Skip to content

Build Failure  #74

@realyukii

Description

@realyukii
$ ./gradlew smali:fatJar
Downloading https://services.gradle.org/distributions/gradle-8.5-all.zip
....................10%.....................20%.....................30%.....................40%.....................50%.....................60%....................70%.....................80%.....................90%.....................100%

Welcome to Gradle 8.5!

Here are the highlights of this release:
 - Support for running on Java 21
 - Faster first use with Kotlin DSL
 - Improved error and warning messages

For more details see https://docs.gradle.org/8.5/release-notes.html

Starting a Gradle Daemon (subsequent builds will be faster)

FAILURE: Build failed with an exception.

* What went wrong:
Could not open settings generic class cache for settings file '/home/reyuki/software/open-source/smali/settings.gradle' (/home/reyuki/.gradle/caches/8.5/scripts/bp37r5vijkpl0c04goc913z3q).
> BUG! exception in phase 'semantic analysis' in source unit '_BuildScript_' Unsupported class file major version 66

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 49s
$ ./gradlew assemble

FAILURE: Build failed with an exception.

* What went wrong:
Could not open settings generic class cache for settings file '/home/reyuki/software/open-source/smali/settings.gradle' (/home/reyuki/.gradle/caches/8.5/scripts/bp37r5vijkpl0c04goc913z3q).
> BUG! exception in phase 'semantic analysis' in source unit '_BuildScript_' Unsupported class file major version 66

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 255ms

$ ./gradlew --stacktrace --debug --scan smali:fatJar
2024-09-09T02:45:43.896+0700 [INFO] [org.gradle.internal.nativeintegration.services.NativeServices] Initialized native services in: /home/reyuki/.gradle/native
2024-09-09T02:45:43.918+0700 [INFO] [org.gradle.internal.nativeintegration.services.NativeServices] Initialized jansi services in: /home/reyuki/.gradle/native
2024-09-09T02:45:43.929+0700 [LIFECYCLE] [org.gradle.launcher.cli.DebugLoggerWarningAction]
#############################################################################
   WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING

   Debug level logging will leak security sensitive information!

   For more details, please refer to https://docs.gradle.org/8.5/userguide/logging.html#sec:debug_security in the Gradle documentation.
#############################################################################

