Skip to main content

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [List Home]
[cf-dev] Build failed in Jenkins: 2.0.x #403

See <https://ci.eclipse.org/californium/job/2.0.x/403/display/redirect?page=changes>

Changes:

[Achim Kraus] Fix issue #560

[Achim Kraus] Send extension in SERVER_HELLO only, if contained in CLIENT_HELLO.

------------------------------------------
[...truncated 94.30 KB...]
08:16:47.419 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:16:47.421 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:16:47.423 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:16:47.425 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:16:47.468 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:16:47.472 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.815 s - in org.eclipse.californium.elements.tcp.TlsConnectorTest
[INFO] Running org.eclipse.californium.elements.tcp.TlsCorrelationTest
client C=CA, L=Ottawa, O=Eclipse IoT, OU=Californium, CN=cf-client: 1
   sun.security.ssl.SunX509KeyManagerImpl@7a94f797
server C=CA, L=Ottawa, O=Eclipse IoT, OU=Californium, CN=cf-server: 1
   sun.security.ssl.SunX509KeyManagerImpl@4a0b1960
trusts: 1
   sun.security.ssl.X509TrustManagerImpl@1eaf139a
      C=CA,L=Ottawa,O=Eclipse IoT,OU=Californium,CN=cf-ca
      C=CA,L=Ottawa,O=Eclipse IoT,OU=Californium,CN=cf-root
keys : 1
   sun.security.ssl.SunX509KeyManagerImpl@4a02ea9
trusts: 1
   sun.security.ssl.X509TrustManagerImpl@30575b9e
      C=CA,L=Ottawa,O=Eclipse IoT,OU=Californium,CN=cf-ca
      C=CA,L=Ottawa,O=Eclipse IoT,OU=Californium,CN=cf-root
08:16:47.544 ERROR [CloseOnErrorHandler]: Security Exception in channel handler chain for endpoint /127.0.0.1:49978. Closing connection. (o.e.c.e.t.CloseOnErrorHandler.exceptionCaught:57)
javax.net.ssl.SSLHandshakeException: certificate verify message signature error
	at sun.security.ssl.Alerts.getSSLException(Alerts.java:192)
	at sun.security.ssl.SSLEngineImpl.fatal(SSLEngineImpl.java:1639)
	at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:281)
	at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:269)
	at sun.security.ssl.ServerHandshaker.clientCertificateVerify(ServerHandshaker.java:1428)
	at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:238)
	at sun.security.ssl.Handshaker.processLoop(Handshaker.java:913)
	at sun.security.ssl.Handshaker$1.run(Handshaker.java:853)
	at sun.security.ssl.Handshaker$1.run(Handshaker.java:851)
	at java.security.AccessController.doPrivileged(Native Method)
	at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1285)
	at io.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1364)
	at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1272)
	at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1127)
	at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1162)
	at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:489)
	at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:428)
	at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:265)
	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362)
	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348)
	at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:340)
	at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1359)
	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362)
	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348)
	at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:935)
	at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:134)
	at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:645)
	at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:580)
	at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:497)
	at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:459)
	at io.netty.util.concurrent.SingleThreadEventExecutor$5.run(SingleThreadEventExecutor.java:858)
	at io.netty.util.concurrent.DefaultThreadFactory$DefaultRunnableDecorator.run(DefaultThreadFactory.java:138)
	at java.lang.Thread.run(Thread.java:745)
08:16:47.544 ERROR [CloseOnErrorHandler]: Security Exception in channel handler chain for endpoint localhost/127.0.0.1:36683. Closing connection. (o.e.c.e.t.CloseOnErrorHandler.exceptionCaught:57)
javax.net.ssl.SSLException: Received fatal alert: bad_certificate
	at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
	at sun.security.ssl.SSLEngineImpl.fatal(SSLEngineImpl.java:1639)
	at sun.security.ssl.SSLEngineImpl.fatal(SSLEngineImpl.java:1607)
	at sun.security.ssl.SSLEngineImpl.recvAlert(SSLEngineImpl.java:1776)
	at sun.security.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:1068)
	at sun.security.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:890)
	at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:764)
	at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:624)
	at io.netty.handler.ssl.SslHandler$SslEngineType$3.unwrap(SslHandler.java:281)
	at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1215)
	at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1127)
	at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1162)
	at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:489)
	at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:428)
	at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:265)
	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362)
	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348)
	at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:340)
	at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1359)
	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362)
	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348)
	at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:935)
	at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:134)
	at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:645)
	at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:580)
	at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:497)
	at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:459)
	at io.netty.util.concurrent.SingleThreadEventExecutor$5.run(SingleThreadEventExecutor.java:858)
	at io.netty.util.concurrent.DefaultThreadFactory$DefaultRunnableDecorator.run(DefaultThreadFactory.java:138)
	at java.lang.Thread.run(Thread.java:745)
keys : 1
   sun.security.ssl.SunX509KeyManagerImpl@36ddb12d
trusts: 1
   sun.security.ssl.X509TrustManagerImpl@149b1d7f
      C=CA,L=Ottawa,O=Eclipse IoT,OU=Californium,CN=cf-ca
      C=CA,L=Ottawa,O=Eclipse IoT,OU=Californium,CN=cf-root
08:16:49.530 ERROR [CloseOnErrorHandler]: Security Exception in channel handler chain for endpoint localhost/127.0.0.1:47937. Closing connection. (o.e.c.e.t.CloseOnErrorHandler.exceptionCaught:57)
javax.net.ssl.SSLKeyException: Invalid signature on ECDH server key exchange message
	at sun.security.ssl.HandshakeMessage$ECDH_ServerKeyExchange.<init>(HandshakeMessage.java:1098)
	at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:274)
