Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5463/
1 tests failed.
FAILED:
org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection
Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
at
__randomizedtesting.SeedInfo.seed([850CD7CAE76F2F01:B0F83C910CB3195F]:0)
at org.junit.Assert.fail(Assert.java:89)
at org.junit.Assert.failNotEquals(Assert.java:835)
at org.junit.Assert.assertEquals(Assert.java:120)
at org.junit.Assert.assertEquals(Assert.java:146)
at
org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:209)
at
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at
java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
at
com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at
com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at
com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at
com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at
com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
at org.junit.rules.RunRules.evaluate(RunRules.java:20)
at
org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
at
org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at
org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at
org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at
org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.junit.rules.RunRules.evaluate(RunRules.java:20)
at
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at
com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
at
com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
at
com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
at
com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at
com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at
com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at
com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at
org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at
org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at
com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
at org.junit.rules.RunRules.evaluate(RunRules.java:20)
at
org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at
org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at
com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at
com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at
org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at
org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at
org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at
org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at
org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at org.junit.rules.RunRules.evaluate(RunRules.java:20)
at
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at
com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
at
com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
at java.base/java.lang.Thread.run(Thread.java:829)
Build Log:
[...truncated 6240 lines...]
# ERROR: IOException occurred when talking to server at:
https://localhost:8983/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at:
/tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO - 2023-09-16 15:33:05.364;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-09-16 15:33:05.370;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException:
IOException occurred when talking to server at:
https://localhost:8983/solr/admin/info/system
# at
org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: No subject alternative DNS
name matching localhost found.
# at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# at
java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# at
java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# at java.base/java.security.AccessController.doPrivileged(Native Method)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# at
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# at
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# at
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# at
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# at
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# at
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# at
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# at java.base/java.lang.Thread.run(Thread.java:829)
# Suppressed: java.io.IOException: Broken pipe
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# at
org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# at
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# at
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# at
org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# at
org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# at
org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# at
org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# at
org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# at
org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# at
org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# at
org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# ... 11 more
# Caused by: java.security.cert.CertificateException: No subject alternative
DNS name matching localhost found.
# at
java.base/sun.security.util.HostnameChecker.matchDNS(HostnameChecker.java:212)
# at
java.base/sun.security.util.HostnameChecker.match(HostnameChecker.java:103)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:455)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:429)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:283)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# ... 22 more
ok 60 start solr with ssl and auth in 23100ms
ok 61 start solr with client truststore and security manager in 26875ms
not ok 62 start solr with mTLS needed in 61862ms
# (in test file test/test_ssl.bats, line 301)
# `solr start -c -z localhost:9983 -p 8984' failed
# /tmp/bats-run-kKqISE/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is
listening on port 8983.
#
# Started Solr server on port 8983 (pid=200844). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is
listening on port 8984.
#
# Started Solr server on port 8984 (pid=201272). Happy searching!
#
# INFO - 2023-09-16 15:34:33.056;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-09-16 15:34:33.061;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# INFO - 2023-09-16 15:34:33.450;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@2dca0d64(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for
Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-kKqISE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kKqISE/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-09-16 15:34:33.452;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@7b84fcf8(root,h=[localhost],a=[/127.0.0.1],w=[]) for
Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-kKqISE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kKqISE/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-09-16 15:34:33.453;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@30b19518(ca,h=[localhost],a=[],w=[]) for
Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-kKqISE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kKqISE/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-16 15:34:33.487
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
# "certificate" : {
# "version" : "v3",
# "serial number" : "5D 63 94 67",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:34:08.000 UTC",
# "not after" : "2023-12-15 15:34:08.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: C9 6C 99 6E 59 B5 DD 4C 0F 9C 04 66 77 5B 91 FD
.l.nY..L...fw[..
# 0010: D7 34 B3 D2 .4..
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 49 A7 7C 23 40 78 F7 DF FD B8 1F A8 1E BF AD 5E
I..#@x.........^
# 0010: 85 8E E9 7F ....
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "19 93 1B ED",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:34:01.000 UTC",
# "not after" : "2023-12-15 15:34:01.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 29 15 D7 1F E0 A9 B6 FA 5D 29 CE C9 19 D4 33 C9
).......])....3.
# 0010: 4E 7A 22 42 Nz"B
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: C9 6C 99 6E 59 B5 DD 4C 0F 9C 04 66 77 5B 91 FD
.l.nY..L...fw[..