2024-09-09T02:45:43.956+0700 [INFO] [org.gradle.internal.jvm.inspection.DefaultJvmMetadataDetector] Received JVM installation metadata from '/usr/lib/jvm/java-22-openjdk': {JAVA_HOME=/usr/lib/jvm/java-22-openjdk, JAVA_VERSION=22.0.2, JAVA_VENDOR=Arch Linux, RUNTIME_NAME=OpenJDK Runtime Environment, RUNTIME_VERSION=22.0.2+9, VM_NAME=OpenJDK 64-Bit Server VM, VM_VERSION=22.0.2+9, VM_VENDOR=Arch Linux, OS_ARCH=amd64}
2024-09-09T02:45:43.992+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClient] Executing build 840cbca8-437a-4489-b491-ad36dccad685 in daemon client {pid=1435195}
2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding IP addresses for network interface wlp102s0f3u1u4
2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Is this a loopback interface? false
2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding remote address /fe80:0:0:0:ef49:7632:8ca3:6d9e%wlp102s0f3u1u4
2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding remote address /192.168.18.73
2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding IP addresses for network interface wlp4s0
2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Is this a loopback interface? false
2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding remote address /fe80:0:0:0:304c:2035:2ab7:a3c9%wlp4s0
2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding remote address /192.168.18.162
2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding IP addresses for network interface lo
2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Is this a loopback interface? true
2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding loopback address /0:0:0:0:0:0:0:1%lo
2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding loopback address /127.0.0.1
2024-09-09T02:45:43.997+0700 [DEBUG] [org.gradle.cache.internal.DefaultFileLockManager] Waiting to acquire shared lock on daemon addresses registry.
2024-09-09T02:45:43.998+0700 [DEBUG] [org.gradle.cache.internal.DefaultFileLockManager] Lock acquired on daemon addresses registry.
2024-09-09T02:45:43.999+0700 [DEBUG] [org.gradle.cache.internal.DefaultFileLockManager] Releasing lock on daemon addresses registry.
2024-09-09T02:45:43.999+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.TcpOutgoingConnector] Attempting to connect to [0b09c4a3-c555-4839-b769-319c53acf663 port:37547, addresses:[/127.0.0.1]].
2024-09-09T02:45:43.999+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.TcpOutgoingConnector] Trying to connect to address /127.0.0.1.
2024-09-09T02:45:44.000+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.TcpOutgoingConnector] Connected to address /127.0.0.1:37547.
2024-09-09T02:45:44.004+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClient] Connected to daemon DaemonInfo{pid=1431559, address=[0b09c4a3-c555-4839-b769-319c53acf663 port:37547, addresses:[/127.0.0.1]], state=Idle, lastBusy=1725824592680, context=DefaultDaemonContext[uid=16f1323c-652f-4995-8818-e5335d29bf13,javaHome=/usr/lib/jvm/java-22-openjdk,daemonRegistryDir=/home/reyuki/.gradle/daemon,pid=1431559,idleTimeout=10800000,priority=NORMAL,applyInstrumentationAgent=true,daemonOpts=--add-opens=java.base/java.util=ALL-UNNAMED,--add-opens=java.base/java.lang=ALL-UNNAMED,--add-opens=java.base/java.lang.invoke=ALL-UNNAMED,--add-opens=java.prefs/java.util.prefs=ALL-UNNAMED,--add-opens=java.base/java.nio.charset=ALL-UNNAMED,--add-opens=java.base/java.net=ALL-UNNAMED,--add-opens=java.base/java.util.concurrent.atomic=ALL-UNNAMED,-XX:MaxMetaspaceSize=384m,-XX:+HeapDumpOnOutOfMemoryError,-Xms256m,-Xmx512m,-Dfile.encoding=UTF-8,-Duser.country=US,-Duser.language=en,-Duser.variant]}. Dispatching request Build{id=840cbca8-437a-4489-b491-ad36dccad685, currentDir=/home/reyuki/software/open-source/smali}.
2024-09-09T02:45:44.004+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClientConnection] thread 1: dispatching class org.gradle.launcher.daemon.protocol.Build
2024-09-09T02:45:44.011+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClient] Received result org.gradle.launcher.daemon.protocol.BuildStarted@79c7532f from daemon DaemonInfo{pid=1431559, address=[0b09c4a3-c555-4839-b769-319c53acf663 port:37547, addresses:[/127.0.0.1]], state=Idle, lastBusy=1725824592680, context=DefaultDaemonContext[uid=16f1323c-652f-4995-8818-e5335d29bf13,javaHome=/usr/lib/jvm/java-22-openjdk,daemonRegistryDir=/home/reyuki/.gradle/daemon,pid=1431559,idleTimeout=10800000,priority=NORMAL,applyInstrumentationAgent=true,daemonOpts=--add-opens=java.base/java.util=ALL-UNNAMED,--add-opens=java.base/java.lang=ALL-UNNAMED,--add-opens=java.base/java.lang.invoke=ALL-UNNAMED,--add-opens=java.prefs/java.util.prefs=ALL-UNNAMED,--add-opens=java.base/java.nio.charset=ALL-UNNAMED,--add-opens=java.base/java.net=ALL-UNNAMED,--add-opens=java.base/java.util.concurrent.atomic=ALL-UNNAMED,-XX:MaxMetaspaceSize=384m,-XX:+HeapDumpOnOutOfMemoryError,-Xms256m,-Xmx512m,-Dfile.encoding=UTF-8,-Duser.country=US,-Duser.language=en,-Duser.variant]} (build should be starting).
2024-09-09T02:45:44.010+0700 [INFO] [org.gradle.launcher.daemon.server.exec.LogToClient] The client will now receive all logging from the daemon (pid: 1431559). The daemon log file: /home/reyuki/.gradle/daemon/8.5/daemon-1431559.out.log
2024-09-09T02:45:44.011+0700 [INFO] [org.gradle.launcher.daemon.server.exec.LogAndCheckHealth] Starting 3rd build in daemon [uptime: 4 mins 38.517 secs, performance: 98%, GC rate: 0.00/s, heap usage: 4% of 512 MiB, non-heap usage: 9% of 384 MiB]
2024-09-09T02:45:44.011+0700 [DEBUG] [org.gradle.launcher.daemon.server.exec.ExecuteBuild] The daemon has started executing the build.
2024-09-09T02:45:44.011+0700 [DEBUG] [org.gradle.launcher.daemon.server.exec.ExecuteBuild] Executing build with daemon context: DefaultDaemonContext[uid=16f1323c-652f-4995-8818-e5335d29bf13,javaHome=/usr/lib/jvm/java-22-openjdk,daemonRegistryDir=/home/reyuki/.gradle/daemon,pid=1431559,idleTimeout=10800000,priority=NORMAL,applyInstrumentationAgent=true,daemonOpts=--add-opens=java.base/java.util=ALL-UNNAMED,--add-opens=java.base/java.lang=ALL-UNNAMED,--add-opens=java.base/java.lang.invoke=ALL-UNNAMED,--add-opens=java.prefs/java.util.prefs=ALL-UNNAMED,--add-opens=java.base/java.nio.charset=ALL-UNNAMED,--add-opens=java.base/java.net=ALL-UNNAMED,--add-opens=java.base/java.util.concurrent.atomic=ALL-UNNAMED,-XX:MaxMetaspaceSize=384m,-XX:+HeapDumpOnOutOfMemoryError,-Xms256m,-Xmx512m,-Dfile.encoding=UTF-8,-Duser.country=US,-Duser.language=en,-Duser.variant]
