OK, I have it now. For some reason the patch hunk against CHANGES and the docs fail to apply. I have removed those hunks and the patch applied cleanly now.
Here is the output from curl:
> + curl --verbose --http1.1 --anyauth -u : -f -s --upload-file target/lda-docgen-webapp-0.2-SNAPSHOT-backend-dev-anon.war -o manager-response.txt 'https://sitex-ldadw.ad001.siemens.net/backend-dev-anon/manager-1/text/deploy?path=/backend-dev-anon&update=false&version=009' > * Uses proxy env variable NO_PROXY == 'localhost .siemens.net .siemens.com .siemens.de' > * Trying 147.54.64.149... > * TCP_NODELAY set > * Connected to sitex-ldadw.ad001.siemens.net (147.54.64.149) port 443 (#0) > * ALPN, offering http/1.1 > * successfully set certificate verify locations: > * CAfile: /usr/local/etc/ssl/cert.pem > CApath: none > } [5 bytes data] > * TLSv1.3 (OUT), TLS handshake, Client hello (1): > } [512 bytes data] > * TLSv1.3 (IN), TLS handshake, Server hello (2): > { [122 bytes data] > * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): > { [25 bytes data] > * TLSv1.3 (IN), TLS handshake, Certificate (11): > { [6195 bytes data] > * TLSv1.3 (IN), TLS handshake, CERT verify (15): > { [520 bytes data] > * TLSv1.3 (IN), TLS handshake, Finished (20): > { [52 bytes data] > * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): > } [1 bytes data] > * TLSv1.3 (OUT), TLS handshake, Finished (20): > } [52 bytes data] > * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 > * ALPN, server accepted to use http/1.1 > * Server certificate: > * subject: C=DE; O=Siemens; OU=LDA DW; CN=sitex-ldadw.ad001.siemens.net > * start date: Mar 19 13:10:13 2019 GMT > * expire date: Mar 19 13:10:13 2020 GMT > * subjectAltName: host "sitex-ldadw.ad001.siemens.net" matched cert's "sitex-ldadw.ad001.siemens.net" > * issuer: C=DE; ST=Bayern; L=Muenchen; O=Siemens; serialNumber=ZZZZZZB7; OU=Siemens Trust Center; CN=Siemens Issuing CA Intranet Server 2017 > * SSL certificate verify ok. > } [5 bytes data] > > PUT /backend-dev-anon/manager-1/text/deploy?path=/backend-dev-anon&update=false&version=009 HTTP/1.1 > > Host: sitex-ldadw.ad001.siemens.net > > User-Agent: curl/7.64.1 > > Accept: */* > > Content-Length: 6501669 > > Expect: 100-continue > > > { [5 bytes data] > * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): > { [297 bytes data] > * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): > { [297 bytes data] > * old SSL session ID is stale, removing > { [5 bytes data] > < HTTP/1.1 401 > < Date: Wed, 03 Apr 2019 13:04:06 GMT > < Server: Apache/2.4.39 (FreeBSD) OpenSSL/1.1.1a-freebsd mod_auth_gssapi/1.6.1 > < X-Frame-Options: SAMEORIGIN > < Cache-Control: private > < Expires: Thu, 01 Jan 1970 00:00:00 GMT > < WWW-Authenticate: Negotiate > < Content-Type: text/html;charset=utf-8 > < Content-Language: en > < Content-Length: 802 > < Connection: close > < > * Closing connection 0 > } [5 bytes data] > * TLSv1.3 (OUT), TLS alert, close notify (256): > } [2 bytes data] > * Issue another request to this URL: 'https://sitex-ldadw.ad001.siemens.net/backend-dev-anon/manager-1/text/deploy?path=/backend-dev-anon&update=false&version=009' > * Uses proxy env variable NO_PROXY == 'localhost .siemens.net .siemens.com .siemens.de' > * Hostname sitex-ldadw.ad001.siemens.net was found in DNS cache > * Trying 147.54.64.149... > * TCP_NODELAY set > * Connected to sitex-ldadw.ad001.siemens.net (147.54.64.149) port 443 (#1) > * ALPN, offering http/1.1 > * successfully set certificate verify locations: > * CAfile: /usr/local/etc/ssl/cert.pem > CApath: none > * SSL re-using session ID > } [5 bytes data] > * TLSv1.3 (OUT), TLS handshake, Client hello (1): > } [680 bytes data] > * TLSv1.3 (IN), TLS handshake, Server hello (2): > { [128 bytes data] > * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): > { [21 