# 0010: D7 34 B3 D2 .4..
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-16 15:34:33.492
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "19 93 1B ED",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:34:01.000 UTC",
# "not after" : "2023-12-15 15:34:01.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 29 15 D7 1F E0 A9 B6 FA 5D 29 CE C9 19 D4 33 C9
).......])....3.
# 0010: 4E 7A 22 42 Nz"B
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: C9 6C 99 6E 59 B5 DD 4C 0F 9C 04 66 77 5B 91 FD
.l.nY..L...fw[..
# 0010: D7 34 B3 D2 .4..
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "54 F5 36 37",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:33:59.000 UTC",
# "not after" : "2023-12-15 15:33:59.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 29 15 D7 1F E0 A9 B6 FA 5D 29 CE C9 19 D4 33 C9
).......])....3.
# 0010: 4E 7A 22 42 Nz"B
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-16 15:34:33.507
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-16 15:34:33.737
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:33.737
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-16 15:34:33.739
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-16 15:34:33.739
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:33.745
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:33.760
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:33.760
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:33.760
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:33.763
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "32 82 41 2C A9 DC B2 20 24 B4 36 1C 86 C1 15 25 15
A3 41 47 5A AC 23 BC 29 18 C2 39 40 94 9C BF",
# "session id" : "90 E1 E6 E7 84 F5 F9 42 3D 64 3B 0B 86 36 E5 DC CE
5E C5 78 C3 14 5D 43 25 BD 16 CC F8 AA 6D 93",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A),
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025),
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029),
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
# "compression methods" : "00",
# "extensions" : [
# "status_request (5)": {
# "certificate status type": ocsp
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# },
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "ec_point_formats (11)": {
# "formats": [uncompressed]
# },
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# },
# "status_request_v2 (17)": {
# "cert status request": {
# "certificate status type": ocsp_multi
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# }
# },
# "extended_master_secret (23)": {
# <empty>
# },
# "supported_versions (43)": {
# "versions": [TLSv1.3, TLSv1.2]
# },
# "psk_key_exchange_modes (45)": {
# "ke_modes": [psk_dhe_ke]
# },
# "key_share (51)": {
# "client_shares": [
# {
# "named group": x25519
# "key_exchange": {
# 0000: E6 BE E3 EB 07 7B 4A C0 99 25 CF C1 AB A9 CF B2
......J..%......
# 0010: E3 2A 3F 95 63 35 CF 64 71 AD 62 D3 B8 86 FC 06
.*?.c5.dq.b.....
# }
# },
# ]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.905
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
# "server version" : "TLSv1.2",
# "random" : "56 67 62 79 49 1D 66 96 21 CB 39 86 58 6F 9B 9D 66
9E 2B A6 08 E3 83 5D FC 16 0B 08 B4 A2 09 F0",
# "session id" : "90 E1 E6 E7 84 F5 F9 42 3D 64 3B 0B 86 36 E5 DC CE
5E C5 78 C3 14 5D 43 25 BD 16 CC F8 AA 6D 93",
# "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)",
# "compression methods" : "00",
# "extensions" : [
# "supported_versions (43)": {
# "selected version": [TLSv1.3]
# },
# "key_share (51)": {
# "server_share": {
# "named group": x25519
# "key_exchange": {
# 0000: A3 21 2A 4B D5 CD 2B EB 48 0D BF 01 41 D0 4A 05
.!*K..+.H...A.J.
# 0010: 8A 97 F8 61 CC 74 C4 63 FE 0A AB 50 73 37 4B 0E
...a.t.c...Ps7K.
# }
# },
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.905
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.905
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.906
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.907
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.907
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.907
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.907
UTC|SSLExtensions.java:163|Ignore unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.907
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.908
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.908
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.910
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.910
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.910
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.911
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.911
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.911
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.911
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.911
UTC|SSLExtensions.java:207|Ignore unavailable extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.912
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.912
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-16 15:34:33.912
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-16 15:34:33.912
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.912
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.912
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.921
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.924
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.925
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.934
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake
message (
# "EncryptedExtensions": [
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.934
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.934
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.935
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.935
UTC|SSLExtensions.java:192|Consumed extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.935
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.935
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-16 15:34:33.935
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-16 15:34:33.935
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.937
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
# "certificate_request_context": "",
# "extensions": [
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "certificate_authorities (47)": {
# "certificate authorities": [
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.938
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.938
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.938
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.939
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.940
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-16 15:34:33.940
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.943
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message
(
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "0E 18 4C 06",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:34:04.000 UTC",
# "not after" : "2023-12-15 15:34:04.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: C9 6C 99 6E 59 B5 DD 4C 0F 9C 04 66 77 5B 91 FD
.l.nY..L...fw[..