2024-09-09T02:45:44.012+0700 [INFO] [org.gradle.internal.work.DefaultWorkerLeaseService] Using 16 worker leases.
2024-09-09T02:45:44.012+0700 [DEBUG] [org.gradle.internal.resources.AbstractTrackedResourceLock] Daemon worker Thread 3: acquired lock on worker lease
2024-09-09T02:45:44.012+0700 [DEBUG] [org.gradle.internal.operations.DefaultBuildOperationRunner] Build operation 'Run build' started
2024-09-09T02:45:44.014+0700 [INFO] [org.gradle.internal.watch.registry.impl.WatchableHierarchies] Now considering [/home/reyuki/software/open-source/smali] as hierarchies to watch
2024-09-09T02:45:44.014+0700 [INFO] [org.gradle.tooling.internal.provider.FileSystemWatchingBuildActionRunner] Watching the file system is configured to be enabled if available
2024-09-09T02:45:44.014+0700 [DEBUG] [org.gradle.tooling.internal.provider.FileSystemWatchingBuildActionRunner] Watching the file system computed to be enabled if available
2024-09-09T02:45:44.014+0700 [DEBUG] [org.gradle.internal.operations.DefaultBuildOperationRunner] Build operation 'Build started for file system watching' started
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected proc: /proc from proc (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected sysfs: /sys from sys (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected devtmpfs: /dev from dev (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run from run (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected efivarfs: /sys/firmware/efi/efivars from efivarfs (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected ext4: / from /dev/nvme1n1p3 (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected securityfs: /sys/kernel/security from securityfs (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /dev/shm from tmpfs (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected devpts: /dev/pts from devpts (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected cgroup2: /sys/fs/cgroup from cgroup2 (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected pstore: /sys/fs/pstore from pstore (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected bpf: /sys/fs/bpf from bpf (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected autofs: /proc/sys/fs/binfmt_misc from systemd-1 (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected hugetlbfs: /dev/hugepages from hugetlbfs (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected mqueue: /dev/mqueue from mqueue (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected debugfs: /sys/kernel/debug from none (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tracefs: /sys/kernel/tracing from tracefs (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/credentials/systemd-journald.service from tmpfs (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/credentials/systemd-udev-load-credentials.service from tmpfs (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected fusectl: /sys/fs/fuse/connections from fusectl (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected configfs: /sys/kernel/config from configfs (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/credentials/systemd-tmpfiles-setup-dev-early.service from tmpfs (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/credentials/systemd-sysctl.service from tmpfs (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/credentials/systemd-tmpfiles-setup-dev.service from tmpfs (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /tmp from tmpfs (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected vfat: /boot from /dev/nvme1n1p1 (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/credentials/systemd-tmpfiles-setup.service from tmpfs (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/credentials/systemd-vconsole-setup.service from tmpfs (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/credentials/getty@tty1.service from tmpfs (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/user/1000 from tmpfs (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected binfmt_misc: /proc/sys/fs/binfmt_misc from binfmt_misc (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tracefs: /sys/kernel/debug/tracing from tracefs (remote: false)
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.operations.DefaultBuildOperationRunner] Completing Build operation 'Build started for file system watching'
2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.operations.DefaultBuildOperationRunner] Build operation 'Build started for file system watching' completed
2024-09-09T02:45:44.016+0700 [INFO] [org.gradle.tooling.internal.provider.FileSystemWatchingBuildActionRunner] File system watching is active
2024-09-09T02:45:44.016+0700 [DEBUG] [org.gradle.internal.operations.DefaultBuildOperationRunner] Build operation 'Load build' started
2024-09-09T02:45:44.016+0700 [DEBUG] [org.gradle.initialization.properties.DefaultProjectPropertiesLoader] Found env project properties: []
2024-09-09T02:45:44.016+0700 [DEBUG] [org.gradle.initialization.properties.DefaultProjectPropertiesLoader] Found system project properties: []
2024-09-09T02:45:44.016+0700 [DEBUG] [org.gradle.internal.operations.DefaultBuildOperationRunner] Build operation 'Evaluate settings' started
2024-09-09T02:45:44.016+0700 [DEBUG] [org.gradle.cache.internal.DefaultCacheCoordinator] Creating new cache for workingDirs, path /home/reyuki/software/open-source/smali/.gradle/8.5/vcsMetadata/workingDirs.bin, access org.gradle.cache.internal.DefaultCacheCoordinator@1d755956
2024-09-09T02:45:44.017+0700 [DEBUG] [org.gradle.cache.internal.DefaultCacheCoordinator] Creating new cache for md5-
