Open realyukii opened 2 months ago
$ ./gradlew smali:fatJar Downloading https://services.gradle.org/distributions/gradle-8.5-all.zip ....................10%.....................20%.....................30%.....................40%.....................50%.....................60%....................70%.....................80%.....................90%.....................100% Welcome to Gradle 8.5! Here are the highlights of this release: - Support for running on Java 21 - Faster first use with Kotlin DSL - Improved error and warning messages For more details see https://docs.gradle.org/8.5/release-notes.html Starting a Gradle Daemon (subsequent builds will be faster) FAILURE: Build failed with an exception. * What went wrong: Could not open settings generic class cache for settings file '/home/reyuki/software/open-source/smali/settings.gradle' (/home/reyuki/.gradle/caches/8.5/scripts/bp37r5vijkpl0c04goc913z3q). > BUG! exception in phase 'semantic analysis' in source unit '_BuildScript_' Unsupported class file major version 66 * Try: > Run with --stacktrace option to get the stack trace. > Run with --info or --debug option to get more log output. > Run with --scan to get full insights. > Get more help at https://help.gradle.org. BUILD FAILED in 49s $ ./gradlew assemble FAILURE: Build failed with an exception. * What went wrong: Could not open settings generic class cache for settings file '/home/reyuki/software/open-source/smali/settings.gradle' (/home/reyuki/.gradle/caches/8.5/scripts/bp37r5vijkpl0c04goc913z3q). > BUG! exception in phase 'semantic analysis' in source unit '_BuildScript_' Unsupported class file major version 66 * Try: > Run with --stacktrace option to get the stack trace. > Run with --info or --debug option to get more log output. > Run with --scan to get full insights. > Get more help at https://help.gradle.org. BUILD FAILED in 255ms $ ./gradlew --stacktrace --debug --scan smali:fatJar 2024-09-09T02:45:43.896+0700 [INFO] [org.gradle.internal.nativeintegration.services.NativeServices] Initialized native services in: /home/reyuki/.gradle/native 2024-09-09T02:45:43.918+0700 [INFO] [org.gradle.internal.nativeintegration.services.NativeServices] Initialized jansi services in: /home/reyuki/.gradle/native 2024-09-09T02:45:43.929+0700 [LIFECYCLE] [org.gradle.launcher.cli.DebugLoggerWarningAction] ############################################################################# WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING Debug level logging will leak security sensitive information! For more details, please refer to https://docs.gradle.org/8.5/userguide/logging.html#sec:debug_security in the Gradle documentation. ############################################################################# 2024-09-09T02:45:43.956+0700 [INFO] [org.gradle.internal.jvm.inspection.DefaultJvmMetadataDetector] Received JVM installation metadata from '/usr/lib/jvm/java-22-openjdk': {JAVA_HOME=/usr/lib/jvm/java-22-openjdk, JAVA_VERSION=22.0.2, JAVA_VENDOR=Arch Linux, RUNTIME_NAME=OpenJDK Runtime Environment, RUNTIME_VERSION=22.0.2+9, VM_NAME=OpenJDK 64-Bit Server VM, VM_VERSION=22.0.2+9, VM_VENDOR=Arch Linux, OS_ARCH=amd64} 2024-09-09T02:45:43.992+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClient] Executing build 840cbca8-437a-4489-b491-ad36dccad685 in daemon client {pid=1435195} 2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding IP addresses for network interface wlp102s0f3u1u4 2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Is this a loopback interface? false 2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding remote address /fe80:0:0:0:ef49:7632:8ca3:6d9e%wlp102s0f3u1u4 2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding remote address /192.168.18.73 2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding IP addresses for network interface wlp4s0 2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Is this a loopback interface? false 2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding remote address /fe80:0:0:0:304c:2035:2ab7:a3c9%wlp4s0 2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding remote address /192.168.18.162 2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding IP addresses for network interface lo 2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Is this a loopback interface? true 2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding loopback address /0:0:0:0:0:0:0:1%lo 2024-09-09T02:45:43.993+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.InetAddresses] Adding loopback address /127.0.0.1 2024-09-09T02:45:43.997+0700 [DEBUG] [org.gradle.cache.internal.DefaultFileLockManager] Waiting to acquire shared lock on daemon addresses registry. 2024-09-09T02:45:43.998+0700 [DEBUG] [org.gradle.cache.internal.DefaultFileLockManager] Lock acquired on daemon addresses registry. 2024-09-09T02:45:43.999+0700 [DEBUG] [org.gradle.cache.internal.DefaultFileLockManager] Releasing lock on daemon addresses registry. 2024-09-09T02:45:43.999+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.TcpOutgoingConnector] Attempting to connect to [0b09c4a3-c555-4839-b769-319c53acf663 port:37547, addresses:[/127.0.0.1]]. 2024-09-09T02:45:43.999+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.TcpOutgoingConnector] Trying to connect to address /127.0.0.1. 2024-09-09T02:45:44.000+0700 [DEBUG] [org.gradle.internal.remote.internal.inet.TcpOutgoingConnector] Connected to address /127.0.0.1:37547. 