bytes data] > * TLSv1.3 (IN), TLS handshake, Finished (20): > { [52 bytes data] > * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): > } [1 bytes data] > * TLSv1.3 (OUT), TLS handshake, Finished (20): > } [52 bytes data] > * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 > * ALPN, server accepted to use http/1.1 > * Server certificate: > * subject: C=DE; O=Siemens; OU=LDA DW; CN=sitex-ldadw.ad001.siemens.net > * start date: Mar 19 13:10:13 2019 GMT > * expire date: Mar 19 13:10:13 2020 GMT > * subjectAltName: host "sitex-ldadw.ad001.siemens.net" matched cert's "sitex-ldadw.ad001.siemens.net" > * issuer: C=DE; ST=Bayern; L=Muenchen; O=Siemens; serialNumber=ZZZZZZB7; OU=Siemens Trust Center; CN=Siemens Issuing CA Intranet Server 2017 > * SSL certificate verify ok. > * Server auth using Negotiate with user '' > } [5 bytes data] > > PUT /backend-dev-anon/manager-1/text/deploy?path=/backend-dev-anon&update=false&version=009 HTTP/1.1 > > Host: sitex-ldadw.ad001.siemens.net > > Authorization: Negotiate YIIR9QYGKwYBBQUCoIIR6TCCEe... > > User-Agent: curl/7.64.1 > > Accept: */* > > Content-Length: 6501669 > > Expect: 100-continue > > > { [5 bytes data] > * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): > { [297 bytes data] > * old SSL session ID is stale, removing > * Done waiting for 100-continue > } [5 bytes data] > < HTTP/1.1 100 > } [5 bytes data] > * We are completely uploaded and fine > { [5 bytes data] > < HTTP/1.1 200 > < Date: Wed, 03 Apr 2019 13:04:09 GMT > < Server: Apache/2.4.39 (FreeBSD) OpenSSL/1.1.1a-freebsd mod_auth_gssapi/1.6.1 > < X-Frame-Options: SAMEORIGIN > < Cache-Control: private > < Expires: Thu, 01 Jan 1970 00:00:00 GMT > < WWW-Authenticate: Negotiate oYH1MIHyoAMKAQChCwYJKoZIhvcSA... > < X-Content-Type-Options: nosniff > < Content-Type: text/plain;charset=utf-8 > < Transfer-Encoding: chunked > < > { [78 bytes data] > * Connection #1 to host sitex-ldadw.ad001.siemens.net left intact > * Closing connection 1
Looking forward to 2.4.40...
OK, I have it now. For some reason the patch hunk against CHANGES and the docs fail to apply. I have removed those hunks and the patch applied cleanly now.
Here is the output from curl:
> + curl --verbose --http1.1 --anyauth -u : -f -s --upload-file target/ lda-docgen- webapp- 0.2-SNAPSHOT- backend- dev-anon. war -o manager- response. txt 'https:/ /sitex- ldadw.ad001. siemens. net/backend- dev-anon/ manager- 1/text/ deploy? path=/backend- dev-anon& update= false&version= 009' ad001.siemens. net (147.54.64.149) port 443 (#0) etc/ssl/ cert.pem 256_GCM_ SHA384 ldadw.ad001. siemens. net ldadw.ad001. siemens. net" matched cert's "sitex- ldadw.ad001. siemens. net" ZZZZZZB7; OU=Siemens Trust Center; CN=Siemens Issuing CA Intranet Server 2017 dev-anon/ manager- 1/text/ deploy? path=/backend- dev-anon& update= false&version= 009 HTTP/1.1 ad001.siemens. net 1.1.1a- freebsd mod_auth_ gssapi/ 1.6.1 charset= utf-8 /sitex- ldadw.ad001. siemens. net/backend- dev-anon/ manager- 1/text/ deploy? path=/backend- dev-anon& update= false&version= 009' ad001.siemens. net was found in DNS cache ad001.siemens. net (147.54.64.149) port 443 (#1) etc/ssl/ cert.pem 256_GCM_ SHA384 ldadw.ad001. siemens. net ldadw.ad001. siemens. net" matched cert's "sitex- ldadw.ad001. siemens. net" ZZZZZZB7; OU=Siemens Trust Center; CN=Siemens Issuing CA Intranet Server 2017 dev-anon/ manager- 1/text/ deploy? path=/backend- dev-anon& update= false&version= 009 HTTP/1.1 ad001.siemens. net CoIIR6TCCEe. .. 1.1.1a- freebsd mod_auth_ gssapi/ 1.6.1 hCwYJKoZIhvcSA. .. Type-Options: nosniff charset= utf-8 ad001.siemens. net left intact
> * Uses proxy env variable NO_PROXY == 'localhost .siemens.net .siemens.com .siemens.de'
> * Trying 147.54.64.149...
> * TCP_NODELAY set
> * Connected to sitex-ldadw.
