Package evaluation of CurlHTTP on Julia 1.13.0-DEV.748 (36a4616fc2*) started at 2025-06-17T13:23:30.112 ################################################################################ # Set-up # Installing PkgEval dependencies (TestEnv)... Set-up completed after 7.83s ################################################################################ # Installation # Installing CurlHTTP... Resolving package versions... Updating `~/.julia/environments/v1.13/Project.toml` [d54d1f39] + CurlHTTP v0.1.3 Updating `~/.julia/environments/v1.13/Manifest.toml` [d54d1f39] + CurlHTTP v0.1.3 [682c06a0] + JSON v0.21.4 [69de0a69] + Parsers v2.8.3 [aea7be01] + PrecompileTools v1.3.2 [21216c6a] + Preferences v1.4.3 [189a3867] + Reexport v1.2.2 [56f22d72] + Artifacts v1.11.0 [ade2ca70] + Dates v1.11.0 [b27032c2] + LibCURL v0.6.4 [8f399da3] + Libdl v1.11.0 [a63ad114] + Mmap v1.11.0 [de0858da] + Printf v1.11.0 [9a3f8284] + Random v1.11.0 [ea8e919c] + SHA v0.7.0 [fa267f1f] + TOML v1.0.3 [cf7118a7] + UUIDs v1.11.0 [4ec0a83e] + Unicode v1.11.0 [e66e0078] + CompilerSupportLibraries_jll v1.3.0+1 [deac9b47] + LibCURL_jll v8.14.1+1 [29816b5a] + LibSSH2_jll v1.11.3+1 [14a3606d] + MozillaCACerts_jll v2025.5.20 [458c3c95] + OpenSSL_jll v3.5.0+0 [83775a58] + Zlib_jll v1.3.1+2 [8e850ede] + nghttp2_jll v1.65.0+0 Installation completed after 1.04s ################################################################################ # Precompilation # Precompiling PkgEval dependencies... Precompiling package dependencies... Precompilation completed after 12.81s ################################################################################ # Testing # Testing CurlHTTP Status `/tmp/jl_fDxaQo/Project.toml` [d54d1f39] CurlHTTP v0.1.3 [682c06a0] JSON v0.21.4 [189a3867] Reexport v1.2.2 [b27032c2] LibCURL v0.6.4 [8dfed614] Test v1.11.0 [cf7118a7] UUIDs v1.11.0 Status `/tmp/jl_fDxaQo/Manifest.toml` [d54d1f39] CurlHTTP v0.1.3 [682c06a0] JSON v0.21.4 [69de0a69] Parsers v2.8.3 [aea7be01] PrecompileTools v1.3.2 [21216c6a] Preferences v1.4.3 [189a3867] Reexport v1.2.2 [56f22d72] Artifacts v1.11.0 [2a0f44e3] Base64 v1.11.0 [ade2ca70] Dates v1.11.0 [b77e0a4c] InteractiveUtils v1.11.0 [ac6e5ff7] JuliaSyntaxHighlighting v1.12.0 [b27032c2] LibCURL v0.6.4 [8f399da3] Libdl v1.11.0 [56ddb016] Logging v1.11.0 [d6f4376e] Markdown v1.11.0 [a63ad114] Mmap v1.11.0 [de0858da] Printf v1.11.0 [9a3f8284] Random v1.11.0 [ea8e919c] SHA v0.7.0 [9e88b42a] Serialization v1.11.0 [f489334b] StyledStrings v1.11.0 [fa267f1f] TOML v1.0.3 [8dfed614] Test v1.11.0 [cf7118a7] UUIDs v1.11.0 [4ec0a83e] Unicode v1.11.0 [e66e0078] CompilerSupportLibraries_jll v1.3.0+1 [deac9b47] LibCURL_jll v8.14.1+1 [29816b5a] LibSSH2_jll v1.11.3+1 [14a3606d] MozillaCACerts_jll v2025.5.20 [458c3c95] OpenSSL_jll v3.5.0+0 [83775a58] Zlib_jll v1.3.1+2 [8e850ede] nghttp2_jll v1.65.0+0 Testing Running tests... [ Info: Host postman-echo.com:443 was resolved. [ Info: IPv6: (none) [ Info: IPv4: 3.215.218.87, 3.215.44.249, 54.243.141.228 [ Info: Trying 3.215.218.87:443... [ Info: ALPN: curl offers h2,http/1.1 [ Info:  [ Info: TLSv1.3 (OUT), TLS handshake, Client hello (1): ┌ Info: i4nKm` sKŕ_8|ip / 2ʔA HPX[~,z*W0<,0̨̩̪+/$(k#'g │ 9 3=<5/postman-echo.com  │  h2http/1.11 64     │  +-3VǶ:V7=ɿpT3ZN4jo`Ê}/Ot1W"E,GlvbY awgK!EE(GS!58WBo~YwqeK0[}E}gxyq 9V~ejuaSi.p*?ZoηR'*!