2024-09-09T02:45:44.004+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClient] Connected to daemon DaemonInfo{pid=1431559, address=[0b09c4a3-c555-4839-b769-319c53acf663 port:37547, addresses:[/127.0.0.1]], state=Idle, lastBusy=1725824592680, context=DefaultDaemonContext[uid=16f1323c-652f-4995-8818-e5335d29bf13,javaHome=/usr/lib/jvm/java-22-openjdk,daemonRegistryDir=/home/reyuki/.gradle/daemon,pid=1431559,idleTimeout=10800000,priority=NORMAL,applyInstrumentationAgent=true,daemonOpts=--add-opens=java.base/java.util=ALL-UNNAMED,--add-opens=java.base/java.lang=ALL-UNNAMED,--add-opens=java.base/java.lang.invoke=ALL-UNNAMED,--add-opens=java.prefs/java.util.prefs=ALL-UNNAMED,--add-opens=java.base/java.nio.charset=ALL-UNNAMED,--add-opens=java.base/java.net=ALL-UNNAMED,--add-opens=java.base/java.util.concurrent.atomic=ALL-UNNAMED,-XX:MaxMetaspaceSize=384m,-XX:+HeapDumpOnOutOfMemoryError,-Xms256m,-Xmx512m,-Dfile.encoding=UTF-8,-Duser.country=US,-Duser.language=en,-Duser.variant]}. Dispatching request Build{id=840cbca8-437a-4489-b491-ad36dccad685, currentDir=/home/reyuki/software/open-source/smali}. 2024-09-09T02:45:44.004+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClientConnection] thread 1: dispatching class org.gradle.launcher.daemon.protocol.Build 2024-09-09T02:45:44.011+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClient] Received result org.gradle.launcher.daemon.protocol.BuildStarted@79c7532f from daemon DaemonInfo{pid=1431559, address=[0b09c4a3-c555-4839-b769-319c53acf663 port:37547, addresses:[/127.0.0.1]], state=Idle, lastBusy=1725824592680, context=DefaultDaemonContext[uid=16f1323c-652f-4995-8818-e5335d29bf13,javaHome=/usr/lib/jvm/java-22-openjdk,daemonRegistryDir=/home/reyuki/.gradle/daemon,pid=1431559,idleTimeout=10800000,priority=NORMAL,applyInstrumentationAgent=true,daemonOpts=--add-opens=java.base/java.util=ALL-UNNAMED,--add-opens=java.base/java.lang=ALL-UNNAMED,--add-opens=java.base/java.lang.invoke=ALL-UNNAMED,--add-opens=java.prefs/java.util.prefs=ALL-UNNAMED,--add-opens=java.base/java.nio.charset=ALL-UNNAMED,--add-opens=java.base/java.net=ALL-UNNAMED,--add-opens=java.base/java.util.concurrent.atomic=ALL-UNNAMED,-XX:MaxMetaspaceSize=384m,-XX:+HeapDumpOnOutOfMemoryError,-Xms256m,-Xmx512m,-Dfile.encoding=UTF-8,-Duser.country=US,-Duser.language=en,-Duser.variant]} (build should be starting). 2024-09-09T02:45:44.010+0700 [INFO] [org.gradle.launcher.daemon.server.exec.LogToClient] The client will now receive all logging from the daemon (pid: 1431559). The daemon log file: /home/reyuki/.gradle/daemon/8.5/daemon-1431559.out.log 2024-09-09T02:45:44.011+0700 [INFO] [org.gradle.launcher.daemon.server.exec.LogAndCheckHealth] Starting 3rd build in daemon [uptime: 4 mins 38.517 secs, performance: 98%, GC rate: 0.00/s, heap usage: 4% of 512 MiB, non-heap usage: 9% of 384 MiB] 2024-09-09T02:45:44.011+0700 [DEBUG] [org.gradle.launcher.daemon.server.exec.ExecuteBuild] The daemon has started executing the build. 2024-09-09T02:45:44.011+0700 [DEBUG] [org.gradle.launcher.daemon.server.exec.ExecuteBuild] Executing build with daemon context: DefaultDaemonContext[uid=16f1323c-652f-4995-8818-e5335d29bf13,javaHome=/usr/lib/jvm/java-22-openjdk,daemonRegistryDir=/home/reyuki/.gradle/daemon,pid=1431559,idleTimeout=10800000,priority=NORMAL,applyInstrumentationAgent=true,daemonOpts=--add-opens=java.base/java.util=ALL-UNNAMED,--add-opens=java.base/java.lang=ALL-UNNAMED,--add-opens=java.base/java.lang.invoke=ALL-UNNAMED,--add-opens=java.prefs/java.util.prefs=ALL-UNNAMED,--add-opens=java.base/java.nio.charset=ALL-UNNAMED,--add-opens=java.base/java.net=ALL-UNNAMED,--add-opens=java.base/java.util.concurrent.atomic=ALL-UNNAMED,-XX:MaxMetaspaceSize=384m,-XX:+HeapDumpOnOutOfMemoryError,-Xms256m,-Xmx512m,-Dfile.encoding=UTF-8,-Duser.country=US,-Duser.language=en,-Duser.variant] 2024-09-09T02:45:44.012+0700 [INFO] [org.gradle.internal.work.DefaultWorkerLeaseService] Using 16 worker leases. 2024-09-09T02:45:44.012+0700 [DEBUG] [org.gradle.internal.resources.AbstractTrackedResourceLock] Daemon worker Thread 3: acquired lock on worker lease 2024-09-09T02:45:44.012+0700 [DEBUG] [org.gradle.internal.operations.DefaultBuildOperationRunner] Build operation 'Run build' started 2024-09-09T02:45:44.014+0700 [INFO] [org.gradle.internal.watch.registry.impl.WatchableHierarchies] Now considering [/home/reyuki/software/open-source/smali] as hierarchies to watch 2024-09-09T02:45:44.014+0700 [INFO] [org.gradle.tooling.internal.provider.FileSystemWatchingBuildActionRunner] Watching the file system is configured to be enabled if available 2024-09-09T02:45:44.014+0700 [DEBUG] [org.gradle.tooling.internal.provider.FileSystemWatchingBuildActionRunner] Watching the file system computed to be enabled if available 2024-09-09T02:45:44.014+0700 [DEBUG] [org.gradle.internal.operations.DefaultBuildOperationRunner] Build operation 'Build started for file system watching' started 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected proc: /proc from proc (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected sysfs: /sys from sys (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected devtmpfs: /dev from dev (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run from run (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected efivarfs: /sys/firmware/efi/efivars from efivarfs (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected ext4: / from /dev/nvme1n1p3 (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected securityfs: /sys/kernel/security from securityfs (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /dev/shm from tmpfs (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected devpts: /dev/pts from devpts (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected cgroup2: /sys/fs/cgroup from cgroup2 (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected pstore: /sys/fs/pstore from pstore (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected bpf: /sys/fs/bpf from bpf (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected autofs: /proc/sys/fs/binfmt_misc from systemd-1 (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected hugetlbfs: /dev/hugepages from hugetlbfs (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected mqueue: /dev/mqueue from mqueue (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected debugfs: /sys/kernel/debug from none (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tracefs: /sys/kernel/tracing from tracefs (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/credentials/systemd-journald.service from tmpfs (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/credentials/systemd-udev-load-credentials.service from tmpfs (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected fusectl: /sys/fs/fuse/connections from fusectl (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected configfs: /sys/kernel/config from configfs (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/credentials/systemd-tmpfiles-setup-dev-early.service from tmpfs (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/credentials/systemd-sysctl.service from tmpfs (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/credentials/systemd-tmpfiles-setup-dev.service from tmpfs (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /tmp from tmpfs (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected vfat: /boot from /dev/nvme1n1p1 (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/credentials/systemd-tmpfiles-setup.service from tmpfs (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/credentials/systemd-vconsole-setup.service from tmpfs (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/credentials/getty@tty1.service from tmpfs (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tmpfs: /run/user/1000 from tmpfs (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected binfmt_misc: /proc/sys/fs/binfmt_misc from binfmt_misc (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.watch.vfs.impl.DefaultWatchableFileSystemDetector] Detected tracefs: /sys/kernel/debug/tracing from tracefs (remote: false) 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.operations.DefaultBuildOperationRunner] Completing Build operation 'Build started for file system watching' 2024-09-09T02:45:44.015+0700 [DEBUG] [org.gradle.internal.operations.DefaultBuildOperationRunner] Build operation 'Build started for file system watching' completed 2024-09-09T02:45:44.016+0700 [INFO] [org.gradle.tooling.internal.provider.FileSystemWatchingBuildActionRunner] File system watching is active 2024-09-09T02:45:44.016+0700 [DEBUG] [org.gradle.internal.operations.DefaultBuildOperationRunner] Build operation 'Load build' started 2024-09-09T02:45:44.016+0700 [DEBUG] [org.gradle.initialization.properties.DefaultProjectPropertiesLoader] Found env project properties: [] 2024-09-09T02:45:44.016+0700 [DEBUG] [org.gradle.initialization.properties.DefaultProjectPropertiesLoader] Found system project properties: [] 2024-09-09T02:45:44.016+0700 [DEBUG] [org.gradle.internal.operations.DefaultBuildOperationRunner] Build operation 'Evaluate settings' started 2024-09-09T02:45:44.016+0700 [DEBUG] [org.gradle.cache.internal.DefaultCacheCoordinator] Creating new cache for workingDirs, path /home/reyuki/software/open-source/smali/.gradle/8.5/vcsMetadata/workingDirs.bin, access org.gradle.cache.internal.DefaultCacheCoordinator@1d755956 2024-09-09T02:45:44.017+0700 [DEBUG] [org.gradle.cache.internal.DefaultCacheCoordinator] Creating new cache for md5- 2024-09-09T02:46:00.260+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:a0142800000014523cf467c00000002, Subject:CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US, Issuer:CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US, Key type:RSA, Length:4096, Cert Id:2123370772, Valid from:1/17/14, 12:53 AM, Valid until:1/17/34, 12:53 AM 2024-09-09T02:46:00.260+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:b0b75a16485fbfe1cbf58bd719e67d, Subject:CN=Izenpe.com, O=IZENPE S.A., C=ES, Issuer:CN=Izenpe.com, O=IZENPE S.A., C=ES, Key type:RSA, Length:4096, Cert Id:2449386312, Valid from:12/13/07, 8:08 PM, Valid until:12/13/37, 3:27 PM 2024-09-09T02:46:00.260+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:c27e43044e473f19, Subject:EMAILADDRESS=info@e-szigno.hu, CN=Microsec e-Szigno Root CA 2009, O=Microsec Ltd., L=Budapest, C=HU, Issuer:EMAILADDRESS=info@e-szigno.hu, CN=Microsec e-Szigno Root CA 2009, O=Microsec Ltd., L=Budapest, C=HU, Key type:RSA, Length:2048, Cert Id:2391017284, Valid from:6/16/09, 6:30 PM, Valid until:12/30/29, 6:30 PM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:66f23daf87de8bb14aea0c573101c2ec, Subject:CN=Microsoft ECC Root Certificate Authority 2017, O=Microsoft Corporation, C=US, Issuer:CN=Microsoft ECC Root Certificate Authority 2017, O=Microsoft Corporation, C=US, Key type:EC, Length:384, Cert Id:3240761285, Valid from:12/19/19, 6:06 AM, Valid until:7/19/42, 6:16 AM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withRSA, Serial:1ed397095fd8b4b347701eaabe7f45b3, Subject:CN=Microsoft RSA Root Certificate Authority 2017, O=Microsoft Corporation, C=US, Issuer:CN=Microsoft RSA Root Certificate Authority 2017, O=Microsoft Corporation, C=US, Key type:RSA, Length:4096, Cert Id:2848349048, Valid from:12/19/19, 5:51 AM, Valid until:7/19/42, 6:00 AM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withRSA, Serial:194301ea20bddf5c5332ab1434471f8d6504d0d, Subject:CN=NAVER Global Root Certification Authority, O=NAVER BUSINESS PLATFORM Corp., C=KR, Issuer:CN=NAVER Global Root Certification Authority, O=NAVER BUSINESS PLATFORM Corp., C=KR, Key type:RSA, Length:4096, Cert