	at sun.security.ssl.Handshaker.processLoop(Handshaker.java:913)
	at sun.security.ssl.Handshaker$1.run(Handshaker.java:853)
	at sun.security.ssl.Handshaker$1.run(Handshaker.java:851)
	at java.security.AccessController.doPrivileged(Native Method)
	at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1285)
	at io.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1364)
	at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1272)
	at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1127)
	at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1162)
	at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:489)
	at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:428)
	at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:265)
	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362)
	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348)
	at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:340)
	at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1359)
	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362)
	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348)
	at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:935)
	at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:134)
	at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:645)
	at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:580)
	at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:497)
	at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:459)
	at io.netty.util.concurrent.SingleThreadEventExecutor$5.run(SingleThreadEventExecutor.java:858)
	at io.netty.util.concurrent.DefaultThreadFactory$DefaultRunnableDecorator.run(DefaultThreadFactory.java:138)
	at java.lang.Thread.run(Thread.java:745)
08:16:49.531 ERROR [CloseOnErrorHandler]: Security Exception in channel handler chain for endpoint /127.0.0.1:38603. Closing connection. (o.e.c.e.t.CloseOnErrorHandler.exceptionCaught:57)
javax.net.ssl.SSLException: Received fatal alert: internal_error
	at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
	at sun.security.ssl.SSLEngineImpl.fatal(SSLEngineImpl.java:1639)
	at sun.security.ssl.SSLEngineImpl.fatal(SSLEngineImpl.java:1607)
	at sun.security.ssl.SSLEngineImpl.recvAlert(SSLEngineImpl.java:1776)
	at sun.security.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:1068)
	at sun.security.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:890)
	at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:764)
	at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:624)
	at io.netty.handler.ssl.SslHandler$SslEngineType$3.unwrap(SslHandler.java:281)
	at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1215)
	at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1127)
	at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1162)
	at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:489)
	at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:428)
	at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:265)
	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362)
	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348)
	at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:340)
	at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1359)
	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362)
	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348)
	at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:935)
	at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:134)
	at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:645)
	at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:580)
	at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:497)
	at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:459)
	at io.netty.util.concurrent.SingleThreadEventExecutor$5.run(SingleThreadEventExecutor.java:858)
	at io.netty.util.concurrent.DefaultThreadFactory$DefaultRunnableDecorator.run(DefaultThreadFactory.java:138)
	at java.lang.Thread.run(Thread.java:745)
08:16:51.548 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:16:51.550 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:16:51.555 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:16:51.561 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:16:51.562 WARN [EndpointContextUtil]: tls context, CONNECTION_ID: "n.a." != "e8a01f79" (o.e.c.e.EndpointContextUtil.match:55)
08:16:51.562 WARN [EndpointContextUtil]: tls context, DTLS_SESSION_ID: "n.a." != "5A 96 AB C3 D9 B0 77 C0 7F 03 D0 A1 99 79 E8 04 C7 1B D9 B1 6B 10 19 DF 7A 98 2E C7 95 9A 8F F5" (o.e.c.e.EndpointContextUtil.match:55)
08:16:51.562 WARN [EndpointContextUtil]: tls context, CIPHER: "n.a." != "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA" (o.e.c.e.EndpointContextUtil.match:55)
08:16:51.563 WARN [TcpServerConnector]: TcpConnector drops 103 bytes to /127.0.0.1:38111 (o.e.c.e.t.TcpServerConnector.send:153)
08:16:53.599 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:16:53.631 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:16:53.667 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:16:53.670 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:16:53.677 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:16:53.724 WARN [TcpClientConnector]: TcpConnector drops 103 bytes to new localhost/127.0.0.1:59190 (o.e.c.e.t.TcpClientConnector.send:141)
08:16:55.756 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:16:55.760 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:16:55.764 WARN [EndpointContextUtil]: tls context, CONNECTION_ID: "n.a." != "3777c34e" (o.e.c.e.EndpointContextUtil.match:55)
08:16:55.764 WARN [EndpointContextUtil]: tls context, DTLS_SESSION_ID: "n.a." != "5A 96 AB C7 66 0F C5 8A AA 68 20 9E D5 86 B5 A3 13 18 DD F1 47 F1 7D 92 37 38 3E E7 F0 BA 59 D7" (o.e.c.e.EndpointContextUtil.match:55)
08:16:55.764 WARN [EndpointContextUtil]: tls context, CIPHER: "n.a." != "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA" (o.e.c.e.EndpointContextUtil.match:55)
08:16:55.764 WARN [TcpClientConnector]: TcpConnector drops 103 bytes to localhost/127.0.0.1:59190 (o.e.c.e.t.TcpClientConnector.send:185)
08:16:57.766 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:17:04.524 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:17:08.750 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:17:08.788 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
08:17:08.790 WARN [NettyContextUtils]: Principal peer not authenticated (o.e.c.e.t.NettyContextUtils.buildEndpointContext:70)
[ERROR] Tests run: 9, Failures: 0, Errors: 1, Skipped: 0, Time elapsed: 21.307 s <<< FAILURE! - in org.eclipse.californium.elements.tcp.TlsCorrelationTest
[ERROR] testClientSendingCorrelationContext(org.eclipse.californium.elements.tcp.TlsCorrelationTest)  Time elapsed: 10.772 s  <<< ERROR!
org.junit.runners.model.TestTimedOutException: test timed out after 10 seconds
	at org.eclipse.californium.elements.tcp.TlsCorrelationTest.cleanup(TlsCorrelationTest.java:59)