{2j#zBÉaMj)AeaV+P%~ "heYQ,B0"Yjrswm3b%|#`mƑδvJ[?Bwd4ֲ[k*EYu+^@*x56\HBb+YjkSr;UoYU,(85#`uX|b3:'B:52FY:UD~C"Qc`7X │ |}|< \fak9LA YTIN"q"hVbA2(O`u9].$+ 9je.C?5xYw[Erkt'AaHb9QLD[cY CkzJH6:tb>;Kc1d1v:YJ[Iws SkvQ$Cwp$e϶R,͔tm5BdA#A2FF|JZj+ N|Ub#Bp+CmV5S ~,PJkjQ[RLC#^9B~>kxX4'~ │ L] ӊ?nvSS └ ~"f~ ԘtG<ϐKD!O [ Info: CAfile: /opt/julia/share/julia/cert.pem [ Info: CApath: none [ Info: z [ Info: TLSv1.3 (IN), TLS handshake, Server hello (2): [ Info: v瓔W=\R}FX9*0F4@'L / 2ʔA HPX[~,z*W0.3$ Y4;(fq]sPYZf]W+ [ Info:  [ Info: TLSv1.3 (IN), TLS change cipher, Change cipher spec (1): [ Info:  [ Info:  [ Info:  [ Info: TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): [ Info:  h2 [ Info: TLSv1.3 (IN), TLS handshake, Certificate (11): ┌ Info: │ N │ J6020"@AoqΨAdU0  *H  031 0 UUS10U │  Let's Encrypt1 0 │ UR110 250510203246Z 250808203245Z010Upostman-echo.com0"0  *H 0 │ Ԗ|IB&,i0Y.fua&o>5m2$uUn0eժ_=1},Hџn\n │ W`ϥ>gok7Mg19;+vo׃A<>``boJ|>Secz/&cqAsS \&|03xv@sSNCHŽxvK?R߫R]ɝJdNW_ E%X V0R0U0U%0++0 U00UK#^hleC]?hB0U#0Fzl-^/&03+'0%0#+0http://r11.i.lencr.org/0QUJ0H*.postman-echo.compostman-echo.com unique.26407911.postman-echo.com0U  0 │ 0g 0.U'0%0#!http://r11.c.lencr.org/91.crl0 │ +yvjq eS|"\ ~TL  G0E >xqO/؄TX.:?_(,fo!DhGi7bh}8u/~vIT@ÿg/N#@hk@.܉}G0E \ H[fH]N_ڽ%jigj!wIΡΉJVs6N0  *H  7L'cr}xN!Y │ HoK │ /@S`N@oS"en}?.5/ޱIgן[-KGpKoDWvx{>w3t!5îr7m `qgp-I T%)0k,D!c$ԑA)Ս#?!,[l9miy󸚶(38M:*/j>FNcnfN[ 樉,zx │ 00}>/0#)k40  *H  0O1 0 UUS1)0'U │  Internet Security Research Group10U ISRG Root X10 240313000000Z 270312235959Z031 0 UUS10U │  Let's Encrypt1 0 │ UR110"0  *H 0 │ \9 │ g5_.Ií&$ H MT!6wd)K]yп#JH1tD -qu{ҔFtH%* Cۓ/j1c)f,?gQAs ;cJFF@'`cP:GJGZb l3M8H-.h]L A_hZ 1CIC?<E0iry1>#WݧOwoҹ9KUj䳿՟K;rJT 8`n5uT/n7uFOwYVf-n)֦^dE,dBDOʙ cfrչ≘ 5s#t;JX5~;E0FRk [ Info: TLSv1.3 (IN), TLS handshake, CERT verify (15): ┌ Info: skGս%EMu(,C=[h~)޲Jo\ $gkMW;J7IԴr60#plN2.¸jb8 C6 ,΅Sd[< │ ܴl^U │ (Zb;YƳ{=oCm#M:Bigq Wv#BU\@U?$ [ Info: TLSv1.3 (IN), TLS handshake, Finished (20): ┌ Info: 0jڑ f{1ڣ 2Ğ1MM + └ { [ Info:  [ Info: TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): [ Info:  [ Info: E [ Info:  [ Info: TLSv1.3 (OUT), TLS handshake, Finished (20): ┌ Info: 0/Mgkҩct5% └ ՟',IZ~Co1 [ Info: SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519 / RSASSA-PSS [ Info: ALPN: server accepted h2 [ Info: Server certificate: [ Info: subject: CN=postman-echo.com [ Info: start date: May 10 20:32:46 2025 GMT [ Info: expire date: Aug 8 20:32:45 2025 GMT [ Info: subjectAltName: host "postman-echo.com" matched cert's "postman-echo.com" [ Info: issuer: C=US; O=Let's Encrypt; CN=R11 [ Info: SSL certificate verify ok. [ Info: Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption [ Info: Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption [ Info: Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha256WithRSAEncryption [ Info: Connected to postman-echo.com (3.215.218.87) port 443 [ Info: using HTTP/2 [ Info: [HTTP/2] [1] OPENED stream for https://postman-echo.com/get?foo=bar&baz=zod [ Info: [HTTP/2] [1] [:method: GET] [ Info: [HTTP/2] [1] [:scheme: https] [ Info: [HTTP/2] [1] [:authority: postman-echo.com] [ Info: [HTTP/2] [1] [:path: /get?foo=bar&baz=zod] [ Info: [HTTP/2] [1] [accept: */*] [ Info: [HTTP/2] [1] [accept-encoding: deflate, gzip] [ Info:  [ Info:  ┌ Info: GET /get?foo=bar&baz=zod HTTP/2 │ Host: postman-echo.com │ Accept: */* │ Connection: TE │ TE: gzip │ Accept-Encoding: deflate, gzip └ [ Info: Request completely sent off [ Info:  [ Info:  [ Info: TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): ┌ Info: +~/kfOz]LPq'?D_OjSVvXMZ └ /8!_ckeE5^eu * JxF =O -pIxc $R܆l2LZZ [ Info: TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): [ Info: \~/kfOz]1c0ɉܧa*gea4h=C\{[uiQ'@gVWerIهY6^3tmO(gP "TTutJ珻xS7[^؍xtc0xӊxW>9BT=uyo͌Oڨ3`'89_3w*+W.j(-tZZ [ Info: H [ Info:  [ Info:  [ Info:  [ Info:  [ Info:  [ Info: HTTP/2 200 [ Info: content-type: application/json; charset=utf-8 [ Info: content-length: 202 [ Info: etag: W/"ca-Tf0pYScf9q3JnR9SR1p6fFtjkJE" [ Info: vary: Accept-Encoding [ Info: set-cookie: sails.sid=s%3AAk3Vl2muwaS5dySm86tDYWRduFgk75vZ.b2e8aYKJ9Cxz6xwrR9lbocwikkA089Rz9dCe87j4ISs; Path=/; HttpOnly [ Info: date: Tue, 17 Jun 2025 13:24:09 GMT [ Info: x-envoy-upstream-service-time: 5 [ Info: server: istio-envoy [ Info: [ Info: Connection #0 to host postman-echo.com left intact Test Summary: | Pass Total Time Curl | 83 83 14.9s {"args":{},"data":{"testName":"test_POST"},"files":{},"form":{},"headers":{"host":"postman-echo.com","accept":"*/*","accept-encoding":"deflate, gzip","content-type":"application/json","content-length":"24","x-forwarded-proto":"https"},"json":{"testName":"test_POST"},"url":"https://postman-echo.com/post"}{"args":{"val":"2"},"data":{"testName":"test_multiPOST","value":2},"files":{},"form":{},"headers":{"host":"postman-echo.com","accept":"*/*","accept-encoding":"deflate, gzip","content-type":"application/json","content-length":"39","x-forwarded-proto":"https"},"json":{"testName":"test_multiPOST","value":2},"url":"https://postman-echo.com/post?val=2"}{"args":{"val":"1"},"data":{"testName":"test_multiPOST","value":1},"files":{},"form":{},"headers":{"host":"postman-echo.com","accept":"*/*","accept-encoding":"deflate, gzip","content-type":"application/json","content-length":"39","x-forwarded-proto":"https"},"json":{"testName":"test_multiPOST","value":1},"url":"https://postman-echo.com/post?val=1"}{"args":{"val":"3"},"data":{"testName":"test_multiPOST","value":3},"files":{},"form":{},"headers":{"host":"postman-echo.com","accept":"*/*","accept-encoding":"deflate, gzip","content-type":"application/json","content-length":"39","x-forwarded-proto":"https"},"json":{"testName":"test_multiPOST","value":3},"url":"https://postman-echo.com/post?val=3"} Testing CurlHTTP tests passed Testing completed after 21.29s PkgEval succeeded after 52.78s