2024-09-09T02:46:00.260+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:a0142800000014523cf467c00000002, Subject:CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US, Issuer:CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US, Key type:RSA, Length:4096, Cert Id:2123370772, Valid from:1/17/14, 12:53 AM, Valid until:1/17/34, 12:53 AM
2024-09-09T02:46:00.260+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:b0b75a16485fbfe1cbf58bd719e67d, Subject:CN=Izenpe.com, O=IZENPE S.A., C=ES, Issuer:CN=Izenpe.com, O=IZENPE S.A., C=ES, Key type:RSA, Length:4096, Cert Id:2449386312, Valid from:12/13/07, 8:08 PM, Valid until:12/13/37, 3:27 PM
2024-09-09T02:46:00.260+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:c27e43044e473f19, Subject:EMAILADDRESS=info@e-szigno.hu, CN=Microsec e-Szigno Root CA 2009, O=Microsec Ltd., L=Budapest, C=HU, Issuer:EMAILADDRESS=info@e-szigno.hu, CN=Microsec e-Szigno Root CA 2009, O=Microsec Ltd., L=Budapest, C=HU, Key type:RSA, Length:2048, Cert Id:2391017284, Valid from:6/16/09, 6:30 PM, Valid until:12/30/29, 6:30 PM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:66f23daf87de8bb14aea0c573101c2ec, Subject:CN=Microsoft ECC Root Certificate Authority 2017, O=Microsoft Corporation, C=US, Issuer:CN=Microsoft ECC Root Certificate Authority 2017, O=Microsoft Corporation, C=US, Key type:EC, Length:384, Cert Id:3240761285, Valid from:12/19/19, 6:06 AM, Valid until:7/19/42, 6:16 AM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withRSA, Serial:1ed397095fd8b4b347701eaabe7f45b3, Subject:CN=Microsoft RSA Root Certificate Authority 2017, O=Microsoft Corporation, C=US, Issuer:CN=Microsoft RSA Root Certificate Authority 2017, O=Microsoft Corporation, C=US, Key type:RSA, Length:4096, Cert Id:2848349048, Valid from:12/19/19, 5:51 AM, Valid until:7/19/42, 6:00 AM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withRSA, Serial:194301ea20bddf5c5332ab1434471f8d6504d0d, Subject:CN=NAVER Global Root Certification Authority, O=NAVER BUSINESS PLATFORM Corp., C=KR, Issuer:CN=NAVER Global Root Certification Authority, O=NAVER BUSINESS PLATFORM Corp., C=KR, Key type:RSA, Length:4096, Cert Id:1777546867, Valid from:8/18/17, 3:58 PM, Valid until:8/19/37, 6:59 AM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:49412ce40010, Subject:CN=NetLock Arany (Class Gold) Főtanúsítvány, OU=Tanúsítványkiadók (Certification Services), O=NetLock Kft., L=Budapest, C=HU, Issuer:CN=NetLock Arany (Class Gold) Főtanúsítvány, OU=Tanúsítványkiadók (Certification Services), O=NetLock Kft., L=Budapest, C=HU, Key type:RSA, Length:2048, Cert Id:58541246, Valid from:12/11/08, 10:08 PM, Valid until:12/6/28, 10:08 PM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:76b1205274f0858746b3f8231af6c2c0, Subject:CN=OISTE WISeKey Global Root GB CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH, Issuer:CN=OISTE WISeKey Global Root GB CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH, Key type:RSA, Length:2048, Cert Id:3681485780, Valid from:12/1/14, 10:00 PM, Valid until:12/1/39, 10:10 PM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:212a560caeda0cab4045bf2ba22d3aea, Subject:CN=OISTE WISeKey Global Root GC CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH, Issuer:CN=OISTE WISeKey Global Root GC CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH, Key type:EC, Length:384, Cert Id:2781801839, Valid from:5/9/17, 4:48 PM, Valid until:5/9/42, 4:58 PM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:78585f2ead2c194be3370735341328b596d46593, Subject:CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:3532531262, Valid from:1/13/12, 12:27 AM, Valid until:1/13/42, 12:27 AM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:509, Subject:CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:338250116, Valid from:11/25/06, 1:27 AM, Valid until:11/25/31, 1:23 AM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:445734245b81899b35f2ceb82b3b5ba726f07528, Subject:CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:696763521, Valid from:1/13/12, 1:59 AM, Valid until:1/13/42, 1:59 AM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:5c6, Subject:CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:1470392860, Valid from:11/25/06, 2:11 AM, Valid until:11/25/31, 2:06 AM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:2ef59b0228a7db7affd5a3a9eebd03a0cf126a1d, Subject:CN=QuoVadis Root CA 3 G3, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 3 G3, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:3589344305, Valid from:1/13/12, 3:26 AM, Valid until:1/13/42, 3:26 AM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withECDSA, Serial:2c299c5b16ed0595, Subject:CN=SSL.com EV Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US, Issuer:CN=SSL.com EV Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US, Key type:EC, Length:384, Cert Id:1789254518, Valid from:2/13/16, 1:15 AM, Valid until:2/13/41, 1:15 AM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:56b629cd34bc78f6, Subject:CN=SSL.com EV Root Certification Authority RSA R2, O=SSL Corporation, L=Houston, ST=Texas, C=US, Issuer:CN=SSL.com EV Root Certification Authority RSA R2, O=SSL Corporation, L=Houston, ST=Texas, C=US, Key type:RSA, Length:4096, Cert Id:1381862403, Valid from:6/1/17, 1:14 AM, Valid until:5/31/42, 1:14 AM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withECDSA, Serial:75e6dfcbc1685ba8, Subject:CN=SSL.com Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US, Issuer:CN=SSL.com Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US, Key type:EC, Length:384, Cert Id:2926673683, Valid from:2/13/16, 1:14 AM, Valid until:2/13/41, 1:14 AM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:7b2c9bd316803299, Subject:CN=SSL.com Root Certification Authority RSA, O=SSL Corporation, L=Houston, ST=Texas, C=US, Issuer:CN=SSL.com Root Certification Authority RSA, O=SSL Corporation, L=Houston, ST=Texas, C=US, Key type:RSA, Length:4096, Cert Id:156725711, Valid from:2/13/16, 12:39 AM, Valid until:2/13/41, 12:39 AM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:1403f5abfb378b17405be243b2a5d1c4, Subject:CN=SSL.com TLS ECC Root CA 2022, O=SSL Corporation, C=US, Issuer:CN=SSL.com TLS ECC Root CA 2022, O=SSL Corporation, C=US, Key