Id:1777546867, Valid from:8/18/17, 3:58 PM, Valid until:8/19/37, 6:59 AM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:49412ce40010, Subject:CN=NetLock Arany (Class Gold) Főtanúsítvány, OU=Tanúsítványkiadók (Certification Services), O=NetLock Kft., L=Budapest, C=HU, Issuer:CN=NetLock Arany (Class Gold) Főtanúsítvány, OU=Tanúsítványkiadók (Certification Services), O=NetLock Kft., L=Budapest, C=HU, Key type:RSA, Length:2048, Cert Id:58541246, Valid from:12/11/08, 10:08 PM, Valid until:12/6/28, 10:08 PM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:76b1205274f0858746b3f8231af6c2c0, Subject:CN=OISTE WISeKey Global Root GB CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH, Issuer:CN=OISTE WISeKey Global Root GB CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH, Key type:RSA, Length:2048, Cert Id:3681485780, Valid from:12/1/14, 10:00 PM, Valid until:12/1/39, 10:10 PM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:212a560caeda0cab4045bf2ba22d3aea, Subject:CN=OISTE WISeKey Global Root GC CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH, Issuer:CN=OISTE WISeKey Global Root GC CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH, Key type:EC, Length:384, Cert Id:2781801839, Valid from:5/9/17, 4:48 PM, Valid until:5/9/42, 4:58 PM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:78585f2ead2c194be3370735341328b596d46593, Subject:CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:3532531262, Valid from:1/13/12, 12:27 AM, Valid until:1/13/42, 12:27 AM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:509, Subject:CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:338250116, Valid from:11/25/06, 1:27 AM, Valid until:11/25/31, 1:23 AM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:445734245b81899b35f2ceb82b3b5ba726f07528, Subject:CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:696763521, Valid from:1/13/12, 1:59 AM, Valid until:1/13/42, 1:59 AM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:5c6, Subject:CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:1470392860, Valid from:11/25/06, 2:11 AM, Valid until:11/25/31, 2:06 AM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:2ef59b0228a7db7affd5a3a9eebd03a0cf126a1d, Subject:CN=QuoVadis Root CA 3 G3, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 3 G3, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:3589344305, Valid from:1/13/12, 3:26 AM, Valid until:1/13/42, 3:26 AM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withECDSA, Serial:2c299c5b16ed0595, Subject:CN=SSL.com EV Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US, Issuer:CN=SSL.com EV Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US, Key type:EC, Length:384, Cert Id:1789254518, Valid from:2/13/16, 1:15 AM, Valid until:2/13/41, 1:15 AM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:56b629cd34bc78f6, Subject:CN=SSL.com EV Root Certification Authority RSA R2, O=SSL Corporation, L=Houston, ST=Texas, C=US, Issuer:CN=SSL.com EV Root Certification Authority RSA R2, O=SSL Corporation, L=Houston, ST=Texas, C=US, Key type:RSA, Length:4096, Cert Id:1381862403, Valid from:6/1/17, 1:14 AM, Valid until:5/31/42, 1:14 AM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withECDSA, Serial:75e6dfcbc1685ba8, Subject:CN=SSL.com Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US, Issuer:CN=SSL.com Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US, Key type:EC, Length:384, Cert Id:2926673683, Valid from:2/13/16, 1:14 AM, Valid until:2/13/41, 1:14 AM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:7b2c9bd316803299, Subject:CN=SSL.com Root Certification Authority RSA, O=SSL Corporation, L=Houston, ST=Texas, C=US, Issuer:CN=SSL.com Root Certification Authority RSA, O=SSL Corporation, L=Houston, ST=Texas, C=US, Key type:RSA, Length:4096, Cert Id:156725711, Valid from:2/13/16, 12:39 AM, Valid until:2/13/41, 12:39 AM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:1403f5abfb378b17405be243b2a5d1c4, Subject:CN=SSL.com TLS ECC Root CA 2022, O=SSL Corporation, C=US, Issuer:CN=SSL.com TLS ECC Root CA 2022, O=SSL Corporation, C=US, Key type:EC, Length:384, Cert Id:683561703, Valid from:8/25/22, 11:33 PM, Valid until:8/19/46, 11:33 PM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:6fbedaad73bd0840e28b4dbed4f75b91, Subject:CN=SSL.com TLS RSA Root CA 2022, O=SSL Corporation, C=US, Issuer:CN=SSL.com TLS RSA Root CA 2022, O=SSL Corporation, C=US, Key type:RSA, Length:4096, Cert Id:556880013, Valid from:8/25/22, 11:34 PM, Valid until:8/19/46, 11:34 PM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:3e8a5d07ec55d232d5b7e3b65f01eb2ddce4d6e4, Subject:CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL, Issuer:CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL, Key type:RSA, Length:2048, Cert Id:381279303, Valid from:10/19/15, 2:43 PM, Valid until:10/19/35, 2:43 PM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:42f2ccda1b6937445f15fe752810b8f4, Subject:CN=Sectigo Public Server Authentication Root E46, O=Sectigo Limited, C=GB, Issuer:CN=Sectigo Public Server Authentication Root E46, O=Sectigo Limited, C=GB, Key type:EC, Length:384, Cert Id:3789385269, Valid from:3/22/21, 7:00 AM, Valid until:3/22/46, 6:59 AM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withRSA, Serial:758dfd8bae7c0700faa925a7e1c7ad14, Subject:CN=Sectigo Public Server Authentication Root R46, O=Sectigo Limited, C=GB, Issuer:CN=Sectigo Public Server Authentication Root R46, O=Sectigo Limited, C=GB, Key type:RSA, Length:4096, Cert Id:3806652169, Valid from:3/22/21, 7:00 AM, Valid until:3/22/46, 6:59 AM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:1, Subject:CN=SecureSign RootCA11, O="Japan Certification