# 0010: D7 34 B3 D2 .4..
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# serverAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 06 D8 5E 7A A9 B0 01 7B D0 4F C9 CA E1 A9 C2 10
..^z.....O......
# 0010: 42 5C AC 76 B\.v
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:33.944
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 15:34:33.999
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 15:34:34.000
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 15:34:34.000
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 15:34:34.000
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:34.035
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
# "certificate" : {
# "version" : "v3",
# "serial number" : "19 93 1B ED",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:34:01.000 UTC",
# "not after" : "2023-12-15 15:34:01.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 29 15 D7 1F E0 A9 B6 FA 5D 29 CE C9 19 D4 33 C9
).......])....3.
# 0010: 4E 7A 22 42 Nz"B
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: C9 6C 99 6E 59 B5 DD 4C 0F 9C 04 66 77 5B 91 FD
.l.nY..L...fw[..
# 0010: D7 34 B3 D2 .4..
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:34.041
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 32 C0 9F AD 1C 86 07 52 CC 5F CA 4B 4D B0 A4 FF 2......R._.KM...
# 0010: 36 FA 68 A5 0A F9 67 F8 D8 11 FA 9B 18 48 DA C8 6.h...g......H..
# 0020: 2E 66 85 81 22 66 3B 2F E6 DE A6 8A F1 A0 F8 4C .f.."f;/.......L
# 0030: 3F 3E 9E 5E F2 E8 26 9A 93 FD 47 C9 50 6B EF 98 ?>.^..&...G.Pk..
# 0040: F9 51 39 20 D1 A2 CB 7E 33 2C 80 D8 51 55 9F 0D .Q9 ....3,..QU..
# 0050: B6 A0 BB 5D 9F AC 0C CD 06 C5 F6 78 75 6E 6C F2 ...].......xunl.
# 0060: B0 36 F6 E1 AF 41 D5 B2 CB 4B 5D A0 89 7D 12 AC .6...A...K].....
# 0070: 17 08 E6 BB 61 92 FD 96 1F F4 5A FA 5E D4 CE 4A ....a.....Z.^..J
# 0080: 6B 7A E1 54 C1 EF 0E 0F 55 F9 47 59 A3 A6 21 7B kz.T....U.GY..!.
# 0090: DE 9E C5 14 DB 74 BD 46 5B 52 53 88 51 BE 4B D5 .....t.F[RS.Q.K.
# 00A0: 71 86 83 8A A3 0C 79 85 86 41 4F 60 58 F3 E8 71 q.....y..AO`X..q
# 00B0: 79 18 86 BE FA 30 F9 CF CB 04 20 80 0C F3 3C D6 y....0.... ...<.
# 00C0: 17 D8 1D 2F D1 B3 3C 16 DF 9E 1B 7F B3 CB D2 05 .../..<.........
# 00D0: 0A E5 49 CE D8 13 C4 08 47 63 B8 68 EE 5E D6 3B ..I.....Gc.h.^.;
# 00E0: 18 FC A4 A3 A3 D3 A4 83 DB F6 0E 8F BF 36 41 81 .............6A.
# 00F0: 25 6C AD 09 F8 EF 72 62 79 AD 1A C3 30 E3 D9 9A %l....rby...0...
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:34.043
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: 4C 73 52 B2 0C 77 FB 6A C7 34 AE 93 4F 3E AF 61 LsR..w.j.4..O>.a
# 0010: 02 7B 60 FE CF BB AE BB 88 F6 E3 7A 08 70 09 1A ..`........z.p..
# 0020: 9E 04 C5 5F 30 16 AF 98 66 B1 85 3A EF 4C A0 A4 ..._0...f..:.L..
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:34.047
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-16 15:34:34.048
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-16 15:34:34.048
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-16 15:34:34.049
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-16 15:34:34.049
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-16 15:34:34.049
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-16 15:34:34.049
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:34.050
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:34.053
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "5D 63 94 67",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:34:08.000 UTC",
# "not after" : "2023-12-15 15:34:08.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational
Unit, O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: C9 6C 99 6E 59 B5 DD 4C 0F 9C 04 66 77 5B 91 FD
.l.nY..L...fw[..