[INFO] Running org.eclipse.californium.elements.tcp.TcpConnectorTest
[INFO] Tests run: 16, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.086 s - in org.eclipse.californium.elements.tcp.TcpConnectorTest
[INFO] 
[INFO] Results:
[INFO] 
[ERROR] Errors: 
[ERROR]   TlsCorrelationTest.cleanup:59->Object.wait:503->Object.wait:-2 ยป TestTimedOut ...
[INFO] 
[ERROR] Tests run: 34, Failures: 0, Errors: 1, Skipped: 0
[INFO] 
[INFO] ------------------------------------------------------------------------
[INFO] Reactor Summary:
[INFO] 
[INFO] Californium (Cf) Parent ............................ SUCCESS [  5.754 s]
[INFO] Californium (Cf) Demo Certificates ................. SUCCESS [  1.956 s]
[INFO] element-connector .................................. SUCCESS [ 24.166 s]
[INFO] Scandium (Sc) Core ................................. SUCCESS [ 37.321 s]
[INFO] element-connector-tcp .............................. FAILURE [ 36.255 s]
[INFO] Californium (Cf) Core .............................. SKIPPED
[INFO] Californium (Cf) Demo Applications ................. SKIPPED
[INFO] Cf-NAT ............................................. SKIPPED
[INFO] Californium (Cf) Integration Tests ................. SKIPPED
[INFO] Californium (Cf) Proxy ............................. SKIPPED
[INFO] Californium (Cf) OSGi .............................. SKIPPED
[INFO] Sc-DTLS-Example-Server ............................. SKIPPED
[INFO] Sc-DTLS-Example-Client ............................. SKIPPED
[INFO] Cf-PlugtestClient .................................. SKIPPED
[INFO] Cf-PlugtestChecker ................................. SKIPPED
[INFO] Cf-PlugtestServer .................................. SKIPPED
[INFO] Cf-ExtendedPlugtestClient .......................... SKIPPED
[INFO] Cf-ExtendedPlugtestServer .......................... SKIPPED
[INFO] Cf-HelloWorldClient ................................ SKIPPED
[INFO] Cf-HelloWorldServer ................................ SKIPPED
[INFO] Cf-SimpleFileServer ................................ SKIPPED
[INFO] Cf-CoCoAClient ..................................... SKIPPED
[INFO] Cf-SecureServer .................................... SKIPPED
[INFO] Cf-ExampleCrossProxy ............................... SKIPPED
[INFO] Cf-BenchmarkServer ................................. SKIPPED
[INFO] Cf-ObserveBenchmarkClient .......................... SKIPPED
[INFO] ------------------------------------------------------------------------
[INFO] BUILD FAILURE
[INFO] ------------------------------------------------------------------------
[INFO] Total time: 01:51 min
[INFO] Finished at: 2018-02-28T08:17:10-05:00
[INFO] Final Memory: 42M/1931M
[INFO] ------------------------------------------------------------------------
[ERROR] Failed to execute goal org.apache.maven.plugins:maven-surefire-plugin:2.20.1:test (default-test) on project element-connector-tcp: There are test failures.
[ERROR] 
[ERROR] Please refer to /jobs/genie.californium/2.0.x/workspace/element-connector-tcp/target/surefire-reports for the individual test results.
[ERROR] Please refer to dump files (if any exist) [date]-jvmRun[N].dump, [date].dumpstream and [date]-jvmRun[N].dumpstream.
[ERROR] -> [Help 1]
[ERROR] 
[ERROR] To see the full stack trace of the errors, re-run Maven with the -e switch.
[ERROR] Re-run Maven using the -X switch to enable full debug logging.
[ERROR] 
[ERROR] For more information about the errors and possible solutions, please read the following articles:
[ERROR] [Help 1] http://cwiki.apache.org/confluence/display/MAVEN/MojoFailureException
[ERROR] 
[ERROR] After correcting the problems, you can resume the build with the command
[ERROR]   mvn <goals> -rf :element-connector-tcp
Build step 'Invoke top-level Maven targets' marked build as failure


Back to the top