type:EC, Length:384, Cert Id:683561703, Valid from:8/25/22, 11:33 PM, Valid until:8/19/46, 11:33 PM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:6fbedaad73bd0840e28b4dbed4f75b91, Subject:CN=SSL.com TLS RSA Root CA 2022, O=SSL Corporation, C=US, Issuer:CN=SSL.com TLS RSA Root CA 2022, O=SSL Corporation, C=US, Key type:RSA, Length:4096, Cert Id:556880013, Valid from:8/25/22, 11:34 PM, Valid until:8/19/46, 11:34 PM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:3e8a5d07ec55d232d5b7e3b65f01eb2ddce4d6e4, Subject:CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL, Issuer:CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL, Key type:RSA, Length:2048, Cert Id:381279303, Valid from:10/19/15, 2:43 PM, Valid until:10/19/35, 2:43 PM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:42f2ccda1b6937445f15fe752810b8f4, Subject:CN=Sectigo Public Server Authentication Root E46, O=Sectigo Limited, C=GB, Issuer:CN=Sectigo Public Server Authentication Root E46, O=Sectigo Limited, C=GB, Key type:EC, Length:384, Cert Id:3789385269, Valid from:3/22/21, 7:00 AM, Valid until:3/22/46, 6:59 AM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withRSA, Serial:758dfd8bae7c0700faa925a7e1c7ad14, Subject:CN=Sectigo Public Server Authentication Root R46, O=Sectigo Limited, C=GB, Issuer:CN=Sectigo Public Server Authentication Root R46, O=Sectigo Limited, C=GB, Key type:RSA, Length:4096, Cert Id:3806652169, Valid from:3/22/21, 7:00 AM, Valid until:3/22/46, 6:59 AM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:1, Subject:CN=SecureSign RootCA11, O="Japan Certification Services, Inc.", C=JP, Issuer:CN=SecureSign RootCA11, O="Japan Certification Services, Inc.", C=JP, Key type:RSA, Length:2048, Cert Id:2079057034, Valid from:4/8/09, 11:56 AM, Valid until:4/8/29, 11:56 AM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:cf08e5c0816a5ad427ff0eb271859d0, Subject:CN=SecureTrust CA, O=SecureTrust Corporation, C=US, Issuer:CN=SecureTrust CA, O=SecureTrust Corporation, C=US, Key type:RSA, Length:2048, Cert Id:2034155325, Valid from:11/8/06, 2:31 AM, Valid until:1/1/30, 2:40 AM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:75622a4e8d48a894df413c8f0f8eaa5, Subject:CN=Secure Global CA, O=SecureTrust Corporation, C=US, Issuer:CN=Secure Global CA, O=SecureTrust Corporation, C=US, Key type:RSA, Length:2048, Cert Id:2818194321, Valid from:11/8/06, 2:42 AM, Valid until:1/1/30, 2:52 AM
2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:d65d9bb378812eeb, Subject:CN=Security Communication ECC RootCA1, O="SECOM Trust Systems CO.,LTD.", C=JP, Issuer:CN=Security Communication ECC RootCA1, O="SECOM Trust Systems CO.,LTD.", C=JP, Key type:EC, Length:384, Cert Id:2131361491, Valid from:6/16/16, 12:15 PM, Valid until:1/18/38, 12:15 PM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:0, Subject:OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP, Issuer:OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP, Key type:RSA, Length:2048, Cert Id:1521072570, Valid from:5/29/09, 12:00 PM, Valid until:5/29/29, 12:00 PM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withRSA, Serial:e17c3740fd1bfe67, Subject:CN=Security Communication RootCA3, O="SECOM Trust Systems CO.,LTD.", C=JP, Issuer:CN=Security Communication RootCA3, O="SECOM Trust Systems CO.,LTD.", C=JP, Key type:RSA, Length:4096, Cert Id:3804693758, Valid from:6/16/16, 1:17 PM, Valid until:1/18/38, 1:17 PM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:0, Subject:OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US, Issuer:OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US, Key type:RSA, Length:2048, Cert Id:1825617644, Valid from:6/30/04, 12:39 AM, Valid until:6/30/34, 12:39 AM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:0, Subject:CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US, Issuer:CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US, Key type:RSA, Length:2048, Cert Id:3268325709, Valid from:9/1/09, 7:00 AM, Valid until:1/1/38, 6:59 AM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:0, Subject:CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US, Issuer:CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US, Key type:RSA, Length:2048, Cert Id:1964785574, Valid from:9/1/09, 7:00 AM, Valid until:1/1/38, 6:59 AM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:bb401c43f55e4fb0, Subject:CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH, Issuer:CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH, Key type:RSA, Length:4096, Cert Id:1516221943, Valid from:10/25/06, 3:30 PM, Valid until:10/25/36, 3:30 PM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:4f1bd42f54bb2f4b, Subject:CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH, Issuer:CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH, Key type:RSA, Length:4096, Cert Id:126726124, Valid from:10/25/06, 3:32 PM, Valid until:10/25/36, 3:32 PM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:1, Subject:CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE, Issuer:CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE, Key type:RSA, Length:2048, Cert Id:3056503257, Valid from:10/1/08, 5:40 PM, Valid until:10/2/33, 6:59 AM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:1, Subject:CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE, Issuer:CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE, Key type:RSA, Length:2048, Cert Id:1894096264, Valid from:10/1/08, 5:29 PM, Valid until:10/2/33, 6:59 AM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:1, Subject:CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1, OU=Kamu Sertifikasyon Merkezi - Kamu SM, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, L=Gebze - Kocaeli, C=TR, Issuer:CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1, OU=Kamu Sertifikasyon Merkezi - Kamu SM, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, L=Gebze - Kocaeli, C=TR, Key type:RSA, Length:2048, Cert Id:1093603654, Valid from:11/25/13, 3:25 PM, Valid until:10/25/43, 3:25 PM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:cbe, Subject:CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW, Issuer:CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW, Key