# 0010: D7 34 B3 D2 .4..
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 49 A7 7C 23 40 78 F7 DF FD B8 1F A8 1E BF AD 5E
I..#@x.........^
# 0010: 85 8E E9 7F ....
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "19 93 1B ED",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:34:01.000 UTC",
# "not after" : "2023-12-15 15:34:01.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 29 15 D7 1F E0 A9 B6 FA 5D 29 CE C9 19 D4 33 C9
).......])....3.
# 0010: 4E 7A 22 42 Nz"B
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: C9 6C 99 6E 59 B5 DD 4C 0F 9C 04 66 77 5B 91 FD
.l.nY..L...fw[..
# 0010: D7 34 B3 D2 .4..
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:34.097
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake
message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 14 96 0C 42 E9 12 4C 45 CE 69 AD 5B C0 36 99 58 ...B..LE.i.[.6.X
# 0010: 5B FC 76 73 CD 29 C6 33 48 EA 68 3F F1 73 2F 8D [.vs.).3H.h?.s/.
# 0020: E3 8F B9 1F C1 A6 19 DC 24 03 BC 96 EA 58 A9 38 ........$....X.8
# 0030: BC E3 AB 6C 79 D2 F8 4C CE AE 53 2C 0C A7 87 34 ...ly..L..S,...4
# 0040: F5 C7 A5 45 5C F0 94 B4 5B EB EF 7A C8 22 BA 76 ...E\...[..z.".v
# 0050: 3F 83 09 FC 34 34 3D FB 20 84 87 0C 1D A7 0E A6 ?...44=. .......
# 0060: 5E A8 E9 DB CC 89 53 3A 19 DB FC E7 5E 58 BA EE ^.....S:....^X..
# 0070: 0C 9D B4 6B 3B 2B B3 91 A9 57 57 6C B4 98 AB 8D ...k;+...WWl....
# 0080: E3 6F 77 0D 95 C1 40 5E C8 6F 31 4A 12 B6 56 6F .ow...@^.o1J..Vo
# 0090: 3C CB 83 02 6F FF 16 52 52 38 5A 71 68 2C C2 11 <...o..RR8Zqh,..
# 00A0: A4 6C 39 5B 2E A4 C1 E7 67 15 27 C7 EC 59 80 FF .l9[....g.'..Y..
# 00B0: 1C FD C4 4D 39 92 92 BE 03 95 91 EB C4 78 D7 62 ...M9........x.b
# 00C0: F9 1D 0B 5B 80 3F C4 26 3A DA 63 6C BF 43 E9 4A ...[.?.&:.cl.C.J
# 00D0: 98 39 C9 9F 39 4F 9B C7 CA C0 52 13 F5 87 48 88 .9..9O....R...H.
# 00E0: E8 AF 06 1F CF 6D 8D 84 56 BB D1 9A 05 74 2F 99 .....m..V....t/.
# 00F0: 21 2A 1D 02 68 B9 79 CB 4B 5D 1D F8 1D 79 B0 07 !*..h.y.K]...y..
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:34.098
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: AC 7E 4D 0C 2F 3E 1D 76 23 EB 3F 67 D6 25 D8 B9 ..M./>.v#.?g.%..
# 0010: D1 80 C7 59 0D 5E FB CD FF C6 2E B6 A2 7E 30 A9 ...Y.^........0.
# 0020: E6 DF CF 3B 9B 72 52 5E D5 5A 69 AF F2 85 28 6B ...;.rR^.Zi...(k
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:34.099
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:34.146
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
# "ticket_lifetime" : "86,400",
# "ticket_age_add" : "<omitted>",
# "ticket_nonce" : "01",
# "ticket" : "21 FE C0 03 5B 29 15 1D 29 A8 B6 9D EE ED 00 E9
71 D4 6F 0D C6 1E 09 C0 72 EB C7 83 3D E4 B4 C2",
# "extensions" : [
# <no extension>
# ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-16 15:34:34.432
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-16 15:34:34.433
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound
application data
# INFO - 2023-09-16 15:34:35.415;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-09-16 15:34:35.420;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# INFO - 2023-09-16 15:34:35.808;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@52851b44(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for
Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-kKqISE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kKqISE/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-09-16 15:34:35.810;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@604f2bd2(root,h=[localhost],a=[/127.0.0.1],w=[]) for
Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-kKqISE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kKqISE/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-09-16 15:34:35.811;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@1d3ac898(ca,h=[localhost],a=[],w=[]) for
Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-kKqISE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kKqISE/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-16 15:34:35.844
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
# "certificate" : {
# "version" : "v3",
# "serial number" : "5D 63 94 67",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:34:08.000 UTC",
# "not after" : "2023-12-15 15:34:08.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: C9 6C 99 6E 59 B5 DD 4C 0F 9C 04 66 77 5B 91 FD
.l.nY..L...fw[..
