Modify ↓
Opened 9 years ago
Closed 9 years ago
#13490 closed defect (duplicate)
SSLException
Reported by: | anonymous | Owned by: | anonymous |
---|---|---|---|
Priority: | normal | Milestone: | |
Component: | Plugin mapillary | Version: | latest |
Keywords: | Cc: |
Description
URL:http://josm.openstreetmap.de/svn/trunk Repository:UUID: 0c6e7542-c601-0410-84e7-c038aed88b3b Last:Changed Date: 2016-08-29 20:19:31 +0200 (Mon, 29 Aug 2016) Build-Date:2016-08-30 01:33:55 Revision:10916 Relative:URL: ^/trunk Identification: JOSM/1.5 (10916 de) Linux Debian GNU/Linux 8.5 (jessie) Java version: 1.8.0_102-8u102-b14.1-1~bpo8+1-b14, Oracle Corporation, OpenJDK 64-Bit Server VM Plugins: + Mapillary (32796) === REPORTED CRASH DATA === BugReportExceptionHandler#handleException: No data collected. Warning issued by: BugReportExceptionHandler#handleException === STACK TRACE === Thread: pool-351-thread-1 (6625) javax.json.JsonException: I/O error while parsing JSON at org.glassfish.json.JsonTokenizer.read(JsonTokenizer.java:444) at org.glassfish.json.JsonTokenizer.nextToken(JsonTokenizer.java:354) at org.glassfish.json.JsonParserImpl$ArrayContext.getNextEvent(JsonParserImpl.java:303) at org.glassfish.json.JsonParserImpl$StateIterator.next(JsonParserImpl.java:172) at org.glassfish.json.JsonParserImpl.next(JsonParserImpl.java:149) at org.glassfish.json.JsonReaderImpl.readArray(JsonReaderImpl.java:136) at org.glassfish.json.JsonReaderImpl.readObject(JsonReaderImpl.java:180) at org.glassfish.json.JsonReaderImpl.readArray(JsonReaderImpl.java:143) at org.glassfish.json.JsonReaderImpl.readObject(JsonReaderImpl.java:180) at org.glassfish.json.JsonReaderImpl.readObject(JsonReaderImpl.java:103) at org.openstreetmap.josm.plugins.mapillary.io.download.MapillarySequenceDownloadThread.run(MapillarySequenceDownloadThread.java:59) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) at java.lang.Thread.run(Thread.java:745) Caused by: javax.net.ssl.SSLException: SSL peer shut down incorrectly at sun.security.ssl.InputRecord.readV3Record(InputRecord.java:596) at sun.security.ssl.InputRecord.read(InputRecord.java:532) at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:973) at sun.security.ssl.SSLSocketImpl.readDataRecord(SSLSocketImpl.java:930) at sun.security.ssl.AppInputStream.read(AppInputStream.java:105) at java.io.BufferedInputStream.fill(BufferedInputStream.java:246) at java.io.BufferedInputStream.read1(BufferedInputStream.java:286) at java.io.BufferedInputStream.read(BufferedInputStream.java:345) at sun.net.www.http.ChunkedInputStream.fastRead(ChunkedInputStream.java:244) at sun.net.www.http.ChunkedInputStream.read(ChunkedInputStream.java:689) at java.io.FilterInputStream.read(FilterInputStream.java:133) at sun.net.www.protocol.http.HttpURLConnection$HttpInputStream.read(HttpURLConnection.java:3336) at sun.nio.cs.StreamDecoder.readBytes(StreamDecoder.java:284) at sun.nio.cs.StreamDecoder.implRead(StreamDecoder.java:326) at sun.nio.cs.StreamDecoder.read(StreamDecoder.java:178) at java.io.InputStreamReader.read(InputStreamReader.java:184) at java.io.BufferedReader.fill(BufferedReader.java:161) at java.io.BufferedReader.read1(BufferedReader.java:212) at java.io.BufferedReader.read(BufferedReader.java:286) at org.glassfish.json.JsonTokenizer.fillBuf(JsonTokenizer.java:473) at org.glassfish.json.JsonTokenizer.read(JsonTokenizer.java:434) ... 13 more
Attachments (0)
Change History (2)
comment:1 by , 9 years ago
Owner: | changed from | to
---|---|
Status: | new → needinfo |
comment:2 by , 9 years ago
Resolution: | → duplicate |
---|---|
Status: | needinfo → closed |
Closed as duplicate of #13338.
Note:
See TracTickets
for help on using tickets.
Thanks for your report, however your ticket is incomplete and therefore not helpful in its current form.
Please add all needed information according to this list:
To ensure that all technical relevant information is contained, create new tickets by clicking in JOSMs Main Menu on Help →
Report Bug.
Remember: This is a generic notice so we don't need to write the same stuff again and again. It may only apply in parts to the specific case!