type:RSA, Length:4096, Cert Id:861175838, Valid from:6/27/12, 1:28 PM, Valid until:12/31/30, 10:59 PM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:1, Subject:CN=TWCA Root Certification Authority, OU=Root CA, O=TAIWAN-CA, C=TW, Issuer:CN=TWCA Root Certification Authority, OU=Root CA, O=TAIWAN-CA, C=TW, Key type:RSA, Length:2048, Cert Id:2652873033, Valid from:8/28/08, 2:24 PM, Valid until:12/31/30, 10:59 PM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:363a968cc95cb258cdd0015dc5e55700, Subject:CN=Telekom Security TLS ECC Root 2020, O=Deutsche Telekom Security GmbH, C=DE, Issuer:CN=Telekom Security TLS ECC Root 2020, O=Deutsche Telekom Security GmbH, C=DE, Key type:EC, Length:384, Cert Id:771592905, Valid from:8/25/20, 2:48 PM, Valid until:8/26/45, 6:59 AM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withRSA, Serial:219c542de8f6ec7177fa4ee8c3705797, Subject:CN=Telekom Security TLS RSA Root 2023, O=Deutsche Telekom Security GmbH, C=DE, Issuer:CN=Telekom Security TLS RSA Root 2023, O=Deutsche Telekom Security GmbH, C=DE, Key type:RSA, Length:4096, Cert Id:2296218035, Valid from:3/28/23, 7:16 PM, Valid until:3/28/48, 6:59 AM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:95be16a0f72e46f17b398272fa8bcd96, Subject:CN=TeliaSonera Root CA v1, O=TeliaSonera, Issuer:CN=TeliaSonera Root CA v1, O=TeliaSonera, Key type:RSA, Length:4096, Cert Id:1495358374, Valid from:10/18/07, 7:00 PM, Valid until:10/18/32, 7:00 PM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:1675f27d6fe7ae3e4acbe095b059e, Subject:CN=Telia Root CA v2, O=Telia Finland Oyj, C=FI, Issuer:CN=Telia Root CA v2, O=Telia Finland Oyj, C=FI, Key type:RSA, Length:4096, Cert Id:3473063976, Valid from:11/29/18, 6:55 PM, Valid until:11/29/43, 6:55 PM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withRSA, Serial:64f60e6577616aab3bb4ea8584bbb189b871930f, Subject:CN=TrustAsia Global Root CA G3, O="TrustAsia Technologies, Inc.", C=CN, Issuer:CN=TrustAsia Global Root CA G3, O="TrustAsia Technologies, Inc.", C=CN, Key type:RSA, Length:4096, Cert Id:3528443285, Valid from:5/20/21, 9:10 AM, Valid until:5/19/46, 9:10 AM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:4f2364b88e97639ec65381c1764ecb2a7415d6d7, Subject:CN=TrustAsia Global Root CA G4, O="TrustAsia Technologies, Inc.", C=CN, Issuer:CN=TrustAsia Global Root CA G4, O="TrustAsia Technologies, Inc.", C=CN, Key type:EC, Length:384, Cert Id:3167719659, Valid from:5/20/21, 9:10 AM, Valid until:5/19/46, 9:10 AM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:5f70e86da49f346352ebab2, Subject:CN=Trustwave Global Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Issuer:CN=Trustwave Global Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Key type:RSA, Length:4096, Cert Id:416366836, Valid from:8/24/17, 2:34 AM, Valid until:8/24/42, 2:34 AM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withECDSA, Serial:d6a5f083f285c3e5195df5d, Subject:CN=Trustwave Global ECC P256 Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Issuer:CN=Trustwave Global ECC P256 Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Key type:EC, Length:256, Cert Id:948272517, Valid from:8/24/17, 2:35 AM, Valid until:8/24/42, 2:35 AM
2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:8bd85976c9927a48068473b, Subject:CN=Trustwave Global ECC P384 Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Issuer:CN=Trustwave Global ECC P384 Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Key type:EC, Length:384, Cert Id:2301042373, Valid from:8/24/17, 2:36 AM, Valid until:8/24/42, 2:36 AM
2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:1302d5e2404c92468616675db4bbbbb26b3efc13, Subject:CN=TunTrust Root CA, O=Agence Nationale de Certification Electronique, C=TN, Issuer:CN=TunTrust Root CA, O=Agence Nationale de Certification Electronique, C=TN, Key type:RSA, Length:4096, Cert Id:1973181427, Valid from:4/26/19, 3:57 PM, Valid until:4/26/44, 3:57 PM
2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:4fd22b8ff564c8339e4f345866237060, Subject:CN=UCA Extended Validation Root, O=UniTrust, C=CN, Issuer:CN=UCA Extended Validation Root, O=UniTrust, C=CN, Key type:RSA, Length:4096, Cert Id:649181271, Valid from:3/13/15, 7:00 AM, Valid until:12/31/38, 7:00 AM
2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:5ddfb1da5aa3ed5dbe5a6520650390ef, Subject:CN=UCA Global G2 Root, O=UniTrust, C=CN, Issuer:CN=UCA Global G2 Root, O=UniTrust, C=CN, Key type:RSA, Length:4096, Cert Id:1844967193, Valid from:3/11/16, 7:00 AM, Valid until:12/31/40, 7:00 AM
2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:5c8b99c55a94c5d27156decd8980cc26, Subject:CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US, Issuer:CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US, Key type:EC, Length:384, Cert Id:3329287386, Valid from:2/1/10, 7:00 AM, Valid until:1/19/38, 6:59 AM
2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withRSA, Serial:1fd6d30fca3ca51a81bbc640e35032d, Subject:CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US, Issuer:CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US, Key type:RSA, Length:4096, Cert Id:3947601401, Valid from:2/1/10, 7:00 AM, Valid until:1/19/38, 6:59 AM
2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:50946cec18ead59c4dd597ef758fa0ad, Subject:CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, OU=www.xrampsecurity.com, C=US, Issuer:CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, OU=www.xrampsecurity.com, C=US, Key type:RSA, Length:2048, Cert Id:3342493210, Valid from:11/2/04, 12:14 AM, Valid until:1/1/35, 12:37 PM
2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:200605167002, Subject:OU=certSIGN ROOT CA, O=certSIGN, C=RO, Issuer:OU=certSIGN ROOT CA, O=certSIGN, C=RO, Key type:RSA, Length:2048, Cert Id:4005006620, Valid from:7/5/06, 12:20 AM, Valid until:7/5/31, 12:20 AM
2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:110034b64ec6362d36, Subject:OU=certSIGN ROOT CA G2, O=CERTSIGN SA, C=RO, Issuer:OU=certSIGN ROOT CA G2, O=CERTSIGN SA, C=RO, Key type:RSA, Length:4096, Cert Id:2181086866, Valid from:2/6/17, 4:27 PM, Valid until:2/6/42, 4:27 PM