> * ALPN, offering http/1.1
> * successfully set certificate verify locations:
> * CAfile: /usr/local/
> CApath: none
> } [5 bytes data]
> * TLSv1.3 (OUT), TLS handshake, Client hello (1):
> } [512 bytes data]
> * TLSv1.3 (IN), TLS handshake, Server hello (2):
> { [122 bytes data]
> * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
> { [25 bytes data]
> * TLSv1.3 (IN), TLS handshake, Certificate (11):
> { [6195 bytes data]
> * TLSv1.3 (IN), TLS handshake, CERT verify (15):
> { [520 bytes data]
> * TLSv1.3 (IN), TLS handshake, Finished (20):
> { [52 bytes data]
> * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
> } [1 bytes data]
> * TLSv1.3 (OUT), TLS handshake, Finished (20):
> } [52 bytes data]
> * SSL connection using TLSv1.3 / TLS_AES_
> * ALPN, server accepted to use http/1.1
> * Server certificate:
> * subject: C=DE; O=Siemens; OU=LDA DW; CN=sitex-
> * start date: Mar 19 13:10:13 2019 GMT
> * expire date: Mar 19 13:10:13 2020 GMT
> * subjectAltName: host "sitex-
> * issuer: C=DE; ST=Bayern; L=Muenchen; O=Siemens; serialNumber=
> * SSL certificate verify ok.
> } [5 bytes data]
> > PUT /backend-
> > Host: sitex-ldadw.
> > User-Agent: curl/7.64.1
> > Accept: */*
> > Content-Length: 6501669
> > Expect: 100-continue
> >
> { [5 bytes data]
> * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
> { [297 bytes data]
> * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
> { [297 bytes data]
> * old SSL session ID is stale, removing
> { [5 bytes data]
> < HTTP/1.1 401
> < Date: Wed, 03 Apr 2019 13:04:06 GMT
> < Server: Apache/2.4.39 (FreeBSD) OpenSSL/
> < X-Frame-Options: SAMEORIGIN
> < Cache-Control: private
> < Expires: Thu, 01 Jan 1970 00:00:00 GMT
> < WWW-Authenticate: Negotiate
> < Content-Type: text/html;
> < Content-Language: en
> < Content-Length: 802
> < Connection: close
> <
> * Closing connection 0
> } [5 bytes data]
> * TLSv1.3 (OUT), TLS alert, close notify (256):
> } [2 bytes data]
> * Issue another request to this URL: 'https:/
> * Uses proxy env variable NO_PROXY == 'localhost .siemens.net .siemens.com .siemens.de'
> * Hostname sitex-ldadw.
> * Trying 147.54.64.149...
> * TCP_NODELAY set
> * Connected to sitex-ldadw.
> * ALPN, offering http/1.1
> * successfully set certificate verify locations:
> * CAfile: /usr/local/
> CApath: none
> * SSL re-using session ID
> } [5 bytes data]
> * TLSv1.3 (OUT), TLS handshake, Client hello (1):
> } [680 bytes data]
> * TLSv1.3 (IN), TLS handshake, Server hello (2):
> { [128 bytes data]
> * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
> { [21 bytes data]
> * TLSv1.3 (IN), TLS handshake, Finished (20):
> { [52 bytes data]
> * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
> } [1 bytes data]
> * TLSv1.3 (OUT), TLS handshake, Finished (20):
> } [52 bytes data]
> * SSL connection using TLSv1.3 / TLS_AES_
> * ALPN, server accepted to use http/1.1
> * Server certificate:
> * subject: C=DE; O=Siemens; OU=LDA DW; CN=sitex-
> * start date: Mar 19 13:10:13 2019 GMT
> * expire date: Mar 19 13:10:13 2020 GMT
> * subjectAltName: host "sitex-
> * issuer: C=DE; ST=Bayern; L=Muenchen; O=Siemens; serialNumber=
> * SSL certificate verify ok.
> * Server auth using Negotiate with user ''
> } [5 bytes data]
> > PUT /backend-
> > Host: sitex-ldadw.
> > Authorization: Negotiate YIIR9QYGKwYBBQU
> > User-Agent: curl/7.64.1
> > Accept: */*
> > Content-Length: 6501669
> > Expect: 100-continue
> >
> { [5 bytes data]
> * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
> { [297 bytes data]
> * old SSL session ID is stale, removing
> * Done waiting for 100-continue
> } [5 bytes data]
> < HTTP/1.1 100
> } [5 bytes data]
> * We are completely uploaded and fine
> { [5 bytes data]
> < HTTP/1.1 200
> < Date: Wed, 03 Apr 2019 13:04:09 GMT
> < Server: Apache/2.4.39 (FreeBSD) OpenSSL/
> < X-Frame-Options: SAMEORIGIN
> < Cache-Control: private
> < Expires: Thu, 01 Jan 1970 00:00:00 GMT
> < WWW-Authenticate: Negotiate oYH1MIHyoAMKAQC
> < X-Content-
> < Content-Type: text/plain;
> < Transfer-Encoding: chunked
> <
> { [78 bytes data]
> * Connection #1 to host sitex-ldadw.
> * Closing connection 1
Looking forward to 2.4.40...