# 0010: D7 34 B3 D2 .4..
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 49 A7 7C 23 40 78 F7 DF FD B8 1F A8 1E BF AD 5E
I..#@x.........^
# 0010: 85 8E E9 7F ....
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "19 93 1B ED",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:34:01.000 UTC",
# "not after" : "2023-12-15 15:34:01.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 29 15 D7 1F E0 A9 B6 FA 5D 29 CE C9 19 D4 33 C9
).......])....3.
# 0010: 4E 7A 22 42 Nz"B
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: C9 6C 99 6E 59 B5 DD 4C 0F 9C 04 66 77 5B 91 FD
.l.nY..L...fw[..
# 0010: D7 34 B3 D2 .4..
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-16 15:34:35.850
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "19 93 1B ED",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:34:01.000 UTC",
# "not after" : "2023-12-15 15:34:01.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 29 15 D7 1F E0 A9 B6 FA 5D 29 CE C9 19 D4 33 C9
).......])....3.
# 0010: 4E 7A 22 42 Nz"B
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: C9 6C 99 6E 59 B5 DD 4C 0F 9C 04 66 77 5B 91 FD
.l.nY..L...fw[..
# 0010: D7 34 B3 D2 .4..
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "54 F5 36 37",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:33:59.000 UTC",
# "not after" : "2023-12-15 15:33:59.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 29 15 D7 1F E0 A9 B6 FA 5D 29 CE C9 19 D4 33 C9
).......])....3.
# 0010: 4E 7A 22 42 Nz"B
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-16 15:34:35.864
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 15:34:35.957
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 15:34:35.957
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 15:34:35.957
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 15:34:35.957
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-16 15:34:36.097
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:36.097
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-16 15:34:36.099
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-16 15:34:36.099
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:36.105
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:36.119
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:36.120
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:36.120
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:36.123
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "E9 C5 E5 2F 0A C3 8D B6 03 F2 8B EC 0A 31 D2 1A 50
3E 38 EE 12 37 00 0E 98 0D 5D 08 2E 06 B3 1C",
# "session id" : "85 0D 04 D7 43 3C 24 CB 71 FC BA CC 95 67 59 C2 F8
B7 99 53 D3 4B FC 69 15 D7 A3 BA 1D B0 21 B5",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A),
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025),
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029),
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
# "compression methods" : "00",
# "extensions" : [
# "status_request (5)": {
# "certificate status type": ocsp
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# },
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "ec_point_formats (11)": {
# "formats": [uncompressed]
# },
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# },
# "status_request_v2 (17)": {
# "cert status request": {
# "certificate status type": ocsp_multi
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# }
# },
# "extended_master_secret (23)": {
# <empty>
# },
# "supported_versions (43)": {
# "versions": [TLSv1.3, TLSv1.2]
# },
# "psk_key_exchange_modes (45)": {
# "ke_modes": [psk_dhe_ke]
# },
# "key_share (51)": {
# "client_shares": [
# {
# "named group": x25519
# "key_exchange": {
# 0000: A7 A1 C8 25 49 DB 23 59 05 DD 88 83 49 63 D2 75
...%I.#Y....Ic.u
# 0010: 6F 04 E7 69 95 9D 8B BC 36 08 0D 7D DC E6 E6 7C
o..i....6.......