2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withECDSA, Serial:15448ef21fd97590df5040a, Subject:CN=e-Szigno Root CA 2017, OID.2.5.4.97=VATHU-23584497, O=Microsec Ltd., L=Budapest, C=HU, Issuer:CN=e-Szigno Root CA 2017, OID.2.5.4.97=VATHU-23584497, O=Microsec Ltd., L=Budapest, C=HU, Key type:EC, Length:256, Cert Id:3303793581, Valid from:8/22/17, 7:07 PM, Valid until:8/22/42, 7:07 PM
2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:15c8bd65475cafb897005ee406d2bc9d, Subject:OU=ePKI Root Certification Authority, O="Chunghwa Telecom Co., Ltd.", C=TW, Issuer:OU=ePKI Root Certification Authority, O="Chunghwa Telecom Co., Ltd.", C=TW, Key type:RSA, Length:4096, Cert Id:3632331159, Valid from:12/20/04, 9:31 AM, Valid until:12/20/34, 9:31 AM
2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:7b71b68256b8127c9ca8, Subject:CN=emSign ECC Root CA - C3, O=eMudhra Inc, OU=emSign PKI, C=US, Issuer:CN=emSign ECC Root CA - C3, O=eMudhra Inc, OU=emSign PKI, C=US, Key type:EC, Length:384, Cert Id:3346510540, Valid from:2/19/18, 1:30 AM, Valid until:2/19/43, 1:30 AM
2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:3cf607a968700eda8b84, Subject:CN=emSign ECC Root CA - G3, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN, Issuer:CN=emSign ECC Root CA - G3, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN, Key type:EC, Length:384, Cert Id:3832035707, Valid from:2/19/18, 1:30 AM, Valid until:2/19/43, 1:30 AM
2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:aecf00bac4cf32f843b2, Subject:CN=emSign Root CA - C1, O=eMudhra Inc, OU=emSign PKI, C=US, Issuer:CN=emSign Root CA - C1, O=eMudhra Inc, OU=emSign PKI, C=US, Key type:RSA, Length:2048, Cert Id:3026103940, Valid from:2/19/18, 1:30 AM, Valid until:2/19/43, 1:30 AM
2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:31f5e4620c6c58edd6d8, Subject:CN=emSign Root CA - G1, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN, Issuer:CN=emSign Root CA - G1, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN, Key type:RSA, Length:2048, Cert Id:392709196, Valid from:2/19/18, 1:30 AM, Valid until:2/19/43, 1:30 AM
2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:6e6abc59aa53be983967a2d26ba43be66d1cd6da, Subject:CN=vTrus ECC Root CA, O="iTrusChina Co.,Ltd.", C=CN, Issuer:CN=vTrus ECC Root CA, O="iTrusChina Co.,Ltd.", C=CN, Key type:EC, Length:384, Cert Id:268503342, Valid from:7/31/18, 2:26 PM, Valid until:7/31/43, 2:26 PM
2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:43e37113d8b359145db7ce8cfd35fd6fbc058d45, Subject:CN=vTrus Root CA, O="iTrusChina Co.,Ltd.", C=CN, Issuer:CN=vTrus Root CA, O="iTrusChina Co.,Ltd.", C=CN, Key type:RSA, Length:4096, Cert Id:2469083546, Valid from:7/31/18, 2:24 PM, Valid until:7/31/43, 2:24 PM
2024-09-09T02:46:00.266+0700 [DEBUG] [jdk.event.security]  TLSHandshake: scans-in.gradle.com:443, TLSv1.3, TLS_AES_256_GCM_SHA384, 149913401
2024-09-09T02:46:00.266+0700 [DEBUG] [sun.net.www.protocol.http.HttpURLConnection] sun.net.www.MessageHeader@7880e41f 11 pairs: {POST /scans/publish/gradle/3.15.1/token HTTP/1.1: null}{X-Request-Id: acc6cd8c-26d1-4581-8c40-89567f8752cf}{Accept-Encoding: gzip}{Content-Type: application/vnd.gradle.scan-token-request+json}{Cache-Control: no-cache}{Pragma: no-cache}{User-Agent: Java/22.0.2}{Host: scans-in.gradle.com}{Accept: */*}{Connection: close}{Content-Length: 147}
2024-09-09T02:46:00.581+0700 [DEBUG] [sun.net.www.protocol.http.HttpURLConnection] sun.net.www.MessageHeader@4b4c0c03 16 pairs: {null: HTTP/1.1 200 OK}{Date: Sun, 08 Sep 2024 19:46:00 GMT}{Content-Type: application/vnd.gradle.scan-ack+json}{Transfer-Encoding: chunked}{Connection: close}{cache-control: no-cache, no-store, must-revalidate}{pragma: no-cache}{expires: 0}{x-content-type-options: nosniff}{x-frame-options: deny}{strict-transport-security: max-age=31536000; includeSubDomains; preload}{x-xss-protection: 1; mode=block}{content-encoding: gzip}{CF-Cache-Status: DYNAMIC}{Server: cloudflare}{CF-RAY: 8c01712fbb833579-CGK}
2024-09-09T02:46:00.696+0700 [QUIET] [com.gradle.enterprise.gradleplugin.GradleEnterprisePlugin] https://gradle.com/s/p7rnyxjrgeahq
2024-09-09T02:46:00.696+0700 [QUIET] [com.gradle.enterprise.gradleplugin.GradleEnterprisePlugin]
2024-09-09T02:46:00.697+0700 [DEBUG] [com.gradle.enterprise.gradleplugin.GradleEnterprisePlugin] Failed to visit file /home/reyuki/.gradle/build-scan-data/3.15.1
java.nio.file.NoSuchFileException: /home/reyuki/.gradle/build-scan-data/3.15.1
        at java.base/sun.nio.fs.UnixException.translateToIOException(UnixException.java:92)
        at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:106)
        at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:111)
        at java.base/sun.nio.fs.UnixFileAttributeViews$Basic.readAttributes(UnixFileAttributeViews.java:56)
        at java.base/sun.nio.fs.UnixFileSystemProvider.readAttributes(UnixFileSystemProvider.java:171)
        at java.base/sun.nio.fs.LinuxFileSystemProvider.readAttributes(LinuxFileSystemProvider.java:99)
        at java.base/java.nio.file.Files.readAttributes(Files.java:1858)
        at java.base/java.nio.file.FileTreeWalker.getAttributes(FileTreeWalker.java:220)
        at java.base/java.nio.file.FileTreeWalker.visit(FileTreeWalker.java:277)
        at java.base/java.nio.file.FileTreeWalker.walk(FileTreeWalker.java:323)
        at java.base/java.nio.file.Files.walkFileTree(Files.java:2784)
        at java.base/java.nio.file.Files.walkFileTree(Files.java:2862)
        at com.gradle.scan.plugin.internal.e.a.a(SourceFile:78)
        at com.gradle.scan.plugin.internal.e.a.b(SourceFile:62)
        at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:317)
        at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1144)
        at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:642)
        at java.base/java.lang.Thread.run(Thread.java:1570)
2024-09-09T02:46:00.698+0700 [DEBUG] [org.gradle.cache.internal.LockOnDemandCrossProcessCacheAccess] Releasing file lock for cache directory md-supplier (/home/reyuki/.gradle/caches/8.5/md-supplier)