Services, Inc.", C=JP, Issuer:CN=SecureSign RootCA11, O="Japan Certification Services, Inc.", C=JP, Key type:RSA, Length:2048, Cert Id:2079057034, Valid from:4/8/09, 11:56 AM, Valid until:4/8/29, 11:56 AM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:cf08e5c0816a5ad427ff0eb271859d0, Subject:CN=SecureTrust CA, O=SecureTrust Corporation, C=US, Issuer:CN=SecureTrust CA, O=SecureTrust Corporation, C=US, Key type:RSA, Length:2048, Cert Id:2034155325, Valid from:11/8/06, 2:31 AM, Valid until:1/1/30, 2:40 AM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:75622a4e8d48a894df413c8f0f8eaa5, Subject:CN=Secure Global CA, O=SecureTrust Corporation, C=US, Issuer:CN=Secure Global CA, O=SecureTrust Corporation, C=US, Key type:RSA, Length:2048, Cert Id:2818194321, Valid from:11/8/06, 2:42 AM, Valid until:1/1/30, 2:52 AM 2024-09-09T02:46:00.261+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:d65d9bb378812eeb, Subject:CN=Security Communication ECC RootCA1, O="SECOM Trust Systems CO.,LTD.", C=JP, Issuer:CN=Security Communication ECC RootCA1, O="SECOM Trust Systems CO.,LTD.", C=JP, Key type:EC, Length:384, Cert Id:2131361491, Valid from:6/16/16, 12:15 PM, Valid until:1/18/38, 12:15 PM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:0, Subject:OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP, Issuer:OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP, Key type:RSA, Length:2048, Cert Id:1521072570, Valid from:5/29/09, 12:00 PM, Valid until:5/29/29, 12:00 PM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withRSA, Serial:e17c3740fd1bfe67, Subject:CN=Security Communication RootCA3, O="SECOM Trust Systems CO.,LTD.", C=JP, Issuer:CN=Security Communication RootCA3, O="SECOM Trust Systems CO.,LTD.", C=JP, Key type:RSA, Length:4096, Cert Id:3804693758, Valid from:6/16/16, 1:17 PM, Valid until:1/18/38, 1:17 PM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:0, Subject:OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US, Issuer:OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US, Key type:RSA, Length:2048, Cert Id:1825617644, Valid from:6/30/04, 12:39 AM, Valid until:6/30/34, 12:39 AM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:0, Subject:CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US, Issuer:CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US, Key type:RSA, Length:2048, Cert Id:3268325709, Valid from:9/1/09, 7:00 AM, Valid until:1/1/38, 6:59 AM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:0, Subject:CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US, Issuer:CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US, Key type:RSA, Length:2048, Cert Id:1964785574, Valid from:9/1/09, 7:00 AM, Valid until:1/1/38, 6:59 AM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:bb401c43f55e4fb0, Subject:CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH, Issuer:CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH, Key type:RSA, Length:4096, Cert Id:1516221943, Valid from:10/25/06, 3:30 PM, Valid until:10/25/36, 3:30 PM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:4f1bd42f54bb2f4b, Subject:CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH, Issuer:CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH, Key type:RSA, Length:4096, Cert Id:126726124, Valid from:10/25/06, 3:32 PM, Valid until:10/25/36, 3:32 PM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:1, Subject:CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE, Issuer:CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE, Key type:RSA, Length:2048, Cert Id:3056503257, Valid from:10/1/08, 5:40 PM, Valid until:10/2/33, 6:59 AM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:1, Subject:CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE, Issuer:CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE, Key type:RSA, Length:2048, Cert Id:1894096264, Valid from:10/1/08, 5:29 PM, Valid until:10/2/33, 6:59 AM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:1, Subject:CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1, OU=Kamu Sertifikasyon Merkezi - Kamu SM, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, L=Gebze - Kocaeli, C=TR, Issuer:CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1, OU=Kamu Sertifikasyon Merkezi - Kamu SM, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, L=Gebze - Kocaeli, C=TR, Key type:RSA, Length:2048, Cert Id:1093603654, Valid from:11/25/13, 3:25 PM, Valid until:10/25/43, 3:25 PM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:cbe, Subject:CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW, Issuer:CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW, Key type:RSA, Length:4096, Cert Id:861175838, Valid from:6/27/12, 1:28 PM, Valid until:12/31/30, 10:59 PM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:1, Subject:CN=TWCA Root Certification Authority, OU=Root CA, O=TAIWAN-CA, C=TW, Issuer:CN=TWCA Root Certification Authority, OU=Root CA, O=TAIWAN-CA, C=TW, Key type:RSA, Length:2048, Cert Id:2652873033, Valid from:8/28/08, 2:24 PM, Valid until:12/31/30, 10:59 PM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:363a968cc95cb258cdd0015dc5e55700, Subject:CN=Telekom Security TLS ECC Root 2020, O=Deutsche Telekom Security GmbH, C=DE, Issuer:CN=Telekom Security TLS ECC Root 2020, O=Deutsche Telekom Security GmbH, C=DE, Key type:EC, Length:384, Cert Id:771592905, Valid from:8/25/20, 2:48 PM, Valid until:8/26/45, 6:59 AM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withRSA, Serial:219c542de8f6ec7177fa4ee8c3705797, Subject:CN=Telekom Security TLS RSA Root 2023, O=Deutsche Telekom Security GmbH, C=DE, Issuer:CN=Telekom Security TLS RSA Root 2023, O=Deutsche Telekom Security GmbH, C=DE, Key type:RSA, Length:4096, Cert