# }
# },
# ]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.244
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
# "server version" : "TLSv1.2",
# "random" : "55 43 76 B6 0A 2A E0 09 A6 9C 73 5E 36 B0 92 10 3F
F6 69 CD 7C 49 F8 AE 5C 37 5C 92 16 E2 4F EA",
# "session id" : "85 0D 04 D7 43 3C 24 CB 71 FC BA CC 95 67 59 C2 F8
B7 99 53 D3 4B FC 69 15 D7 A3 BA 1D B0 21 B5",
# "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)",
# "compression methods" : "00",
# "extensions" : [
# "supported_versions (43)": {
# "selected version": [TLSv1.3]
# },
# "key_share (51)": {
# "server_share": {
# "named group": x25519
# "key_exchange": {
# 0000: 66 A2 BD 0E 00 BE 99 AF 73 09 D2 B0 72 2F DF 51
f.......s...r/.Q
# 0010: 02 BD ED 3C BF 95 DE CE 49 A0 F8 2F D0 B4 6D 27
...<....I../..m'
# }
# },
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.245
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.245
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.246
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.246
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.246
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.247
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.247
UTC|SSLExtensions.java:163|Ignore unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.247
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.247
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.247
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.249
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.249
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.250
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.250
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.250
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.250
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.251
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.251
UTC|SSLExtensions.java:207|Ignore unavailable extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.251
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.251
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-16 15:34:36.251
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-16 15:34:36.251
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.251
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.251
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.262
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.264
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.266
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.277
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake
message (
# "EncryptedExtensions": [
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.277
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.277
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.277
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.278
UTC|SSLExtensions.java:192|Consumed extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.278
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.278
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-16 15:34:36.278
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-16 15:34:36.278
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.280
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
# "certificate_request_context": "",
# "extensions": [
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "certificate_authorities (47)": {
# "certificate authorities": [
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.281
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.281
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.282
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.283
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.284
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-16 15:34:36.284
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.288
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message
(
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "0E 18 4C 06",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:34:04.000 UTC",
# "not after" : "2023-12-15 15:34:04.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: C9 6C 99 6E 59 B5 DD 4C 0F 9C 04 66 77 5B 91 FD
.l.nY..L...fw[..
# 0010: D7 34 B3 D2 .4..
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# serverAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 06 D8 5E 7A A9 B0 01 7B D0 4F C9 CA E1 A9 C2 10
..^z.....O......
# 0010: 42 5C AC 76 B\.v
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.288
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.379
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
# "certificate" : {
# "version" : "v3",
# "serial number" : "19 93 1B ED",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:34:01.000 UTC",
# "not after" : "2023-12-15 15:34:01.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 29 15 D7 1F E0 A9 B6 FA 5D 29 CE C9 19 D4 33 C9
).......])....3.
# 0010: 4E 7A 22 42 Nz"B
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: C9 6C 99 6E 59 B5 DD 4C 0F 9C 04 66 77 5B 91 FD
.l.nY..L...fw[..
# 0010: D7 34 B3 D2 .4..
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.385
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 4C AB 56 34 D2 62 51 58 0A AF B0 A6 69 36 61 3E L.V4.bQX....i6a>
# 0010: D1 6A 46 73 95 BE AE A7 23 29 AD 2C 8C 25 BB 63 .jFs....#).,.%.c
# 0020: 27 38 78 75 71 3A 99 EA 31 B5 33 E5 50 D7 34 C9 '8xuq:..1.3.P.4.
# 0030: 7E 8D B9 05 FC 40 13 E5 2E 91 14 E0 70 7F D3 B9 [email protected]...
# 0040: E5 42 D9 CC 57 74 DA 53 C4 AD DD 31 25 81 4C CA .B..Wt.S...1%.L.
# 0050: C1 83 73 B6 B4 52 C0 BD BD 45 3D 70 09 89 C1 3A ..s..R...E=p...:
# 0060: A1 A5 B6 1B 5E 9F 0C B1 5D 97 3B 29 A8 12 7D CF ....^...].;)....
# 0070: FD 02 CF 49 ED F8 D2 EC 38 6E 8B D8 9F CC 93 21 ...I....8n.....!
# 0080: A1 C4 85 41 98 08 F4 ED F2 49 34 00 3F 37 90 5B ...A.....I4.?7.[
# 0090: DD 07 39 F9 1B 54 D2 7D 07 F7 35 39 6A 4C 70 3F ..9..T....59jLp?
# 00A0: 2A 9D 69 F7 42 6B 36 4A C9 8A CA 10 E2 81 C4 7C *.i.Bk6J........
# 00B0: 68 E6 CC 73 17 67 7D D7 58 D2 6D 5B 53 F6 13 2E h..s.g..X.m[S...
# 00C0: 2E 0E BA 56 4A 0B 26 53 F0 F0 C2 86 21 C9 C9 0B ...VJ.&S....!...
# 00D0: 4E B1 70 18 D0 C9 B9 1F A1 C8 07 A8 A2 D7 08 D4 N.p.............
# 00E0: AB B5 EC 98 D4 CB 42 0D 6D A7 8A 1B 0B D3 77 E1 ......B.m.....w.
# 00F0: 62 71 AD 9B F5 34 EE C5 33 66 69 FF 3B D0 BF E1 bq...4..3fi.;...
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.388
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: A1 17 15 51 D0 B7 17 D6 4F DA 75 D3 5D A2 00 EA ...Q....O.u.]...
