09:37:11.585 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router started 09:37:11.585 [main] INFO o.o.mdsal.dom.broker.DOMRpcRouter - DOM RPC/Action router started 09:37:11.589 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router started 09:37:11.589 [main] INFO o.o.r.s.m.MdsalRestconfStreamRegistry - Cluster leadership acquired – will write OPERATIONAL view 09:37:11.591 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with service class org.opendaylight.restconf.server.mdsal.MdsalRestconfServer 09:37:11.591 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with base path: /rests, default encoding: JSON, default pretty print: false 09:37:11.592 [main] INFO o.o.restconf.server.NettyEndpoint - HTTP/3 is disabled because TLS is not configured 09:37:11.592 [main] INFO o.o.n.common.impl.NettyNetconfTimer - NETCONF timer started 09:37:11.592 [main] INFO o.o.n.c.m.i.DefaultSchemaResourceManager - Schema Resource Manager instantiated on /tmp/junit-12655907274502567010/schema 09:37:11.594 [main] INFO o.o.n.common.impl.NettyNetconfTimer - NETCONF timer started 09:37:11.595 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Starting 1, SSH simulated devices starting on port 37813 09:37:11.595 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Loading models from classpath. 09:37:11.620 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - using MdsalOperationProvider. 09:37:11.622 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - All simulated devices started successfully from port 37813 to 37813 09:37:11.635 [/127.0.0.1:50774-http-server-req-0] INFO o.o.n.t.spi.AbstractNetconfTopology - Connecting RemoteDevice{Uri{value=device-sim}}, with config Node{nodeId=Uri{value=device-sim}, netconfNode=NetconfNode{actorResponseWaitTime=5, backoffJitter=0.1, backoffMultiplier=1.5, concurrentRpcLimit=0, connectionTimeoutMillis=20000, credentials=***, defaultRequestTimeoutMillis=60000, host=Host{ipAddress=IpAddress{ipv4Address=Ipv4Address{value=127.0.0.1}}}, keepaliveDelay=120, lockDatastore=true, maxBackoffMillis=1800000, maxConnectionAttempts=0, minBackoffMillis=2000, port=PortNumber{value=37813}, reconnectOnChangedSchema=false, schemaCacheDirectory=schema, schemaless=false, tcpOnly=false}} 09:37:11.636 [/127.0.0.1:50774-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Adding keepalive facade, for device Uri{value=device-sim} 09:37:11.636 [/127.0.0.1:50774-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Concurrent rpc limit is smaller than 1, no limit will be enforced for device RemoteDeviceId[name=device-sim, address=/127.0.0.1:37813] 09:37:12.343 [netconf-netty-e2e-0] WARN o.o.n.s.s.c.k.AcceptAllServerKeyVerifier - Server at /127.0.0.1:37813 presented unverified RSA key: SHA256:/nBDv/Hap6dY9J3ZbMTnlsUT6vD1a24PBp+bVgOqxnU 09:37:12.348 [netconf-device-simulator-threads-1] INFO o.o.n.t.ssh.TransportServerSession - Session device-username@/127.0.0.1:52610 authenticated 09:37:12.419 [netconf-device-simulator-threads-1] ERROR io.netty.util.ResourceLeakDetector - LEAK: ByteBuf.release() was not called before it's garbage-collected. See https://netty.io/wiki/reference-counted-objects.html for more information. Recent access records: Created at: io.netty.buffer.AbstractByteBufAllocator.compositeDirectBuffer(AbstractByteBufAllocator.java:204) io.netty.buffer.AbstractByteBufAllocator.compositeBuffer(AbstractByteBufAllocator.java:182) io.netty.handler.codec.MessageAggregator.decode(MessageAggregator.java:266) io.netty.handler.codec.http.HttpServerUpgradeHandler.decode(HttpServerUpgradeHandler.java:307) io.netty.handler.codec.http.HttpServerUpgradeHandler.decode(HttpServerUpgradeHandler.java:41) io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:91) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) io.netty.channel.CombinedChannelDuplexHandler$DelegatingChannelHandlerContext.fireChannelRead(CombinedChannelDuplexHandler.java:434) io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:361) io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:325) io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:249) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:355) io.netty.handler.codec.ByteToMessageDecoder.handlerRemoved(ByteToMessageDecoder.java:270) io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:553) io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:484) io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1429) io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:918) io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:176) io.netty.channel.nio.AbstractNioChannel$AbstractNioUnsafe.handle(AbstractNioChannel.java:445) io.netty.channel.nio.NioIoHandler$DefaultNioRegistration.handle(NioIoHandler.java:388) io.netty.channel.nio.NioIoHandler.processSelectedKey(NioIoHandler.java:596) io.netty.channel.nio.NioIoHandler.processSelectedKeysOptimized(NioIoHandler.java:571) io.netty.channel.nio.NioIoHandler.processSelectedKeys(NioIoHandler.java:512) io.netty.channel.nio.NioIoHandler.run(NioIoHandler.java:484) io.netty.channel.SingleThreadIoEventLoop.runIo(SingleThreadIoEventLoop.java:225) io.netty.channel.SingleThreadIoEventLoop.run(SingleThreadIoEventLoop.java:196) io.netty.util.concurrent.SingleThreadEventExecutor$5.run(SingleThreadEventExecutor.java:1195) io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) java.base/java.lang.Thread.run(Thread.java:1583) 09:37:12.452 [topology-schema-assembler-89] INFO o.o.n.c.mdsal.spi.AbstractDataStore - Initialize Candidate data-store operations for device RemoteDeviceId[name=device-sim, address=/127.0.0.1:37813] 09:37:12.455 [topology-schema-assembler-89] INFO o.o.n.client.mdsal.NetconfDevice - RemoteDeviceId[name=device-sim, address=/127.0.0.1:37813]: Netconf connector initialized successfully 09:37:12.782 [main] WARN o.o.n.c.m.NetconfDeviceCommunicator - RemoteDeviceId[name=device-sim, address=/127.0.0.1:37813]: Session terminated Session closed 09:37:12.785 [main] INFO o.o.r.s.m.MdsalRestconfStreamRegistry - Cluster leadership lost – stop writing OPERATIONAL view 09:37:12.785 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router stopped 09:37:12.785 [main] INFO o.o.mdsal.dom.broker.DOMRpcRouter - DOM RPC/Action router stopped 09:37:12.789 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router started 09:37:12.790 [main] INFO o.o.mdsal.dom.broker.DOMRpcRouter - DOM RPC/Action router started 09:37:12.796 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router started 09:37:12.796 [main] INFO o.o.r.s.m.MdsalRestconfStreamRegistry - Cluster leadership acquired – will write OPERATIONAL view 09:37:12.797 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with service class org.opendaylight.restconf.server.mdsal.MdsalRestconfServer 09:37:12.797 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with base path: /rests, default encoding: JSON, default pretty print: false 09:37:12.798 [main] INFO o.o.restconf.server.NettyEndpoint - HTTP/3 is disabled because TLS is not configured 09:37:12.798 [main] INFO o.o.n.common.impl.NettyNetconfTimer - NETCONF timer started 09:37:12.799 [main] INFO o.o.n.c.m.i.DefaultSchemaResourceManager - Schema Resource Manager instantiated on /tmp/junit-15470019706140018524/schema 09:37:12.800 [main] INFO o.o.n.common.impl.NettyNetconfTimer - NETCONF timer started 09:37:12.801 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Starting 1, SSH simulated devices starting on port 38281 09:37:12.801 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Loading models from classpath. 