Id:2296218035, Valid from:3/28/23, 7:16 PM, Valid until:3/28/48, 6:59 AM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:95be16a0f72e46f17b398272fa8bcd96, Subject:CN=TeliaSonera Root CA v1, O=TeliaSonera, Issuer:CN=TeliaSonera Root CA v1, O=TeliaSonera, Key type:RSA, Length:4096, Cert Id:1495358374, Valid from:10/18/07, 7:00 PM, Valid until:10/18/32, 7:00 PM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:1675f27d6fe7ae3e4acbe095b059e, Subject:CN=Telia Root CA v2, O=Telia Finland Oyj, C=FI, Issuer:CN=Telia Root CA v2, O=Telia Finland Oyj, C=FI, Key type:RSA, Length:4096, Cert Id:3473063976, Valid from:11/29/18, 6:55 PM, Valid until:11/29/43, 6:55 PM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withRSA, Serial:64f60e6577616aab3bb4ea8584bbb189b871930f, Subject:CN=TrustAsia Global Root CA G3, O="TrustAsia Technologies, Inc.", C=CN, Issuer:CN=TrustAsia Global Root CA G3, O="TrustAsia Technologies, Inc.", C=CN, Key type:RSA, Length:4096, Cert Id:3528443285, Valid from:5/20/21, 9:10 AM, Valid until:5/19/46, 9:10 AM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:4f2364b88e97639ec65381c1764ecb2a7415d6d7, Subject:CN=TrustAsia Global Root CA G4, O="TrustAsia Technologies, Inc.", C=CN, Issuer:CN=TrustAsia Global Root CA G4, O="TrustAsia Technologies, Inc.", C=CN, Key type:EC, Length:384, Cert Id:3167719659, Valid from:5/20/21, 9:10 AM, Valid until:5/19/46, 9:10 AM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:5f70e86da49f346352ebab2, Subject:CN=Trustwave Global Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Issuer:CN=Trustwave Global Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Key type:RSA, Length:4096, Cert Id:416366836, Valid from:8/24/17, 2:34 AM, Valid until:8/24/42, 2:34 AM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withECDSA, Serial:d6a5f083f285c3e5195df5d, Subject:CN=Trustwave Global ECC P256 Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Issuer:CN=Trustwave Global ECC P256 Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Key type:EC, Length:256, Cert Id:948272517, Valid from:8/24/17, 2:35 AM, Valid until:8/24/42, 2:35 AM 2024-09-09T02:46:00.262+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:8bd85976c9927a48068473b, Subject:CN=Trustwave Global ECC P384 Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Issuer:CN=Trustwave Global ECC P384 Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Key type:EC, Length:384, Cert Id:2301042373, Valid from:8/24/17, 2:36 AM, Valid until:8/24/42, 2:36 AM 2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:1302d5e2404c92468616675db4bbbbb26b3efc13, Subject:CN=TunTrust Root CA, O=Agence Nationale de Certification Electronique, C=TN, Issuer:CN=TunTrust Root CA, O=Agence Nationale de Certification Electronique, C=TN, Key type:RSA, Length:4096, Cert Id:1973181427, Valid from:4/26/19, 3:57 PM, Valid until:4/26/44, 3:57 PM 2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:4fd22b8ff564c8339e4f345866237060, Subject:CN=UCA Extended Validation Root, O=UniTrust, C=CN, Issuer:CN=UCA Extended Validation Root, O=UniTrust, C=CN, Key type:RSA, Length:4096, Cert Id:649181271, Valid from:3/13/15, 7:00 AM, Valid until:12/31/38, 7:00 AM 2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:5ddfb1da5aa3ed5dbe5a6520650390ef, Subject:CN=UCA Global G2 Root, O=UniTrust, C=CN, Issuer:CN=UCA Global G2 Root, O=UniTrust, C=CN, Key type:RSA, Length:4096, Cert Id:1844967193, Valid from:3/11/16, 7:00 AM, Valid until:12/31/40, 7:00 AM 2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:5c8b99c55a94c5d27156decd8980cc26, Subject:CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US, Issuer:CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US, Key type:EC, Length:384, Cert Id:3329287386, Valid from:2/1/10, 7:00 AM, Valid until:1/19/38, 6:59 AM 2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withRSA, Serial:1fd6d30fca3ca51a81bbc640e35032d, Subject:CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US, Issuer:CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US, Key type:RSA, Length:4096, Cert Id:3947601401, Valid from:2/1/10, 7:00 AM, Valid until:1/19/38, 6:59 AM 2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:50946cec18ead59c4dd597ef758fa0ad, Subject:CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, OU=www.xrampsecurity.com, C=US, Issuer:CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, OU=www.xrampsecurity.com, C=US, Key type:RSA, Length:2048, Cert Id:3342493210, Valid from:11/2/04, 12:14 AM, Valid until:1/1/35, 12:37 PM 2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:200605167002, Subject:OU=certSIGN ROOT CA, O=certSIGN, C=RO, Issuer:OU=certSIGN ROOT CA, O=certSIGN, C=RO, Key type:RSA, Length:2048, Cert Id:4005006620, Valid from:7/5/06, 12:20 AM, Valid until:7/5/31, 12:20 AM 2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:110034b64ec6362d36, Subject:OU=certSIGN ROOT CA G2, O=CERTSIGN SA, C=RO, Issuer:OU=certSIGN ROOT CA G2, O=CERTSIGN SA, C=RO, Key type:RSA, Length:4096, Cert Id:2181086866, Valid from:2/6/17, 4:27 PM, Valid until:2/6/42, 4:27 PM 2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withECDSA, Serial:15448ef21fd97590df5040a, Subject:CN=e-Szigno Root CA 2017, OID.2.5.4.97=VATHU-23584497, O=Microsec Ltd., L=Budapest, C=HU, Issuer:CN=e-Szigno Root CA 2017, OID.2.5.4.97=VATHU-23584497, O=Microsec Ltd., L=Budapest, C=HU, Key type:EC, Length:256, Cert Id:3303793581, Valid from:8/22/17, 7:07 PM, Valid until:8/22/42, 7:07 PM 2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA1withRSA, Serial:15c8bd65475cafb897005ee406d2bc9d, Subject:OU=ePKI Root Certification Authority, O="Chunghwa Telecom Co., Ltd.", C=TW, Issuer:OU=ePKI Root Certification Authority, O="Chunghwa