# 0010: B9 16 22 85 55 7D 31 E3 6C 61 83 CD E0 9D E2 AD ..".U.1.la......
# 0020: CE 37 E0 63 07 5C 21 58 E9 C6 ED 3D 7C 8F 37 A2 .7.c.\!X...=..7.
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.391
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-16 15:34:36.392
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-16 15:34:36.393
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-16 15:34:36.393
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-16 15:34:36.393
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-16 15:34:36.393
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-16 15:34:36.394
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.394
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.397
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "5D 63 94 67",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:34:08.000 UTC",
# "not after" : "2023-12-15 15:34:08.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational
Unit, O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: C9 6C 99 6E 59 B5 DD 4C 0F 9C 04 66 77 5B 91 FD
.l.nY..L...fw[..
# 0010: D7 34 B3 D2 .4..
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 49 A7 7C 23 40 78 F7 DF FD B8 1F A8 1E BF AD 5E
I..#@x.........^
# 0010: 85 8E E9 7F ....
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "19 93 1B ED",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:34:01.000 UTC",
# "not after" : "2023-12-15 15:34:01.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 29 15 D7 1F E0 A9 B6 FA 5D 29 CE C9 19 D4 33 C9
).......])....3.
# 0010: 4E 7A 22 42 Nz"B
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: C9 6C 99 6E 59 B5 DD 4C 0F 9C 04 66 77 5B 91 FD
.l.nY..L...fw[..
# 0010: D7 34 B3 D2 .4..
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.440
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake
message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 0A 1A 13 0B B6 FB 70 C8 6F FE DA EF B2 52 57 9D ......p.o....RW.
# 0010: A3 D1 D6 DE 7E 57 2C BA 3D 66 D9 D5 C8 E7 F5 03 .....W,.=f......
# 0020: DA C5 71 2C 0B A5 D3 D0 60 1A 66 7B FF C0 A9 A0 ..q,....`.f.....
# 0030: 72 59 83 8C DC E3 79 81 3A 9D 2D 65 4E 48 ED 76 rY....y.:.-eNH.v
# 0040: CE 61 C4 D7 D8 94 2D E8 7A 8B A8 73 FC D9 A8 9A .a....-.z..s....
# 0050: 5B F8 20 54 D0 5D B0 B4 39 D0 F0 E3 2F 7A 93 BE [. T.]..9.../z..
# 0060: A1 94 FB FA 13 74 41 54 B5 A7 55 83 EE CC 44 1A .....tAT..U...D.
# 0070: 90 CA F7 2D 21 9C CE F4 3F 50 88 68 17 00 E0 D9 ...-!...?P.h....
# 0080: 92 AF 58 BD B4 64 AE B1 C0 BC D2 B9 CE 8E 7F 53 ..X..d.........S
# 0090: C6 3C CE 1E 4F 49 83 6F E9 AE 98 50 81 11 E1 85 .<..OI.o...P....
# 00A0: 26 76 0E 6C 32 06 2F 2F 48 63 C5 5A 03 68 F0 CB &v.l2.//Hc.Z.h..
# 00B0: B7 08 E5 12 C8 1A 5D 31 A8 9D B5 31 BE B3 AE 5A ......]1...1...Z
# 00C0: 87 8D CF 2F 1E E8 37 4D 50 CD 02 35 7E B7 59 22 .../..7MP..5..Y"
# 00D0: AA A9 10 01 0E 64 96 E4 93 5C 79 4B 87 89 93 49 .....d...\yK...I
# 00E0: 26 35 60 D6 46 55 DA 67 B5 D9 D4 41 2A 37 8B 70 &5`.FU.g...A*7.p
# 00F0: 3E FF 04 0B 50 1D 45 E3 D7 37 2D C9 07 A2 46 CF >...P.E..7-...F.
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.442
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: 64 9B 1C BF 7B AA 90 13 FB 26 06 0A 23 8A EC 44 d........&..#..D