2024-09-09T02:46:00.698+0700 [DEBUG] [org.gradle.cache.internal.DefaultFileLockManager] Releasing lock on cache directory md-supplier (/home/reyuki/.gradle/caches/8.5/md-supplier).
2024-09-09T02:46:00.698+0700 [DEBUG] [org.gradle.cache.internal.LockOnDemandCrossProcessCacheAccess] Releasing file lock for cache directory md-rule (/home/reyuki/.gradle/caches/8.5/md-rule)
2024-09-09T02:46:00.698+0700 [DEBUG] [org.gradle.cache.internal.DefaultFileLockManager] Releasing lock on cache directory md-rule (/home/reyuki/.gradle/caches/8.5/md-rule).
2024-09-09T02:46:00.726+0700 [DEBUG] [org.gradle.api.internal.artifacts.ivyservice.resolveengine.store.CachedStoreFactory] Resolution result cache closed. Cache reads: 0, disk reads: 0 (avg: 0.0 secs, total: 0.0 secs)
2024-09-09T02:46:00.726+0700 [DEBUG] [org.gradle.api.internal.artifacts.ivyservice.resolveengine.store.CachedStoreFactory] Resolution result cache closed. Cache reads: 0, disk reads: 2 (avg: 0.0 secs, total: 0.001 secs)
2024-09-09T02:46:00.726+0700 [DEBUG] [org.gradle.api.internal.artifacts.ivyservice.resolveengine.store.ResolutionResultsStoreFactory] Deleted 2 resolution results binary files in 0.027 secs
2024-09-09T02:46:00.726+0700 [DEBUG] [org.gradle.internal.operations.DefaultBuildOperationRunner] Completing Build operation 'Run build'
2024-09-09T02:46:00.726+0700 [DEBUG] [org.gradle.internal.operations.DefaultBuildOperationRunner] Build operation 'Run build' completed
2024-09-09T02:46:00.726+0700 [DEBUG] [org.gradle.internal.resources.AbstractTrackedResourceLock] Daemon worker Thread 3: released lock on worker lease
2024-09-09T02:46:00.730+0700 [DEBUG] [org.gradle.deployment.internal.DefaultDeploymentRegistry] Stopping 0 deployment handles
2024-09-09T02:46:00.731+0700 [DEBUG] [org.gradle.deployment.internal.DefaultDeploymentRegistry] Stopped deployment handles
2024-09-09T02:46:00.731+0700 [DEBUG] [org.gradle.cache.internal.DefaultPersistentDirectoryStore] VCS Checkout Cache (/home/reyuki/software/open-source/smali/.gradle/vcs-1) has last been fully cleaned up 0 hours ago
2024-09-09T02:46:00.731+0700 [DEBUG] [org.gradle.cache.internal.DefaultCacheCoordinator] Cache VCS Checkout Cache (/home/reyuki/software/open-source/smali/.gradle/vcs-1) was closed 0 times.
2024-09-09T02:46:00.731+0700 [DEBUG] [org.gradle.cache.internal.DefaultCacheCoordinator] Cache VCS metadata (/home/reyuki/software/open-source/smali/.gradle/8.5/vcsMetadata) was closed 0 times.
2024-09-09T02:46:00.731+0700 [DEBUG] [org.gradle.cache.internal.LockOnDemandCrossProcessCacheAccess] Releasing file lock for checksums cache (/home/reyuki/software/open-source/smali/.gradle/8.5/checksums)
2024-09-09T02:46:00.731+0700 [DEBUG] [org.gradle.cache.internal.btree.BTreePersistentIndexedCache] Closing cache md5-checksums.bin (/home/reyuki/software/open-source/smali/.gradle/8.5/checksums/md5-checksums.bin)
2024-09-09T02:46:00.731+0700 [DEBUG] [org.gradle.cache.internal.btree.BTreePersistentIndexedCache] Closing cache sha1-checksums.bin (/home/reyuki/software/open-source/smali/.gradle/8.5/checksums/sha1-checksums.bin)
2024-09-09T02:46:00.731+0700 [DEBUG] [org.gradle.cache.internal.DefaultFileLockManager] Releasing lock on checksums cache (/home/reyuki/software/open-source/smali/.gradle/8.5/checksums).
2024-09-09T02:46:00.732+0700 [DEBUG] [org.gradle.cache.internal.LockOnDemandCrossProcessCacheAccess] Releasing file lock for file hash cache (/home/reyuki/software/open-source/smali/.gradle/8.5/fileHashes)
2024-09-09T02:46:00.732+0700 [DEBUG] [org.gradle.cache.internal.DefaultFileLockManager] Releasing lock on file hash cache (/home/reyuki/software/open-source/smali/.gradle/8.5/fileHashes).
2024-09-09T02:46:00.736+0700 [DEBUG] [org.gradle.launcher.daemon.server.exec.ExecuteBuild] The daemon has finished executing the build.
2024-09-09T02:46:00.749+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClientInputForwarder] Dispatching close input message: org.gradle.launcher.daemon.protocol.CloseInput@7bd42e64
2024-09-09T02:46:00.749+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClientConnection] thread 35: dispatching class org.gradle.launcher.daemon.protocol.CloseInput
2024-09-09T02:46:00.749+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClient] Received result Success[value=org.gradle.launcher.exec.BuildActionResult@3bcbb589] from daemon DaemonInfo{pid=1431559, address=[0b09c4a3-c555-4839-b769-319c53acf663 port:37547, addresses:[/127.0.0.1]], state=Idle, lastBusy=1725824592680, context=DefaultDaemonContext[uid=16f1323c-652f-4995-8818-e5335d29bf13,javaHome=/usr/lib/jvm/java-22-openjdk,daemonRegistryDir=/home/reyuki/.gradle/daemon,pid=1431559,idleTimeout=10800000,priority=NORMAL,applyInstrumentationAgent=true,daemonOpts=--add-opens=java.base/java.util=ALL-UNNAMED,--add-opens=java.base/java.lang=ALL-UNNAMED,--add-opens=java.base/java.lang.invoke=ALL-UNNAMED,--add-opens=java.prefs/java.util.prefs=ALL-UNNAMED,--add-opens=java.base/java.nio.charset=ALL-UNNAMED,--add-opens=java.base/java.net=ALL-UNNAMED,--add-opens=java.base/java.util.concurrent.atomic=ALL-UNNAMED,-XX:MaxMetaspaceSize=384m,-XX:+HeapDumpOnOutOfMemoryError,-Xms256m,-Xmx512m,-Dfile.encoding=UTF-8,-Duser.country=US,-Duser.language=en,-Duser.variant]} (build should be done).
2024-09-09T02:46:00.749+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClientConnection] thread 1: dispatching class org.gradle.launcher.daemon.protocol.Finished
2024-09-09T02:46:00.749+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClientConnection] thread 1: connection stop
2024-09-09T02:46:00.750+0700 [LIFECYCLE] [org.gradle.launcher.cli.DebugLoggerWarningAction]
#############################################################################
   WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING

   Debug level logging will leak security sensitive information!

   For more details, please refer to https://docs.gradle.org/8.5/userguide/logging.html#sec:debug_security in the Gradle documentation.
#############################################################################

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions