>>> perl-io-socket-ssl: Building main/perl-io-socket-ssl 2.087-r0 (using abuild 3.13.0-r3) started Tue, 09 Jul 2024 09:16:48 +0000 >>> perl-io-socket-ssl: Checking sanity of /home/buildozer/aports/main/perl-io-socket-ssl/APKBUILD... >>> perl-io-socket-ssl: Analyzing dependencies... >>> perl-io-socket-ssl: Installing for build: build-base perl ca-certificates perl-net-ssleay perl-mozilla-ca (1/8) Installing libbz2 (1.0.8-r6) (2/8) Installing perl (5.40.0-r1) (3/8) Installing perl-net-ssleay (1.94-r1) (4/8) Installing perl-mozilla-ca (20240313-r0) (5/8) Installing .makedepends-perl-io-socket-ssl (20240709.091649) (6/8) Installing perl-error (0.17029-r2) (7/8) Installing perl-git (2.45.2-r1) (8/8) Installing git-perl (2.45.2-r1) Executing busybox-1.36.1-r31.trigger OK: 306 MiB in 111 packages >>> perl-io-socket-ssl: Cleaning up srcdir >>> perl-io-socket-ssl: Cleaning up pkgdir >>> perl-io-socket-ssl: Cleaning up tmpdir >>> perl-io-socket-ssl: Fetching https://distfiles.alpinelinux.org/distfiles/edge/IO-Socket-SSL-2.087.tar.gz Connecting to distfiles.alpinelinux.org (172.105.82.32:443) wget: server returned error: HTTP/1.1 404 Not Found >>> perl-io-socket-ssl: Fetching https://cpan.metacpan.org/authors/id/S/SU/SULLR/IO-Socket-SSL-2.087.tar.gz Connecting to cpan.metacpan.org ([2a04:4e42::729]:443) saving to '/var/cache/distfiles/edge/IO-Socket-SSL-2.087.tar.gz.part' IO-Socket-SSL-2.087. 30% |********* | 81920 0:00:02 ETA IO-Socket-SSL-2.087. 100% |********************************| 263k 0:00:00 ETA '/var/cache/distfiles/edge/IO-Socket-SSL-2.087.tar.gz.part' saved >>> perl-io-socket-ssl: Fetching https://distfiles.alpinelinux.org/distfiles/edge/IO-Socket-SSL-2.087.tar.gz >>> perl-io-socket-ssl: Checking sha512sums... IO-Socket-SSL-2.087.tar.gz: OK >>> perl-io-socket-ssl: Unpacking /var/cache/distfiles/edge/IO-Socket-SSL-2.087.tar.gz... WARNING No library for handling international domain names found. It will work but croak if you try to verify an international name against a certificate. It's recommended to install URI version>=1.50. Net::IDN::Encode and Net::LibIDN are also still supported. Checking if your kit is complete... Looks good Generating a Unix-style Makefile Writing Makefile for IO::Socket::SSL Writing MYMETA.yml and MYMETA.json cp lib/IO/Socket/SSL.pod blib/lib/IO/Socket/SSL.pod cp lib/IO/Socket/SSL.pm blib/lib/IO/Socket/SSL.pm cp lib/IO/Socket/SSL/Utils.pm blib/lib/IO/Socket/SSL/Utils.pm cp lib/IO/Socket/SSL/PublicSuffix.pm blib/lib/IO/Socket/SSL/PublicSuffix.pm cp lib/IO/Socket/SSL/Intercept.pm blib/lib/IO/Socket/SSL/Intercept.pm Manifying 4 pod documents PERL_DL_NONLAZY=1 "/usr/bin/perl" "-MExtUtils::Command::MM" "-MTest::Harness" "-e" "undef *Test::Harness::Switches; test_harness(0, 'blib/lib', 'blib/arch')" t/*.t t/external/*.t # openssl version compiled=0x30300010 linked=0x30300010 -- OpenSSL 3.3.1 4 Jun 2024 # Net::SSLeay version=1.94 # parent IO::Socket::IP version=0.42 t/01loadmodule.t .................. ok t/acceptSSL-timeout.t ............. ok t/alpn.t .......................... ok t/auto_verify_hostname.t .......... ok t/cert_formats.t .................. ok t/cert_no_file.t .................. ok t/compatibility.t ................. ok t/connectSSL-timeout.t ............ ok t/core.t .......................... ok t/dhe.t ........................... ok t/ecdhe.t ......................... ok # tcp connect to www.chksum.de:443 ok # fingerprint matches # validation with default CA w/o OCSP ok # got stapled response as expected # validation with default CA with OCSP defaults ok # validation with default CA with OCSP full chain ok # tcp connect to www.bild.de:443 ok # fingerprint matches # validation with default CA w/o OCSP ok # validation with default CA with OCSP defaults ok # validation with default CA with OCSP full chain ok # tcp connect to revoked.grc.com:443 ok t/external/ocsp.t ................. ok # found 147 CA certs # have root CA for www.bild.de in store # 5 connections to www.bild.de ok # have root CA for www.yahoo.com in store # 5 connections to www.yahoo.com ok # have root CA for www.comdirect.de in store # 5 connections to www.comdirect.de ok # fingerprint www.comdirect.de matches # have root CA for meine.deutsche-bank.de in store # 5 connections to meine.deutsche-bank.de ok # have root CA for www.twitter.com in store # 5 connections to www.twitter.com ok # fingerprint www.twitter.com matches # have root CA for www.facebook.com in store # 5 connections to www.facebook.com ok # have root CA for www.live.com in store # 5 connections to www.live.com ok # fingerprint www.live.com matches t/external/usable_ca.t ............ ok t/io-socket-inet6.t ............... skipped: no IO::Socket::INET6 available t/io-socket-ip.t .................. ok t/memleak_bad_handshake.t ......... skipped: - do we measure the right thing? t/mitm.t .......................... ok t/multiple-cert-rsa-ecc.t ......... ok t/nonblock.t ...................... ok t/npn.t ........................... ok # -- test: newINET start_SSL stop_SSL start_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x160301 from client # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL:0 connect_SSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # -- test: newSSL:0 start_SSL stop_SSL connect_SSL # server accepted new client # wait for initial data from client # got 0x666f6f from client # server: got plain data at start of connection # server: TLS upgrade # server: TLS downgrade # server: TLS upgrade#2 # server accepted new client # wait for initial data from client # got 0x656e64 from client # client requested end of tests t/plain_upgrade_downgrade.t ....... ok # looks like OpenSSL was compiled without SSLv3 support t/protocol_version.t .............. ok # client accepted: ver=TLSv1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 # accept failed: , SSL accept attempt failed error:0A0000FD:SSL routines::binder does not verify # client accepted: ver=TLSv1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 # client accepted: ver=TLSv1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 # accept failed: , SSL accept attempt failed error:0A0000FD:SSL routines::binder does not verify # client accepted: ver=TLSv1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 # accept failed: , SSL accept attempt failed error:0A0000FD:SSL routines::binder does not verify # client accepted: ver=TLSv1_2 cipher=DHE-PSK-AES256-GCM-SHA384 # accept failed: , SSL accept attempt failed error:1C800066:Provider routines::cipher operation failed error:0A000119:SSL routines::decryption failed or bad record mac error:0A000139:SSL routines::record layer failure # client accepted: ver=TLSv1_2 cipher=DHE-PSK-AES256-GCM-SHA384 # client accepted: ver=TLSv1_2 cipher=DHE-PSK-AES256-GCM-SHA384 # accept failed: , SSL accept attempt failed error:1C800066:Provider routines::cipher operation failed error:0A000119:SSL routines::decryption failed or bad record mac error:0A000139:SSL routines::record layer failure # client accepted: ver=TLSv1_2 cipher=DHE-PSK-AES256-GCM-SHA384 # accept failed: , SSL accept attempt failed error:1C800066:Provider routines::cipher operation failed error:0A000119:SSL routines::decryption failed or bad record mac error:0A000139:SSL routines::record layer failure t/psk.t ........................... ok t/public_suffix_lib_encode_idn.t .. ok t/public_suffix_lib_libidn.t ...... ok t/public_suffix_lib_uri.t ......... ok t/public_suffix_ssl.t ............. ok t/readline.t ...................... ok t/session_cache.t ................. ok # listen at 127.0.0.1:54611 # listen at 127.0.0.1:41149 # connect to 0: success reuse=0 version=TLSv1_3 # connect to 0: success reuse=1 version=TLSv1_3 # connect to 1: success reuse=1 version=TLSv1_3 # connect to 1: success reuse=0 version=TLSv1_3 # connect to 0: success reuse=0 version=TLSv1_3 # connect to 0: success reuse=1 version=TLSv1_3 t/session_ticket.t ................ ok t/sessions.t ...................... ok t/set_curves.t .................... ok t/signal-readline.t ............... ok t/sni.t ........................... ok t/sni_verify.t .................... ok t/start-stopssl.t ................. ok t/startssl-failed.t ............... ok t/startssl.t ...................... ok t/sysread_write.t ................. ok t/verify_fingerprint.t ............ ok t/verify_hostname.t ............... ok t/verify_hostname_standalone.t .... ok t/verify_partial_chain.t .......... ok All tests successful. Files=43, Tests=833, 50 wallclock secs ( 0.09 usr 0.05 sys + 8.97 cusr 1.17 csys = 10.28 CPU) Result: PASS >>> perl-io-socket-ssl: Entering fakeroot... Manifying 4 pod documents Installing /home/buildozer/aports/main/perl-io-socket-ssl/pkg/perl-io-socket-ssl/usr/share/perl5/vendor_perl/IO/Socket/SSL.pod Installing /home/buildozer/aports/main/perl-io-socket-ssl/pkg/perl-io-socket-ssl/usr/share/perl5/vendor_perl/IO/Socket/SSL.pm Installing /home/buildozer/aports/main/perl-io-socket-ssl/pkg/perl-io-socket-ssl/usr/share/perl5/vendor_perl/IO/Socket/SSL/PublicSuffix.pm Installing /home/buildozer/aports/main/perl-io-socket-ssl/pkg/perl-io-socket-ssl/usr/share/perl5/vendor_perl/IO/Socket/SSL/Intercept.pm Installing /home/buildozer/aports/main/perl-io-socket-ssl/pkg/perl-io-socket-ssl/usr/share/perl5/vendor_perl/IO/Socket/SSL/Utils.pm Installing /home/buildozer/aports/main/perl-io-socket-ssl/pkg/perl-io-socket-ssl/usr/share/man/man3/IO::Socket::SSL::Utils.3pm Installing /home/buildozer/aports/main/perl-io-socket-ssl/pkg/perl-io-socket-ssl/usr/share/man/man3/IO::Socket::SSL.3pm Installing /home/buildozer/aports/main/perl-io-socket-ssl/pkg/perl-io-socket-ssl/usr/share/man/man3/IO::Socket::SSL::Intercept.3pm Installing /home/buildozer/aports/main/perl-io-socket-ssl/pkg/perl-io-socket-ssl/usr/share/man/man3/IO::Socket::SSL::PublicSuffix.3pm >>> perl-io-socket-ssl-doc*: Running split function doc... '/home/buildozer/aports/main/perl-io-socket-ssl/pkg/perl-io-socket-ssl/usr/share/perl5/vendor_perl/IO/Socket/SSL.pod' -> '/home/buildozer/aports/main/perl-io-socket-ssl/pkg/perl-io-socket-ssl-doc/usr/share/perl5/vendor_perl/IO/Socket/SSL.pod' >>> perl-io-socket-ssl-doc*: Preparing subpackage perl-io-socket-ssl-doc... >>> perl-io-socket-ssl-doc*: Running postcheck for perl-io-socket-ssl-doc >>> perl-io-socket-ssl*: Running postcheck for perl-io-socket-ssl >>> perl-io-socket-ssl*: Preparing package perl-io-socket-ssl... >>> perl-io-socket-ssl-doc*: Tracing dependencies... >>> perl-io-socket-ssl-doc*: Package size: 168.0 KB >>> perl-io-socket-ssl-doc*: Compressing data... >>> perl-io-socket-ssl-doc*: Create checksum... >>> perl-io-socket-ssl-doc*: Create perl-io-socket-ssl-doc-2.087-r0.apk >>> perl-io-socket-ssl*: Tracing dependencies... >>> perl-io-socket-ssl*: Package size: 508.0 KB >>> perl-io-socket-ssl*: Compressing data... >>> perl-io-socket-ssl*: Create checksum... >>> perl-io-socket-ssl*: Create perl-io-socket-ssl-2.087-r0.apk >>> perl-io-socket-ssl: Build complete at Tue, 09 Jul 2024 09:17:41 +0000 elapsed time 0h 0m 53s >>> perl-io-socket-ssl: Cleaning up srcdir >>> perl-io-socket-ssl: Cleaning up pkgdir >>> perl-io-socket-ssl: Uninstalling dependencies... (1/8) Purging .makedepends-perl-io-socket-ssl (20240709.091649) (2/8) Purging perl-net-ssleay (1.94-r1) (3/8) Purging perl-mozilla-ca (20240313-r0) (4/8) Purging git-perl (2.45.2-r1) (5/8) Purging perl-git (2.45.2-r1) (6/8) Purging perl-error (0.17029-r2) (7/8) Purging perl (5.40.0-r1) (8/8) Purging libbz2 (1.0.8-r6) Executing busybox-1.36.1-r31.trigger OK: 271 MiB in 103 packages >>> perl-io-socket-ssl: Updating the main/armv7 repository index... >>> perl-io-socket-ssl: Signing the index...