.t.................................................. 0180: ................................................................ 01c0: ................................................................ <= Recv SSL data, 5 bytes (0x5) 0000: ....z == Info: TLSv1.3 (IN), TLS handshake, Server hello (2): <= Recv SSL data, 122 bytes (0x7a) 0000: ...v....J~Zd.r...F+....H.T...:Wi..2..a .RB..R......x.%..p-..G.@@ 0040: .............3.$... |......C-...4...U.+...F...?.p..4.+.... <= Recv SSL data, 5 bytes (0x5) 0000: ..... <= Recv SSL data, 5 bytes (0x5) 0000: ..... <= Recv SSL data, 1 bytes (0x1) 0000: . == Info: TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): <= Recv SSL data, 19 bytes (0x13) 0000: .................h2 == Info: TLSv1.3 (IN), TLS handshake, Certificate (11): <= Recv SSL data, 2100 bytes (0x834) 0000: ...0...,...0...0..H.........Wez....Q..1.i#..0...*.H.=...021.0... 0040: U....US1.0...U....Let's Encrypt1.0...U....E60...250331191759Z..2 0080: 50629191758Z0.1.0...U....sourceforge.net0Y0...*.H.=....*.H.=.... 00c0: B.. 3d.j.........m.'....V+.U{.....L6..E..>.-.....6.....'%...:.f. 0100: yEl...T0..P0...U...........0...U.%..0...+.........+.......0...U. 0140: ......0.0...U.......I\`@n>...u..e/(..3.0...U.#..0....'F...Qh.... 0180: BH.#.X..0U..+........I0G0!..+.....0...http://e6.o.lencr.org0"..+ 01c0: .....0...http://e6.i.lencr.org/0-..U...&0$..*.sourceforge.net..s 0200: ourceforge.net0...U. ..0.0...g.....0-..U...&0$0". ....http://e6. 0240: c.lencr.org/89.crl0.....+.....y............v...V...|...[.i....qg 0280: J......[w..;.......4M.....G0E. c<.x.S..N...E..J...8....@...H.... 02c0: !.....7.!(r.Iiu.......H.}f.L...x...w....j.q.e...S...|"..\.....~T 0300: ..L........C......H0F.!...Y....l.{v.q....#,..j.....I.o.B.!..Ea.. 0340: ...3.WM.oJ....Sc71.d....^..0...*.H.=....i.0f.1..@ .{.h5.....j.P. 0380: KD.f.%...%.bUb...D...I....+D....1....\Vob^W.^............'?}...v 03c0: ..#..=@~./Xp.1\%'.....[0..W0..?.........W>.s.'p....:E+80...*.H.. 0400: ......0O1.0...U....US1)0'..U... Internet Security Research Group 0440: 1.0...U....ISRG Root X10...240313000000Z..270312235959Z021.0...U 0480: ....US1.0...U....Let's Encrypt1.0...U....E60v0...*.H.=....+...". 04c0: b.....F..!q`.&...........&.Q..a|u..".9.....F.-...R.AuF.....#. 0700: U....e{....ts........N.#..L/.....x^L......3.=..TP........."aq.{. 0740: .....W....P&A...Vh.R.B. ...$_..[.j.Ur2.b[..kz......._.5......Lw[ 0780: >@.......<........kXv_.e...$j.......C. 0800: .J...CW@.....{.3y)......p..............".:.......N.. == Info: TLSv1.3 (IN), TLS handshake, CERT verify (15): <= Recv SSL data, 79 bytes (0x4f) 0000: ...K...G0E.!......4k.;.W.8....J..z.K...;.m..@. #._^C|1..:.q.(... 0040: .U.SfJ.....>y.G == Info: TLSv1.3 (IN), TLS handshake, Finished (20): <= Recv SSL data, 52 bytes (0x34) 0000: ...0...;.~.1...n.....z{...r..Y"z.-..".D.wr=.L1.....t => Send SSL data, 5 bytes (0x5) 0000: ..... == Info: TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): => Send SSL data, 1 bytes (0x1) 0000: . => Send SSL data, 5 bytes (0x5) 0000: ....E => Send SSL data, 1 bytes (0x1) 0000: . == Info: TLSv1.3 (OUT), TLS handshake, Finished (20): => Send SSL data, 52 bytes (0x34) 0000: ...0..Z.9L.....;....I...5.E.f#.'.\@..W...