SLF4J(W): Class path contains multiple SLF4J providers. SLF4J(W): Found provider [ch.qos.logback.classic.spi.LogbackServiceProvider@368d5c00] SLF4J(W): Found provider [org.slf4j.simple.SimpleServiceProvider@12a160c2] SLF4J(W): See https://www.slf4j.org/codes.html#multiple_bindings for an explanation. SLF4J(I): Actual provider is of type [ch.qos.logback.classic.spi.LogbackServiceProvider@368d5c00] 11:10:13.152 [main] INFO o.o.n.t.spi.NettyTransportSupport - Netty transport backed by java.nio 11:10:13.232 [main] INFO o.o.y.b.r.StringValueObjectFactory - Instantiated factory for class org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.inet.types.rev130715.Ipv4AddressNoZone 11:10:13.233 [main] INFO o.o.y.b.r.StringValueObjectFactory - Instantiated factory for class org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.inet.types.rev130715.Ipv4Prefix 11:10:13.235 [main] INFO o.o.y.b.r.StringValueObjectFactory - Instantiated factory for class org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.inet.types.rev130715.Ipv6AddressNoZone 11:10:13.237 [main] INFO o.o.y.b.r.StringValueObjectFactory - Instantiated factory for class org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.inet.types.rev130715.Ipv6Prefix 11:10:16.177 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router started 11:10:16.368 [main] INFO o.o.mdsal.dom.broker.DOMRpcRouter - DOM RPC/Action router started 11:10:16.891 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with service class org.opendaylight.restconf.server.mdsal.MdsalRestconfServer 11:10:16.891 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with base path: /rests, default encoding: JSON, default pretty print: false 11:10:16.943 [main] INFO o.o.n.c.impl.DefaultNetconfTimer - NETCONF timer started 11:10:17.082 [main] INFO o.o.n.c.m.i.DefaultSchemaResourceManager - Schema Resource Manager instantiated on /tmp/junit-6075409695596681503/schema 11:10:17.380 [main] INFO o.o.n.c.impl.DefaultNetconfTimer - NETCONF timer started 11:10:17.380 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Starting 1, SSH simulated devices starting on port 41581 11:10:17.383 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Loading models from classpath. 11:10:17.390 [main] INFO o.o.y.y.p.r.SharedEffectiveModelContextFactory - Using weak references 11:10:17.474 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - using MdsalOperationProvider. 11:10:17.848 [main] INFO o.o.n.s.s.c.u.s.b.BouncyCastleSecurityProviderRegistrar - getOrCreateProvider(BC) created instance of org.bouncycastle.jce.provider.BouncyCastleProvider 11:10:17.851 [main] INFO o.o.n.s.s.c.u.s.e.EdDSASecurityProviderRegistrar - getOrCreateProvider(EdDSA) created instance of org.opendaylight.netconf.shaded.eddsa.EdDSASecurityProvider 11:10:18.023 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - All simulated devices started successfully from port 41581 to 41581 11:10:18.289 [restconf-netty-e2e-2] INFO o.o.restconf.api.ApiPathParser - Consecutive slashes in REST URLs will be rejected 11:10:18.804 [/127.0.0.1:37848-http-server-req-0] INFO o.o.n.t.spi.AbstractNetconfTopology - Connecting RemoteDevice{Uri{value=device-sim}}, with config Node{nodeId=Uri{value=device-sim}, augmentation=[NetconfNodeAugment{netconfNode=NetconfNode{actorResponseWaitTime=5, backoffJitter=0.1, backoffMultiplier=1.5, concurrentRpcLimit=0, connectionTimeoutMillis=20000, credentials=***, defaultRequestTimeoutMillis=60000, host=Host{ipAddress=IpAddress{ipv4Address=Ipv4Address{value=127.0.0.1}}}, keepaliveDelay=120, lockDatastore=true, maxBackoffMillis=1800000, maxConnectionAttempts=0, minBackoffMillis=2000, port=PortNumber{value=41581}, reconnectOnChangedSchema=false, schemaCacheDirectory=schema, schemaless=false, tcpOnly=false}}]} 11:10:18.870 [/127.0.0.1:37848-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Adding keepalive facade, for device