Skip to content

Add new Progress events to help diagnose RefreshPorts & Tunnel Service Requests #182

Add new Progress events to help diagnose RefreshPorts & Tunnel Service Requests

Add new Progress events to help diagnose RefreshPorts & Tunnel Service Requests #182

Triggered via pull request January 2, 2024 21:54
Status Failure
Total duration 5m 39s
Artifacts

pr-build.yaml

on: pull_request
Matrix: builds
Fit to window
Zoom out
Zoom in

Annotations

3 errors and 2 warnings
Microsoft.DevTunnels.Ssh.Test.InteropTests ► InteropWithSshServerTSLib(kexAlg: "ecdh-sha2-nistp521", pkAlg: "ecdsa-sha2-nistp521", hmacAlg: "hmac-sha2-512-etm@openssh.com", reconnect: True): test/cs/Ssh.Test/InteropTests.cs#L464
Failed test found in: out/TestResults/SSH-CS-net48.trx Error: System.Exception : Session closed while encrypting. Reason: ConnectionLost sshd process output follows: node "D:\a\dev-tunnels-ssh\dev-tunnels-ssh\out\lib\ssh-test\cli.js" sshd -D -e -o "LogLevel=VERBOSE" -p 50643 -f "C:\Users\runneradmin\AppData\Local\Temp\tmp5F46.tmp" -o "AuthorizedKeysFile=C:\Users\runneradmin\AppData\Local\Temp\tmp5F49.tmp" -o "StrictModes=no" -o "PidFile=C:\Users\runneradmin\AppData\Local\Temp\tmp5F48.tmp" -o "HostKey=C:\Users\runneradmin\AppData\Local\Temp\tmp5F47.tmp" SshServer listening on port 50643. Listening on port 50643 SshServer client connected. SshServerSession connecting... Sending #0 KeyExchangeInitMessage Local version: SSH-2.0-dev-tunnels-ssh_3.11.38-g30b1c7965e, remote version: SSH-2.0-Microsoft.DevTunnels.Ssh_3.11 Receiving #0 KeyExchangeInitMessage KeyExchange negotiation: Server (ecdh-sha2-nistp384, ecdh-sha2-nistp256, diffie-hellman-group16-sha512, diffie-hellman-group14-sha256, ecdh-sha2-nistp521) Client (ecdh-sha2-nistp521, ext-info-c) => ecdh-sha2-nistp521 PublicKey negotiation: Server (ecdsa-sha2-nistp521) Client (ecdsa-sha2-nistp521) => ecdsa-sha2-nistp521 ClientEncryption negotiation: Server (aes256-gcm@openssh.com, aes256-gcm@openssh.com, aes256-ctr) Client (aes256-cbc, aes256-ctr) => aes256-ctr ServerEncryption negotiation: Server (aes256-gcm@openssh.com, aes256-gcm@openssh.com, aes256-ctr) Client (aes256-cbc, aes256-ctr) => aes256-ctr ClientHmac negotiation: Server (hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, hmac-sha2-512, hmac-sha2-256) Client (hmac-sha2-512-etm@openssh.com) => hmac-sha2-512-etm@openssh.com ServerHmac negotiation: Server (hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, hmac-sha2-512, hmac-sha2-256) Client (hmac-sha2-512-etm@openssh.com) => hmac-sha2-512-etm@openssh.com ClientCompression negotiation: Server (none) Client (none) => none ServerCompression negotiation: Server (none) Client (none) => none Receiving #1 KeyExchangeDhInitMessage Sending #1 KeyExchangeDhReplyMessage Sending #2 NewKeysMessage Receiving #2 NewKeysMessage Sending #3 ExtensionInfoMessage (server-sig-algs=rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,ecdsa-sha2-nistp521; open-channel-request@microsoft.com; session-reconnect@microsoft.com; session-latency@microsoft.com) SshServerSession encrypted. Receiving #3 ExtensionInfoMessage (open-channel-request@microsoft.com; server-sig-algs=ecdsa-sha2-nistp521; session-latency@microsoft.com; session-reconnect@microsoft.com) Sending #4 SessionRequestMessage (requestType=enable-session-reconnect@microsoft.com) Receiving #4 ServiceRequestMessage Sending #5 ServiceAcceptMessage Receiving #5 SessionRequestMessage (requestType=enable-session-reconnect@microsoft.com) Receiving #6 AuthenticationRequestMessage (Method: publickey, Username: runneradmin) Authentication request: publickey SshServerSession Authenticating("runneradmin" [ecdsa-sha2-nistp521]) Client authentication succeeded. clientPublicKey authentication succeeded. Sending #6 AuthenticationSuccessMessage Receiving #7 ChannelOpenMessage(channelType=direct-tcpip, senderChannel=0) SshServerSession PortForwardingService forwarded channel #1 connection to 127.0.0.1:50645. Sending #7 ChannelOpenConfirmationMessage (recipientChannel=0)(senderChannel=1) SshServerSession ChannelOpenCompleted(SshChannel(Type: direct-tcpip, Id: 1, RemoteId: 0)) Sending #9 ChannelCloseMessage (recipientChannel=0) SshChannel(Type: direct-tcpip, Id: 1, RemoteId: 0) closed locally. (S: 3, R: 3) Receiving #9 ChannelCloseMessage (recipientChannel=1) Receiving #10 SessionRequestMessage (requestType=tcpip-forward) PortForwardingService listening on 127.0.0.1:50650. PortForwardingService also listening on ::1:50650. Sending #10 PortForwardSuccessMessage (port=50650) PortForwardingService accepted connection from: 127.0.0.1 on port 50650 Sending #11 PortForwardChannelOpenMessage(channelType=forwarded-tcpip, senderChannel=2) (host=127.0.0.1 port=50650) Receiving #11 ChannelOpenConfirmationMessage (recipientChannel=2)(senderChannel=1) PortForwardingService opened forwarded-tcpip channel #2 for 127.0.0.1:50650. Sending #13 ChannelCloseMessage (recipientChannel=1) SshChannel(Type: forwarded-tcpip, Id: 2, RemoteId: 1) closed locally. (S: 3, R: 3) Error reading from stream: read ECONNRESET SshServerSession Close(connectionLost, "Error reading from stream: read ECONNRESET") SshServerSession disconnected. SshServer client connected. SshServerSession connecting... Sending #0 KeyExchangeInitMessage Local version: SSH-2.0-dev-tunnels-ssh_3.11.38-g30b1c7965e, remote version: SSH-2.0-Microsoft.DevTunnels.Ssh_3.11 Receiving #0 KeyExchangeInitMessage KeyExchange negotiation: Server (ecdh-sha2-nistp384, ecdh-sha2-nistp256, diffie-hellman-group16-sha512, diffie-hellman-group14-sha256, ecdh-sha2-nistp521) Client (ecdh-sha2-nistp521, ext-info-c) => ecdh-sha2-nistp521 PublicKey negotiation: Server (ecdsa-sha2-nistp521) Client (ecdsa-sha2-nistp521) => ecdsa-sha2-nistp521 ClientEncryption negotiation: Server (aes256-gcm@openssh.com, aes256-gcm@openssh.com, aes256-ctr) Client (aes256-cbc, aes256-ctr) => aes256-ctr ServerEncryption negotiation: Server (aes256-gcm@openssh.com, aes256-gcm@openssh.com, aes256-ctr) Client (aes256-cbc, aes256-ctr) => aes256-ctr ClientHmac negotiation: Server (hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, hmac-sha2-512, hmac-sha2-256) Client (hmac-sha2-512-etm@openssh.com) => hmac-sha2-512-etm@openssh.com ServerHmac negotiation: Server (hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, hmac-sha2-512, hmac-sha2-256) Client (hmac-sha2-512-etm@openssh.com) => hmac-sha2-512-etm@openssh.com ClientCompression negotiation: Server (none) Client (none) => none ServerCompression negotiation: Server (none) Client (none) => none SshServerSession Close(connectionLost, "Session closed while encrypting.") ---- Microsoft.DevTunnels.Ssh.SshConnectionException : Session closed while encrypting. Reason: ConnectionLost -------- Microsoft.DevTunnels.Ssh.SshConnectionException : Connection lost. Reason: ConnectionLost ------------ System.IO.IOException : Unable to write data to the transport connection: A request to send or receive data was disallowed because the socket had already been shut down in that direction with a previous shutdown call. ---------------- System.Net.Sockets.SocketException : A request to send or receive data was disallowed because the socket had already been shut down in that direction with a previous shutdown call
Build SSH on windows-latest
Failed test were found and 'fail-on-error' option is set to true
Build SSH on windows-latest
Process completed with exit code 1.
Build SSH on macOS-latest
.NET Core 3.1 is no longer supported and will not receive security updates in the future. Please refer to https://aka.ms/dotnet-core-support for more information about the .NET support policy.
Build SSH on windows-latest
.NET Core 3.1 is no longer supported and will not receive security updates in the future. Please refer to https://aka.ms/dotnet-core-support for more information about the .NET support policy.