# 0010: 67 EF 8E 72 B5 EB D4 4A 2F DD DB B4 45 B9 62 DE g..r...J/...E.b.
# 0020: 24 F3 EA 98 3B 5C FB 89 B6 CC 9A 7F BB FE EC 1F $...;\..........
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.443
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-16 15:34:36.491
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
# "ticket_lifetime" : "86,400",
# "ticket_age_add" : "<omitted>",
# "ticket_nonce" : "01",
# "ticket" : "31 30 31 F5 0F 76 F0 8A E7 90 D9 DF 6D A9 DE A8
86 A9 4A D2 9E AD 39 29 F2 88 F5 A5 03 87 18 8B",
# "extensions" : [
# <no extension>
# ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-16 15:34:36.748
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-16 15:34:36.749
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound
application data
#
# -- output does not contain substring --
# substring (1 lines):
# Server refused connection
# output (491 lines):
# INFO - 2023-09-16 15:34:48.949;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# javax.net.ssl|DEBUG|01|main|2023-09-16 15:34:49.289
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "19 93 1B ED",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:34:01.000 UTC",
# "not after" : "2023-12-15 15:34:01.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 29 15 D7 1F E0 A9 B6 FA 5D 29 CE C9 19 D4 33 C9
).......])....3.
# 0010: 4E 7A 22 42 Nz"B
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: C9 6C 99 6E 59 B5 DD 4C 0F 9C 04 66 77 5B 91 FD
.l.nY..L...fw[..
# 0010: D7 34 B3 D2 .4..
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "54 F5 36 37",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-16 15:33:59.000 UTC",
# "not after" : "2023-12-15 15:33:59.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 29 15 D7 1F E0 A9 B6 FA 5D 29 CE C9 19 D4 33 C9
).......])....3.
# 0010: 4E 7A 22 42 Nz"B
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-16 15:34:49.306
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-16 15:34:49.578
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:49.578
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-16 15:34:49.580
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-16 15:34:49.580
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:49.586
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:49.601
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:49.601
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:49.601
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-16 15:34:49.604
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "44 1D 32 7F 87 96 9B 1B 26 EC C0 CF 47 E9 B7 F8
0F 10 6C 4A 04 6B 2E A8 05 A1 EC 51 03 AC 89 62",
# "session id" : "2A 20 75 E0 BF 63 A2 57 66 17 92 D4 CB F4 C9 B1
FE 73 83 AD 48 3D ED F9 DA C8 B4 E7 1D 31 82 75",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A),
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH
[...truncated too long message...]
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-16 15:36:16.579
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound
application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 15:36:16.622
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 15:36:16.622
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 15:36:16.622
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 15:36:16.622
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException:
IOException occurred when talking to server at:
https://localhost:8984/solr/admin/info/system
# at
org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed:
sun.security.provider.certpath.SunCertPathBuilderException: unable to find
valid certification path to requested target
# at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# at
java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# at
java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# at java.base/java.security.AccessController.doPrivileged(Native Method)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# at
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# at
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# at
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# at
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# at
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# at
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# at
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# at java.base/java.lang.Thread.run(Thread.java:829)
# Suppressed: java.io.IOException: Broken pipe
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# at
org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# at
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# at
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# at
org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# at
org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# at
org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# at
org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# at
org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# at
org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# at
org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# at
org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# ... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building
failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to
find valid certification path to requested target
# at
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# at
java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# at
java.base/sun.security.validator.Validator.validate(Validator.java:264)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# ... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable
to find valid certification path to requested target
# at
java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# at
java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# at
java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# at
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# ... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28561ms
ok 65 stop command for single port in 31629ms
ok 66 status detects locally running solr in 14746ms
ok 67 status does not expose cli parameters to end user in 228ms
ok 68 listing out files in 2269ms
ok 69 copying files around in 6884ms
ok 70 upconfig in 2875ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1256ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1248ms
> Task :solr:packaging:integrationTests FAILED
ERROR: The following test(s) have failed:
-
org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection
(:solr:modules:hdfs)
Test output:
/tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
Reproduce with: gradlew :solr:modules:hdfs:test --tests
"org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection"
-Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC
-XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m"
-Ptests.seed=850CD7CAE76F2F01 -Ptests.file.encoding=ISO-8859-1
FAILURE: Build completed with 2 failures.
1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at:
> file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/
* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================
2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 286
* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command
> '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished
> with non-zero exit value 1
* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================
* Get more help at https://help.gradle.org
BUILD FAILED in 24m 4s
654 actionable tasks: 637 executed, 17 up-to-date
[0m[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1
Total time: 24m40.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**'
'**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such
file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code
23) at main.c(1684) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)
+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]