Uri{value=device-sim} 11:10:18.877 [/127.0.0.1:37848-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Concurrent rpc limit is smaller than 1, no limit will be enforced for device RemoteDeviceId[name=device-sim, address=/127.0.0.1:41581] 11:10:19.559 [netconf-netty-e2e-0] WARN o.o.n.s.s.c.k.AcceptAllServerKeyVerifier - Server at /127.0.0.1:41581 presented unverified RSA key: SHA256:R5VA/DCrDFDP+waCPE2XyT4Fg2fJQgd5TfBWm2veaRk 11:10:19.577 [netconf-device-simulator-threads-1] INFO o.o.n.t.ssh.TransportServerSession - Session device-username@/127.0.0.1:37626 authenticated 11:10:19.664 [netconf-device-simulator-threads-1] INFO o.o.m.d.s.i.InMemoryDOMDataStoreFactory - ThreadFactory created: DOM-CFG-DCL 11:10:19.665 [netconf-device-simulator-threads-1] INFO o.o.m.d.s.i.InMemoryDOMDataStoreFactory - ThreadFactory created: DOM-OPER-DCL 11:10:19.667 [netconf-device-simulator-threads-1] INFO o.o.n.t.tool.MdsalOperationProvider - ThreadFactory created: CommitFutures 11:10:20.235 [topology-schema-assembler-3] INFO o.o.n.client.mdsal.NetconfDevice - RemoteDeviceId[name=device-sim, address=/127.0.0.1:41581]: Netconf connector initialized successfully 11:10:22.149 [netconf-netty-e2e-0] INFO o.o.n.c.m.NetconfDeviceCommunicator - RemoteDeviceId[name=device-sim, address=/127.0.0.1:41581]: Session went down: End of input 11:10:22.170 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router started 11:10:22.171 [main] INFO o.o.mdsal.dom.broker.DOMRpcRouter - DOM RPC/Action router started 11:10:22.179 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with service class org.opendaylight.restconf.server.mdsal.MdsalRestconfServer 11:10:22.179 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with base path: /rests, default encoding: JSON, default pretty print: false 11:10:22.181 [main] INFO o.o.n.c.impl.DefaultNetconfTimer - NETCONF timer started 11:10:22.183 [main] INFO o.o.n.c.m.i.DefaultSchemaResourceManager - Schema Resource Manager instantiated on /tmp/junit-16957141323937713105/schema 11:10:22.185 [main] INFO o.o.n.c.impl.DefaultNetconfTimer - NETCONF timer started 11:10:22.186 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Starting 1, SSH simulated devices starting on port 41113 11:10:22.188 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Loading models from classpath. 11:10:22.220 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - using MdsalOperationProvider. 11:10:22.223 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - All simulated devices started successfully from port 41113 to 41113 11:10:22.542 [/127.0.0.1:48844-http-server-req-0] INFO o.o.n.t.spi.AbstractNetconfTopology - Connecting RemoteDevice{Uri{value=device-sim}}, with config Node{nodeId=Uri{value=device-sim}, augmentation=[NetconfNodeAugment{netconfNode=NetconfNode{actorResponseWaitTime=5, backoffJitter=0.1, backoffMultiplier=1.5, concurrentRpcLimit=0, connectionTimeoutMillis=20000, credentials=***, defaultRequestTimeoutMillis=60000, host=Host{ipAddress=IpAddress{ipv4Address=Ipv4Address{value=127.0.0.1}}}, keepaliveDelay=120, lockDatastore=true, maxBackoffMillis=1800000, maxConnectionAttempts=0, minBackoffMillis=2000, port=PortNumber{value=41113}, reconnectOnChangedSchema=false, schemaCacheDirectory=schema, schemaless=false, tcpOnly=false}}]} 11:10:22.544 [/127.0.0.1:48844-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Adding keepalive facade, for device Uri{value=device-sim} 11:10:22.544 [/127.0.0.1:48844-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Concurrent rpc limit is smaller than 1, no limit will be enforced for device RemoteDeviceId[name=device-sim, address=/127.0.0.1:41113] 11:10:22.548 [netconf-netty-e2e-2] ERROR io.netty.util.ResourceLeakDetector - LEAK: ByteBuf.release() was not called before it's garbage-collected. See https://netty.io/wiki/reference-counted-objects.html for more information. Recent access records: Created at: io.netty.buffer.AbstractByteBufAllocator.compositeDirectBuffer(AbstractByteBufAllocator.java:224) io.netty.buffer.AbstractByteBufAllocator.compositeBuffer(AbstractByteBufAllocator.java:202) io.netty.handler.codec.MessageAggregator.decode(MessageAggregator.java:269) io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:91) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:356) io.netty.channel.ChannelInboundHandlerAdapter.channelRead(ChannelInboundHandlerAdapter.java:93) io.netty.handler.codec.http.HttpServerKeepAliveHandler.channelRead(HttpServerKeepAliveHandler.java:64) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:354) org.opendaylight.netconf.transport.http.HTTPScheme$CleartextUpgradeHandler.channelRead0(HTTPScheme.java:131) org.opendaylight.netconf.transport.http.HTTPScheme$CleartextUpgradeHandler.channelRead0(HTTPScheme.java:116) io.netty.channel.SimpleChannelInboundHandler.channelRead(SimpleChannelInboundHandler.java:99) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:356) io.netty.handler.codec.http.HttpServerUpgradeHandler.decode(HttpServerUpgradeHandler.java:290) io.netty.handler.codec.http.HttpServerUpgradeHandler.decode(HttpServerUpgradeHandler.java:41) io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:91) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:356) io.netty.channel.CombinedChannelDuplexHandler$DelegatingChannelHandlerContext.fireChannelRead(CombinedChannelDuplexHandler.java:434) io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:346) io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:333) io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:455) io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:290) io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:249) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:354) io.netty.handler.codec.ByteToMessageDecoder.handlerRemoved(ByteToMessageDecoder.java:266) io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:537) io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:469) io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:290) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:356) io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1429) io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:918) io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:168) io.netty.channel.nio.AbstractNioChannel$AbstractNioUnsafe.handle(AbstractNioChannel.java:445) io.netty.channel.nio.NioIoHandler$DefaultNioRegistration.handle(NioIoHandler.java:381) io.netty.channel.nio.NioIoHandler.processSelectedKey(NioIoHandler.java:587) io.netty.channel.nio.NioIoHandler.processSelectedKeysOptimized(NioIoHandler.java:562) io.netty.channel.nio.NioIoHandler.processSelectedKeys(NioIoHandler.java:503) io.netty.channel.nio.NioIoHandler.run(NioIoHandler.java:475) io.netty.channel.SingleThreadIoEventLoop.runIo(SingleThreadIoEventLoop.java:225) io.netty.channel.SingleThreadIoEventLoop.run(SingleThreadIoEventLoop.java:196) io.netty.util.concurrent.SingleThreadEventExecutor$5.run(SingleThreadEventExecutor.java:1193) io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) java.base/java.lang.Thread.run(Thread.java:1583) 11:10:23.001 [netconf-netty-e2e-2] WARN o.o.n.s.s.c.k.AcceptAllServerKeyVerifier - Server at /127.0.0.1:41113 presented unverified RSA key: SHA256:JLHytDbdzXICRzv8mIuvQzwK7hYW8MH7r2goyYnlwpE 11:10:23.005 [netconf-device-simulator-threads-1] INFO o.o.n.t.ssh.TransportServerSession - Session device-username@/127.0.0.1:43006 authenticated 11:10:23.010 [netconf-device-simulator-threads-1] INFO o.o.m.d.s.i.InMemoryDOMDataStoreFactory - ThreadFactory created: DOM-CFG-DCL 11:10:23.010 [netconf-device-simulator-threads-1] INFO o.o.m.d.s.i.InMemoryDOMDataStoreFactory - ThreadFactory created: DOM-OPER-DCL 11:10:23.010 [netconf-device-simulator-threads-1] INFO o.o.n.t.tool.MdsalOperationProvider - ThreadFactory created: CommitFutures 