09:37:12.834 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - using MdsalOperationProvider. 09:37:12.836 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - All simulated devices started successfully from port 38281 to 38281 09:37:12.850 [/127.0.0.1:38748-http-server-req-0] INFO o.o.n.t.spi.AbstractNetconfTopology - Connecting RemoteDevice{Uri{value=device-sim}}, with config Node{nodeId=Uri{value=device-sim}, netconfNode=NetconfNode{actorResponseWaitTime=5, backoffJitter=0.1, backoffMultiplier=1.5, concurrentRpcLimit=0, connectionTimeoutMillis=20000, credentials=***, defaultRequestTimeoutMillis=60000, host=Host{ipAddress=IpAddress{ipv4Address=Ipv4Address{value=127.0.0.1}}}, keepaliveDelay=120, lockDatastore=true, maxBackoffMillis=1800000, maxConnectionAttempts=0, minBackoffMillis=2000, port=PortNumber{value=38281}, reconnectOnChangedSchema=false, schemaCacheDirectory=schema, schemaless=false, tcpOnly=false}} 09:37:12.850 [/127.0.0.1:38748-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Adding keepalive facade, for device Uri{value=device-sim} 09:37:12.850 [/127.0.0.1:38748-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Concurrent rpc limit is smaller than 1, no limit will be enforced for device RemoteDeviceId[name=device-sim, address=/127.0.0.1:38281] 09:37:13.448 [netconf-netty-e2e-2] WARN o.o.n.s.s.c.k.AcceptAllServerKeyVerifier - Server at /127.0.0.1:38281 presented unverified RSA key: SHA256:Kkd9tsvh39Kq2wtZdawDdpZVo3vcWIvN76NEmdLV2dI 09:37:13.454 [netconf-device-simulator-threads-1] INFO o.o.n.t.ssh.TransportServerSession - Session device-username@/127.0.0.1:52080 authenticated 09:37:13.456 [netconf-netty-e2e-2] ERROR io.netty.util.ResourceLeakDetector - LEAK: ByteBuf.release() was not called before it's garbage-collected. See https://netty.io/wiki/reference-counted-objects.html for more information. Recent access records: Created at: io.netty.buffer.AbstractByteBufAllocator.compositeDirectBuffer(AbstractByteBufAllocator.java:204) io.netty.buffer.AbstractByteBufAllocator.compositeBuffer(AbstractByteBufAllocator.java:182) io.netty.handler.codec.MessageAggregator.decode(MessageAggregator.java:266) io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:91) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:107) io.netty.handler.codec.MessageToMessageCodec.channelRead(MessageToMessageCodec.java:120) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:355) io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1429) io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:918) io.netty.handler.codec.http2.AbstractHttp2StreamChannel$Http2ChannelUnsafe.doRead0(AbstractHttp2StreamChannel.java:981) io.netty.handler.codec.http2.AbstractHttp2StreamChannel.fireChildRead(AbstractHttp2StreamChannel.java:601) io.netty.handler.codec.http2.Http2MultiplexHandler.channelRead(Http2MultiplexHandler.java:188) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:355) io.netty.handler.codec.http2.Http2FrameCodec.onHttp2Frame(Http2FrameCodec.java:723) io.netty.handler.codec.http2.Http2FrameCodec$FrameListener.onHeadersRead(Http2FrameCodec.java:645) io.netty.handler.codec.http2.Http2FrameCodec$FrameListener.onHeadersRead(Http2FrameCodec.java:638) io.netty.handler.codec.http2.Http2FrameListenerDecorator.onHeadersRead(Http2FrameListenerDecorator.java:46) io.netty.handler.codec.http2.Http2FrameListenerDecorator.onHeadersRead(Http2FrameListenerDecorator.java:46) io.netty.handler.codec.http2.Http2EmptyDataFrameListener.onHeadersRead(Http2EmptyDataFrameListener.java:63) io.netty.handler.codec.http2.DefaultHttp2ConnectionDecoder$FrameReadListener.onHeadersRead(DefaultHttp2ConnectionDecoder.java:423) io.netty.handler.codec.http2.DefaultHttp2ConnectionDecoder$FrameReadListener.onHeadersRead(DefaultHttp2ConnectionDecoder.java:338) io.netty.handler.codec.http2.Http2InboundFrameLogger$1.onHeadersRead(Http2InboundFrameLogger.java:54) io.netty.handler.codec.http2.DefaultHttp2FrameReader$2.processFragment(DefaultHttp2FrameReader.java:473) io.netty.handler.codec.http2.DefaultHttp2FrameReader.readHeadersFrame(DefaultHttp2FrameReader.java:481) io.netty.handler.codec.http2.DefaultHttp2FrameReader.processPayloadState(DefaultHttp2FrameReader.java:247) io.netty.handler.codec.http2.DefaultHttp2FrameReader.readFrame(DefaultHttp2FrameReader.java:164) io.netty.handler.codec.http2.Http2InboundFrameLogger.readFrame(Http2InboundFrameLogger.java:39) io.netty.handler.codec.http2.DefaultHttp2ConnectionDecoder.decodeFrame(DefaultHttp2ConnectionDecoder.java:186) io.netty.handler.codec.http2.DecoratingHttp2ConnectionDecoder.decodeFrame(DecoratingHttp2ConnectionDecoder.java:61) io.netty.handler.codec.http2.DecoratingHttp2ConnectionDecoder.decodeFrame(DecoratingHttp2ConnectionDecoder.java:61) io.netty.handler.codec.http2.Http2ConnectionHandler$FrameDecoder.decode(Http2ConnectionHandler.java:400) io.netty.handler.codec.http2.Http2ConnectionHandler.decode(Http2ConnectionHandler.java:460) io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:545) io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:484) io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296) io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1429) io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:918) io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:176) io.netty.channel.nio.AbstractNioChannel$AbstractNioUnsafe.handle(AbstractNioChannel.java:445) io.netty.channel.nio.NioIoHandler$DefaultNioRegistration.handle(NioIoHandler.java:388) io.netty.channel.nio.NioIoHandler.processSelectedKey(NioIoHandler.java:596) io.netty.channel.nio.NioIoHandler.processSelectedKeysOptimized(NioIoHandler.java:571) io.netty.channel.nio.NioIoHandler.processSelectedKeys(NioIoHandler.java:512) io.netty.channel.nio.NioIoHandler.run(NioIoHandler.java:484) io.netty.channel.SingleThreadIoEventLoop.runIo(SingleThreadIoEventLoop.java:225) io.netty.channel.SingleThreadIoEventLoop.run(SingleThreadIoEventLoop.java:196) io.netty.util.concurrent.SingleThreadEventExecutor$5.run(SingleThreadEventExecutor.java:1195) io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) java.base/java.lang.Thread.run(Thread.java:1583) 09:37:13.548 [topology-schema-assembler-94] INFO o.o.n.c.mdsal.spi.AbstractDataStore - Initialize Candidate data-store operations for device RemoteDeviceId[name=device-sim, address=/127.0.0.1:38281] 09:37:13.550 [topology-schema-assembler-94] INFO o.o.n.client.mdsal.NetconfDevice - RemoteDeviceId[name=device-sim, address=/127.0.0.1:38281]: Netconf connector initialized successfully 09:37:13.917 [netconf-netty-e2e-2] INFO o.o.n.c.m.NetconfDeviceCommunicator - RemoteDeviceId[name=device-sim, address=/127.0.0.1:38281]: Session went down: End of input 09:37:13.918 [main] INFO o.o.r.s.m.MdsalRestconfStreamRegistry - Cluster leadership lost – stop writing OPERATIONAL view 09:37:13.919 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router stopped 09:37:13.919 [main] INFO o.o.mdsal.dom.broker.DOMRpcRouter - DOM RPC/Action router stopped 09:37:13.921 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router started 09:37:13.921 [main] INFO o.o.mdsal.dom.broker.DOMRpcRouter - DOM RPC/Action router started 09:37:13.925 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router started 09:37:13.925 [main] INFO o.o.r.s.m.MdsalRestconfStreamRegistry - Cluster leadership acquired – will write OPERATIONAL view 09:37:13.926 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with service class org.opendaylight.restconf.server.mdsal.MdsalRestconfServer 09:37:13.926 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with