Telecom Co., Ltd.", C=TW, Key type:RSA, Length:4096, Cert Id:3632331159, Valid from:12/20/04, 9:31 AM, Valid until:12/20/34, 9:31 AM 2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:7b71b68256b8127c9ca8, Subject:CN=emSign ECC Root CA - C3, O=eMudhra Inc, OU=emSign PKI, C=US, Issuer:CN=emSign ECC Root CA - C3, O=eMudhra Inc, OU=emSign PKI, C=US, Key type:EC, Length:384, Cert Id:3346510540, Valid from:2/19/18, 1:30 AM, Valid until:2/19/43, 1:30 AM 2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:3cf607a968700eda8b84, Subject:CN=emSign ECC Root CA - G3, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN, Issuer:CN=emSign ECC Root CA - G3, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN, Key type:EC, Length:384, Cert Id:3832035707, Valid from:2/19/18, 1:30 AM, Valid until:2/19/43, 1:30 AM 2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:aecf00bac4cf32f843b2, Subject:CN=emSign Root CA - C1, O=eMudhra Inc, OU=emSign PKI, C=US, Issuer:CN=emSign Root CA - C1, O=eMudhra Inc, OU=emSign PKI, C=US, Key type:RSA, Length:2048, Cert Id:3026103940, Valid from:2/19/18, 1:30 AM, Valid until:2/19/43, 1:30 AM 2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:31f5e4620c6c58edd6d8, Subject:CN=emSign Root CA - G1, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN, Issuer:CN=emSign Root CA - G1, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN, Key type:RSA, Length:2048, Cert Id:392709196, Valid from:2/19/18, 1:30 AM, Valid until:2/19/43, 1:30 AM 2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA384withECDSA, Serial:6e6abc59aa53be983967a2d26ba43be66d1cd6da, Subject:CN=vTrus ECC Root CA, O="iTrusChina Co.,Ltd.", C=CN, Issuer:CN=vTrus ECC Root CA, O="iTrusChina Co.,Ltd.", C=CN, Key type:EC, Length:384, Cert Id:268503342, Valid from:7/31/18, 2:26 PM, Valid until:7/31/43, 2:26 PM 2024-09-09T02:46:00.263+0700 [DEBUG] [jdk.event.security] X509Certificate: Alg:SHA256withRSA, Serial:43e37113d8b359145db7ce8cfd35fd6fbc058d45, Subject:CN=vTrus Root CA, O="iTrusChina Co.,Ltd.", C=CN, Issuer:CN=vTrus Root CA, O="iTrusChina Co.,Ltd.", C=CN, Key type:RSA, Length:4096, Cert Id:2469083546, Valid from:7/31/18, 2:24 PM, Valid until:7/31/43, 2:24 PM 2024-09-09T02:46:00.266+0700 [DEBUG] [jdk.event.security] TLSHandshake: scans-in.gradle.com:443, TLSv1.3, TLS_AES_256_GCM_SHA384, 149913401 2024-09-09T02:46:00.266+0700 [DEBUG] [sun.net.www.protocol.http.HttpURLConnection] sun.net.www.MessageHeader@7880e41f 11 pairs: {POST /scans/publish/gradle/3.15.1/token HTTP/1.1: null}{X-Request-Id: acc6cd8c-26d1-4581-8c40-89567f8752cf}{Accept-Encoding: gzip}{Content-Type: application/vnd.gradle.scan-token-request+json}{Cache-Control: no-cache}{Pragma: no-cache}{User-Agent: Java/22.0.2}{Host: scans-in.gradle.com}{Accept: */*}{Connection: close}{Content-Length: 147} 2024-09-09T02:46:00.581+0700 [DEBUG] [sun.net.www.protocol.http.HttpURLConnection] sun.net.www.MessageHeader@4b4c0c03 16 pairs: {null: HTTP/1.1 200 OK}{Date: Sun, 08 Sep 2024 19:46:00 GMT}{Content-Type: application/vnd.gradle.scan-ack+json}{Transfer-Encoding: chunked}{Connection: close}{cache-control: no-cache, no-store, must-revalidate}{pragma: no-cache}{expires: 0}{x-content-type-options: nosniff}{x-frame-options: deny}{strict-transport-security: max-age=31536000; includeSubDomains; preload}{x-xss-protection: 1; mode=block}{content-encoding: gzip}{CF-Cache-Status: DYNAMIC}{Server: cloudflare}{CF-RAY: 8c01712fbb833579-CGK} 2024-09-09T02:46:00.696+0700 [QUIET] [com.gradle.enterprise.gradleplugin.GradleEnterprisePlugin] https://gradle.com/s/p7rnyxjrgeahq 2024-09-09T02:46:00.696+0700 [QUIET] [com.gradle.enterprise.gradleplugin.GradleEnterprisePlugin] 2024-09-09T02:46:00.697+0700 [DEBUG] [com.gradle.enterprise.gradleplugin.GradleEnterprisePlugin] Failed to visit file /home/reyuki/.gradle/build-scan-data/3.15.1 java.nio.file.NoSuchFileException: /home/reyuki/.gradle/build-scan-data/3.15.1 at java.base/sun.nio.fs.UnixException.translateToIOException(UnixException.java:92) at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:106) at java.base/sun.nio.fs.UnixException.rethrowAsIOException(UnixException.java:111) at java.base/sun.nio.fs.UnixFileAttributeViews$Basic.readAttributes(UnixFileAttributeViews.java:56) at java.base/sun.nio.fs.UnixFileSystemProvider.readAttributes(UnixFileSystemProvider.java:171) at java.base/sun.nio.fs.LinuxFileSystemProvider.readAttributes(LinuxFileSystemProvider.java:99) at java.base/java.nio.file.Files.readAttributes(Files.java:1858) at java.base/java.nio.file.FileTreeWalker.getAttributes(FileTreeWalker.java:220) at java.base/java.nio.file.FileTreeWalker.visit(FileTreeWalker.java:277) at java.base/java.nio.file.FileTreeWalker.walk(FileTreeWalker.java:323) at java.base/java.nio.file.Files.walkFileTree(Files.java:2784) at java.base/java.nio.file.Files.walkFileTree(Files.java:2862) at com.gradle.scan.plugin.internal.e.a.a(SourceFile:78) at com.gradle.scan.plugin.internal.e.a.b(SourceFile:62) at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:317) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1144) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:642) at java.base/java.lang.Thread.run(Thread.java:1570) 2024-09-09T02:46:00.698+0700 [DEBUG] [org.gradle.cache.internal.LockOnDemandCrossProcessCacheAccess] Releasing file lock for cache directory md-supplier (/home/reyuki/.gradle/caches/8.5/md-supplier) 2024-09-09T02:46:00.698+0700 [DEBUG] [org.gradle.cache.internal.DefaultFileLockManager] Releasing lock on cache directory md-supplier (/home/reyuki/.gradle/caches/8.5/md-supplier). 