11:10:23.165 [topology-schema-assembler-7] INFO o.o.n.client.mdsal.NetconfDevice - RemoteDeviceId[name=device-sim, address=/127.0.0.1:41113]: Netconf connector initialized successfully 11:10:23.757 [main] WARN o.o.n.c.m.NetconfDeviceCommunicator - RemoteDeviceId[name=device-sim, address=/127.0.0.1:41113]: Session terminated Session closed 11:10:23.762 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router started 11:10:23.763 [main] INFO o.o.mdsal.dom.broker.DOMRpcRouter - DOM RPC/Action router started 11:10:23.768 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with service class org.opendaylight.restconf.server.mdsal.MdsalRestconfServer 11:10:23.768 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with base path: /rests, default encoding: JSON, default pretty print: false 11:10:23.769 [main] INFO o.o.n.c.impl.DefaultNetconfTimer - NETCONF timer started 11:10:23.771 [main] INFO o.o.n.c.m.i.DefaultSchemaResourceManager - Schema Resource Manager instantiated on /tmp/junit-17566351982216554317/schema 11:10:23.773 [main] INFO o.o.n.c.impl.DefaultNetconfTimer - NETCONF timer started 11:10:23.774 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Starting 1, SSH simulated devices starting on port 38781 11:10:23.775 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Loading models from classpath. 11:10:23.804 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - using SimulatedOperationProvider. 11:10:23.806 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - All simulated devices started successfully from port 38781 to 38781 11:10:24.123 [/127.0.0.1:38496-http-server-req-0] INFO o.o.n.t.spi.AbstractNetconfTopology - Connecting RemoteDevice{Uri{value=device-sim}}, with config Node{nodeId=Uri{value=device-sim}, augmentation=[NetconfNodeAugment{netconfNode=NetconfNode{actorResponseWaitTime=5, backoffJitter=0.1, backoffMultiplier=1.5, concurrentRpcLimit=0, connectionTimeoutMillis=20000, credentials=***, defaultRequestTimeoutMillis=60000, host=Host{ipAddress=IpAddress{ipv4Address=Ipv4Address{value=127.0.0.1}}}, keepaliveDelay=120, lockDatastore=true, maxBackoffMillis=1800000, maxConnectionAttempts=0, minBackoffMillis=2000, port=PortNumber{value=38781}, reconnectOnChangedSchema=false, schemaCacheDirectory=schema, schemaless=false, tcpOnly=false}}]} 11:10:24.124 [/127.0.0.1:38496-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Adding keepalive facade, for device Uri{value=device-sim} 11:10:24.124 [/127.0.0.1:38496-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Concurrent rpc limit is smaller than 1, no limit will be enforced for device RemoteDeviceId[name=device-sim, address=/127.0.0.1:38781] 11:10:24.449 [netconf-netty-e2e-4] WARN o.o.n.s.s.c.k.AcceptAllServerKeyVerifier - Server at /127.0.0.1:38781 presented unverified RSA key: SHA256:Q8/uFQdbND4nNdAeFmimphmLzmpjglQWWfxU0d7cgUs 11:10:24.455 [netconf-device-simulator-threads-1] INFO o.o.n.t.ssh.TransportServerSession - Session device-username@/127.0.0.1:38544 authenticated 11:10:24.720 [netconf-device-simulator-threads-1] INFO o.o.n.t.t.r.RpcHandlerDefault - getResponse: XmlElement{name='get', namespace='urn:ietf:params:xml:ns:netconf:base:1.0'} 11:10:24.828 [topology-schema-assembler-11] INFO o.o.n.client.mdsal.NetconfDevice - RemoteDeviceId[name=device-sim, address=/127.0.0.1:38781]: Netconf connector initialized successfully 11:10:25.062 [netconf-device-simulator-threads-1] INFO o.o.n.t.t.r.RpcHandlerDefault - getResponse: XmlElement{name='create-subscription', namespace='urn:ietf:params:xml:ns:netconf:notification:1.0'} 11:10:25.565 [restconf-netty-e2e-1] INFO o.o.n.t.http.ClientHttp1SseService - Client SSE enabled on channel [id: 0x386783d8, L:/127.0.0.1:38558 - R:/127.0.0.1:33627] 11:10:27.185 [netconf-netty-e2e-4] INFO o.o.n.c.m.NetconfDeviceCommunicator - RemoteDeviceId[name=device-sim, address=/127.0.0.1:38781]: Session went down: End of input