base path: /rests, default encoding: JSON, default pretty print: false 09:37:13.926 [main] INFO o.o.restconf.server.NettyEndpoint - HTTP/3 is disabled because TLS is not configured 09:37:13.927 [main] INFO o.o.n.common.impl.NettyNetconfTimer - NETCONF timer started 09:37:13.927 [main] INFO o.o.n.c.m.i.DefaultSchemaResourceManager - Schema Resource Manager instantiated on /tmp/junit-3041473733695719985/schema 09:37:13.929 [main] INFO o.o.n.common.impl.NettyNetconfTimer - NETCONF timer started 09:37:13.929 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Starting 1, SSH simulated devices starting on port 42247 09:37:13.929 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Loading models from classpath. 09:37:13.954 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - using MdsalOperationProvider. 09:37:13.956 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - All simulated devices started successfully from port 42247 to 42247 09:37:13.968 [/127.0.0.1:47582-http-server-req-0] INFO o.o.n.t.spi.AbstractNetconfTopology - Connecting RemoteDevice{Uri{value=device-sim}}, with config Node{nodeId=Uri{value=device-sim}, netconfNode=NetconfNode{actorResponseWaitTime=5, backoffJitter=0.1, backoffMultiplier=1.5, concurrentRpcLimit=0, connectionTimeoutMillis=20000, credentials=***, defaultRequestTimeoutMillis=60000, host=Host{ipAddress=IpAddress{ipv4Address=Ipv4Address{value=127.0.0.1}}}, keepaliveDelay=120, lockDatastore=true, maxBackoffMillis=1800000, maxConnectionAttempts=0, minBackoffMillis=2000, port=PortNumber{value=42247}, reconnectOnChangedSchema=false, schemaCacheDirectory=schema, schemaless=false, tcpOnly=false}} 09:37:13.969 [/127.0.0.1:47582-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Adding keepalive facade, for device Uri{value=device-sim} 09:37:13.969 [/127.0.0.1:47582-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Concurrent rpc limit is smaller than 1, no limit will be enforced for device RemoteDeviceId[name=device-sim, address=/127.0.0.1:42247] 09:37:14.269 [netconf-netty-e2e-4] WARN o.o.n.s.s.c.k.AcceptAllServerKeyVerifier - Server at /127.0.0.1:42247 presented unverified RSA key: SHA256:UQCMSX9T56QWQZr+3vtLMPfcdlR+Kd4mDNtYAFTfFjY 09:37:14.271 [netconf-device-simulator-threads-1] INFO o.o.n.t.ssh.TransportServerSession - Session device-username@/127.0.0.1:59130 authenticated 09:37:14.366 [topology-schema-assembler-99] INFO o.o.n.c.mdsal.spi.AbstractDataStore - Initialize Candidate data-store operations for device RemoteDeviceId[name=device-sim, address=/127.0.0.1:42247] 09:37:14.369 [topology-schema-assembler-99] INFO o.o.n.client.mdsal.NetconfDevice - RemoteDeviceId[name=device-sim, address=/127.0.0.1:42247]: Netconf connector initialized successfully 09:37:14.497 [netconf-netty-e2e-4] INFO o.o.n.c.m.NetconfDeviceCommunicator - RemoteDeviceId[name=device-sim, address=/127.0.0.1:42247]: Session went down: End of input 09:37:14.500 [main] INFO o.o.r.s.m.MdsalRestconfStreamRegistry - Cluster leadership lost – stop writing OPERATIONAL view 09:37:14.500 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router stopped 09:37:14.500 [main] INFO o.o.mdsal.dom.broker.DOMRpcRouter - DOM RPC/Action router stopped 09:37:14.503 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router started 09:37:14.503 [main] INFO o.o.mdsal.dom.broker.DOMRpcRouter - DOM RPC/Action router started 09:37:14.507 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router started 09:37:14.507 [main] INFO o.o.r.s.m.MdsalRestconfStreamRegistry - Cluster leadership acquired – will write OPERATIONAL view 09:37:14.508 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with service class org.opendaylight.restconf.server.mdsal.MdsalRestconfServer 09:37:14.508 [main] INFO o.o.r.s.RestconfTransportChannelListener - Initialized with base path: /rests, default encoding: JSON, default pretty print: false 09:37:14.509 [main] INFO o.o.restconf.server.NettyEndpoint - HTTP/3 is disabled because TLS is not configured 09:37:14.509 [main] INFO o.o.n.common.impl.NettyNetconfTimer - NETCONF timer started 09:37:14.510 [main] INFO o.o.n.c.m.i.DefaultSchemaResourceManager - Schema Resource Manager instantiated on /tmp/junit-10732935466277331711/schema 09:37:14.512 [main] INFO o.o.n.common.impl.NettyNetconfTimer - NETCONF timer started 09:37:14.512 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Starting 1, SSH simulated devices starting on port 45073 09:37:14.512 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - Loading models from classpath. 09:37:14.538 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - using SimulatedOperationProvider. 09:37:14.540 [main] INFO o.o.n.t.tool.NetconfDeviceSimulator - All simulated devices started successfully from port 45073 to 45073 09:37:14.553 [/127.0.0.1:52072-http-server-req-0] INFO o.o.n.t.spi.AbstractNetconfTopology - Connecting RemoteDevice{Uri{value=device-sim}}, with config Node{nodeId=Uri{value=device-sim}, netconfNode=NetconfNode{actorResponseWaitTime=5, backoffJitter=0.1, backoffMultiplier=1.5, concurrentRpcLimit=0, connectionTimeoutMillis=20000, credentials=***, defaultRequestTimeoutMillis=60000, host=Host{ipAddress=IpAddress{ipv4Address=Ipv4Address{value=127.0.0.1}}}, keepaliveDelay=120, lockDatastore=true, maxBackoffMillis=1800000, maxConnectionAttempts=0, minBackoffMillis=2000, port=PortNumber{value=45073}, reconnectOnChangedSchema=false, schemaCacheDirectory=schema, schemaless=false, tcpOnly=false}} 09:37:14.554 [/127.0.0.1:52072-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Adding keepalive facade, for device Uri{value=device-sim} 09:37:14.554 [/127.0.0.1:52072-http-server-req-0] INFO o.o.n.t.spi.NetconfNodeHandler - Concurrent rpc limit is smaller than 1, no limit will be enforced for device RemoteDeviceId[name=device-sim, address=/127.0.0.1:45073] 09:37:14.949 [netconf-netty-e2e-6] WARN o.o.n.s.s.c.k.AcceptAllServerKeyVerifier - Server at /127.0.0.1:45073 presented unverified RSA key: SHA256:Du6x2icik5E/1dAI3UoNr9tzt04C5OcbaVXQ7vcdG7A 09:37:14.952 [netconf-device-simulator-threads-1] INFO o.o.n.t.ssh.TransportServerSession - Session device-username@/127.0.0.1:38618 authenticated 09:37:15.029 [netconf-device-simulator-threads-1] INFO o.o.n.t.t.r.RpcHandlerDefault - getResponse: XmlElement{name='get', namespace='urn:ietf:params:xml:ns:netconf:base:1.0'} 09:37:15.108 [topology-schema-assembler-104] INFO o.o.n.c.mdsal.spi.AbstractDataStore - Initialize Candidate data-store operations for device RemoteDeviceId[name=device-sim, address=/127.0.0.1:45073] 09:37:15.111 [topology-schema-assembler-104] INFO o.o.n.client.mdsal.NetconfDevice - RemoteDeviceId[name=device-sim, address=/127.0.0.1:45073]: Netconf connector initialized successfully 09:37:15.610 [netconf-device-simulator-threads-1] INFO o.o.n.t.t.r.RpcHandlerDefault - getResponse: XmlElement{name='create-subscription', namespace='urn:ietf:params:xml:ns:netconf:notification:1.0'} 09:37:15.828 [restconf-netty-e2e-2] INFO o.o.n.t.http.ClientHttp1SseService - Client SSE enabled on channel [id: 0x83ccada3, L:/127.0.0.1:52080 - R:/127.0.0.1:46259] 09:37:17.721 [netconf-netty-e2e-6] INFO o.o.n.c.m.NetconfDeviceCommunicator - RemoteDeviceId[name=device-sim, address=/127.0.0.1:45073]: Session went down: End of input 09:37:17.725 [main] INFO o.o.r.s.m.MdsalRestconfStreamRegistry - Cluster leadership lost – stop writing OPERATIONAL view 09:37:17.725 [main] INFO o.o.m.d.broker.DOMNotificationRouter - DOM Notification Router stopped 09:37:17.725 [main] INFO o.o.mdsal.dom.broker.DOMRpcRouter - DOM RPC/Action router stopped