2024-09-09T02:46:00.698+0700 [DEBUG] [org.gradle.cache.internal.LockOnDemandCrossProcessCacheAccess] Releasing file lock for cache directory md-rule (/home/reyuki/.gradle/caches/8.5/md-rule) 2024-09-09T02:46:00.698+0700 [DEBUG] [org.gradle.cache.internal.DefaultFileLockManager] Releasing lock on cache directory md-rule (/home/reyuki/.gradle/caches/8.5/md-rule). 2024-09-09T02:46:00.726+0700 [DEBUG] [org.gradle.api.internal.artifacts.ivyservice.resolveengine.store.CachedStoreFactory] Resolution result cache closed. Cache reads: 0, disk reads: 0 (avg: 0.0 secs, total: 0.0 secs) 2024-09-09T02:46:00.726+0700 [DEBUG] [org.gradle.api.internal.artifacts.ivyservice.resolveengine.store.CachedStoreFactory] Resolution result cache closed. Cache reads: 0, disk reads: 2 (avg: 0.0 secs, total: 0.001 secs) 2024-09-09T02:46:00.726+0700 [DEBUG] [org.gradle.api.internal.artifacts.ivyservice.resolveengine.store.ResolutionResultsStoreFactory] Deleted 2 resolution results binary files in 0.027 secs 2024-09-09T02:46:00.726+0700 [DEBUG] [org.gradle.internal.operations.DefaultBuildOperationRunner] Completing Build operation 'Run build' 2024-09-09T02:46:00.726+0700 [DEBUG] [org.gradle.internal.operations.DefaultBuildOperationRunner] Build operation 'Run build' completed 2024-09-09T02:46:00.726+0700 [DEBUG] [org.gradle.internal.resources.AbstractTrackedResourceLock] Daemon worker Thread 3: released lock on worker lease 2024-09-09T02:46:00.730+0700 [DEBUG] [org.gradle.deployment.internal.DefaultDeploymentRegistry] Stopping 0 deployment handles 2024-09-09T02:46:00.731+0700 [DEBUG] [org.gradle.deployment.internal.DefaultDeploymentRegistry] Stopped deployment handles 2024-09-09T02:46:00.731+0700 [DEBUG] [org.gradle.cache.internal.DefaultPersistentDirectoryStore] VCS Checkout Cache (/home/reyuki/software/open-source/smali/.gradle/vcs-1) has last been fully cleaned up 0 hours ago 2024-09-09T02:46:00.731+0700 [DEBUG] [org.gradle.cache.internal.DefaultCacheCoordinator] Cache VCS Checkout Cache (/home/reyuki/software/open-source/smali/.gradle/vcs-1) was closed 0 times. 2024-09-09T02:46:00.731+0700 [DEBUG] [org.gradle.cache.internal.DefaultCacheCoordinator] Cache VCS metadata (/home/reyuki/software/open-source/smali/.gradle/8.5/vcsMetadata) was closed 0 times. 2024-09-09T02:46:00.731+0700 [DEBUG] [org.gradle.cache.internal.LockOnDemandCrossProcessCacheAccess] Releasing file lock for checksums cache (/home/reyuki/software/open-source/smali/.gradle/8.5/checksums) 2024-09-09T02:46:00.731+0700 [DEBUG] [org.gradle.cache.internal.btree.BTreePersistentIndexedCache] Closing cache md5-checksums.bin (/home/reyuki/software/open-source/smali/.gradle/8.5/checksums/md5-checksums.bin) 2024-09-09T02:46:00.731+0700 [DEBUG] [org.gradle.cache.internal.btree.BTreePersistentIndexedCache] Closing cache sha1-checksums.bin (/home/reyuki/software/open-source/smali/.gradle/8.5/checksums/sha1-checksums.bin) 2024-09-09T02:46:00.731+0700 [DEBUG] [org.gradle.cache.internal.DefaultFileLockManager] Releasing lock on checksums cache (/home/reyuki/software/open-source/smali/.gradle/8.5/checksums). 2024-09-09T02:46:00.732+0700 [DEBUG] [org.gradle.cache.internal.LockOnDemandCrossProcessCacheAccess] Releasing file lock for file hash cache (/home/reyuki/software/open-source/smali/.gradle/8.5/fileHashes) 2024-09-09T02:46:00.732+0700 [DEBUG] [org.gradle.cache.internal.DefaultFileLockManager] Releasing lock on file hash cache (/home/reyuki/software/open-source/smali/.gradle/8.5/fileHashes). 2024-09-09T02:46:00.736+0700 [DEBUG] [org.gradle.launcher.daemon.server.exec.ExecuteBuild] The daemon has finished executing the build. 2024-09-09T02:46:00.749+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClientInputForwarder] Dispatching close input message: org.gradle.launcher.daemon.protocol.CloseInput@7bd42e64 2024-09-09T02:46:00.749+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClientConnection] thread 35: dispatching class org.gradle.launcher.daemon.protocol.CloseInput 2024-09-09T02:46:00.749+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClient] Received result Success[value=org.gradle.launcher.exec.BuildActionResult@3bcbb589] from daemon DaemonInfo{pid=1431559, address=[0b09c4a3-c555-4839-b769-319c53acf663 port:37547, addresses:[/127.0.0.1]], state=Idle, lastBusy=1725824592680, context=DefaultDaemonContext[uid=16f1323c-652f-4995-8818-e5335d29bf13,javaHome=/usr/lib/jvm/java-22-openjdk,daemonRegistryDir=/home/reyuki/.gradle/daemon,pid=1431559,idleTimeout=10800000,priority=NORMAL,applyInstrumentationAgent=true,daemonOpts=--add-opens=java.base/java.util=ALL-UNNAMED,--add-opens=java.base/java.lang=ALL-UNNAMED,--add-opens=java.base/java.lang.invoke=ALL-UNNAMED,--add-opens=java.prefs/java.util.prefs=ALL-UNNAMED,--add-opens=java.base/java.nio.charset=ALL-UNNAMED,--add-opens=java.base/java.net=ALL-UNNAMED,--add-opens=java.base/java.util.concurrent.atomic=ALL-UNNAMED,-XX:MaxMetaspaceSize=384m,-XX:+HeapDumpOnOutOfMemoryError,-Xms256m,-Xmx512m,-Dfile.encoding=UTF-8,-Duser.country=US,-Duser.language=en,-Duser.variant]} (build should be done). 2024-09-09T02:46:00.749+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClientConnection] thread 1: dispatching class org.gradle.launcher.daemon.protocol.Finished 2024-09-09T02:46:00.749+0700 [DEBUG] [org.gradle.launcher.daemon.client.DaemonClientConnection] thread 1: connection stop 2024-09-09T02:46:00.750+0700 [LIFECYCLE] [org.gradle.launcher.cli.DebugLoggerWarningAction] ############################################################################# WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING Debug level logging will leak security sensitive information! For more details, please refer to https://docs.gradle.org/8.5/userguide/logging.html#sec:debug_security in the Gradle documentation. #############################################################################