{~&.],|"... == Info: SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519 / id-ecPublicKey == Info: ALPN: server accepted h2 == Info: Server certificate: == Info: subject: CN=sourceforge.net == Info: start date: Mar 31 19:17:59 2025 GMT == Info: expire date: Jun 29 19:17:58 2025 GMT == Info: issuer: C=US; O=Let's Encrypt; CN=E6 == Info: SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. == Info: Certificate level 0: Public key type EC/prime256v1 (256/128 Bits/secBits), signed using ecdsa-with-SHA384 == Info: Certificate level 1: Public key type EC/secp384r1 (384/192 Bits/secBits), signed using sha256WithRSAEncryption => Send SSL data, 5 bytes (0x5) 0000: ....Q => Send SSL data, 1 bytes (0x1) 0000: . == Info: using HTTP/2 == Info: [HTTP/2] [1] OPENED stream for https://y2l.sourceforge.net/download/y2l.tar.gz == Info: [HTTP/2] [1] [:method: GET] == Info: [HTTP/2] [1] [:scheme: https] == Info: [HTTP/2] [1] [:authority: y2l.sourceforge.net] == Info: [HTTP/2] [1] [:path: /download/y2l.tar.gz] == Info: [HTTP/2] [1] [user-agent: robotpkg http://robotpkg.openrobots.org] == Info: [HTTP/2] [1] [accept: */*] == Info: [HTTP/2] [1] [range: bytes=0-0] => Send SSL data, 5 bytes (0x5) 0000: ....i => Send SSL data, 1 bytes (0x1) 0000: . => Send header, 146 bytes (0x92) 0000: GET /download/y2l.tar.gz HTTP/2 0021: Host: y2l.sourceforge.net 003c: User-Agent: robotpkg http://robotpkg.openrobots.org 0071: Accept: */* 007e: Range: bytes=0-0 0090: <= Recv SSL data, 5 bytes (0x5) 0000: ..... <= Recv SSL data, 1 bytes (0x1) 0000: . == Info: TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): <= Recv SSL data, 238 bytes (0xee) 0000: ....... .-......BSW..9/./`..Ym..$".+....>....:*x..UG.MFN.u..]... 0040: .O.d....m.iu.&t'..=VQ...l~.[."Z.c...NU._.Y[..{..=t.SI....i{P.S.A 0080: h..D........I.........j.)l..ae.UR..7l...*b!!.c....Z...r3..Zt.... 00c0: ..Z...`.&1K......7Qx..O}......W....*....8.zz.. == Info: TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): <= Recv SSL data, 238 bytes (0xee) 0000: ....... .lH6....BSW..9/./`..Ym...+`..C..a.....P.......E..s:..,.. 0040: .XY....eG.=*..m.Vn.8...._/Nb......G.dB&J~%`.......U....A....,AoP 0080: @.]....5-....v{.<.x..[z2.}......b...[...v...z.~.1.....l^n....... 00c0: ._.....g..8.......7.....<.._.+}....*....8.zz.. == Info: old SSL session ID is stale, removing <= Recv SSL data, 5 bytes (0x5) 0000: ....9 <= Recv SSL data, 1 bytes (0x1) 0000: . <= Recv SSL data, 5 bytes (0x5) 0000: ..... <= Recv SSL data, 1 bytes (0x1) 0000: . => Send SSL data, 5 bytes (0x5) 0000: ..... => Send SSL data, 1 bytes (0x1) 0000: . <= Recv SSL data, 5 bytes (0x5) 0000: ..... <= Recv SSL data, 1 bytes (0x1) 0000: . <= Recv header, 13 bytes (0xd) 0000: HTTP/2 404 <= Recv header, 37 bytes (0x25) 0000: date: Tue, 27 May 2025 05:27:37 GMT <= Recv header, 40 bytes (0x28) 0000: content-type: text/html; charset=UTF-8 <= Recv header, 23 bytes (0x17) 0000: vary: Accept-Encoding <= Recv header, 12 bytes (0xc) 0000: vary: Host <= Recv header, 23 bytes (0x17) 0000: x-from: sfp-ioweb82-1 <= Recv header, 22 bytes (0x16) 0000: cf-cache-status: HIT <= Recv header, 8 bytes (0x8) 0000: age: 0 <= Recv header, 295 bytes (0x127) 0000: set-cookie: __cf_bm=5_NVhjOWUNqS7QKMGTVt2aETqkkJ2FpTzPPCVYd0Bs4- 0040: 1748323657-1.0.1.1-mZrbs0VYL2NYXtRUbk19P9vxX4WGp6dHahwKT8PfFWayG 0080: wUP1jLY6P9XCZbBXAQTsl3Rl3PRrHrb2cGGxjWwwIOczt9OOcyBBvc2OiwONRg; 00c0: path=/; expires=Tue, 27-May-25 05:57:37 GMT; domain=.sourceforge 0100: .net; HttpOnly; Secure; SameSite=None <= Recv header, 52 bytes (0x34) 0000: content-security-policy: upgrade-insecure-requests <= Recv header, 20 bytes (0x14) 0000: server: cloudflare <= Recv header, 30 bytes (0x1e) 0000: cf-ray: 94631aa9a9816f5d-CDG <= Recv header, 30 bytes (0x1e) 0000: alt-svc: h3=":443"; ma=86400 == Info: The requested URL returned error: 404 == Info: Connection #1 to host y2l.sourceforge.net left intact