Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5476/
1 tests failed.
FAILED:
org.apache.solr.client.solrj.impl.ConcurrentUpdateHttp2SolrClientMultiCollectionTest.classMethod
Error Message:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
Stack Trace:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
at __randomizedtesting.SeedInfo.seed([2CB8CBB327F2AFE5]:0)
Build Log:
[...truncated 1330 lines...]
# ERROR: IOException occurred when talking to server at:
https://localhost:8983/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at:
/tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO - 2023-09-18 06:01:30.286;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-09-18 06:01:30.291;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException:
IOException occurred when talking to server at:
https://localhost:8983/solr/admin/info/system
# at
org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: No subject alternative DNS
name matching localhost found.
# at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# at
java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# at
java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# at java.base/java.security.AccessController.doPrivileged(Native Method)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# at
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# at
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# at
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# at
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# at
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# at
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# at
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# at java.base/java.lang.Thread.run(Thread.java:829)
# Suppressed: java.io.IOException: Broken pipe
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# at
org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# at
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# at
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# at
org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# at
org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# at
org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# at
org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# at
org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# at
org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# at
org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# at
org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# ... 11 more
# Caused by: java.security.cert.CertificateException: No subject alternative
DNS name matching localhost found.
# at
java.base/sun.security.util.HostnameChecker.matchDNS(HostnameChecker.java:212)
# at
java.base/sun.security.util.HostnameChecker.match(HostnameChecker.java:103)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:455)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:429)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:283)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# ... 22 more
ok 60 start solr with ssl and auth in 22596ms
ok 61 start solr with client truststore and security manager in 24924ms
not ok 62 start solr with mTLS needed in 57975ms
# (in test file test/test_ssl.bats, line 301)
# `solr start -c -z localhost:9983 -p 8984' failed
# /tmp/bats-run-axGvhE/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is
listening on port 8983.
#
# Started Solr server on port 8983 (pid=198712). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is
listening on port 8984.
#
# Started Solr server on port 8984 (pid=199122). Happy searching!
#
# INFO - 2023-09-18 06:02:53.304;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-09-18 06:02:53.309;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# INFO - 2023-09-18 06:02:53.706;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@52851b44(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for
Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-axGvhE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-axGvhE/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-09-18 06:02:53.711;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@604f2bd2(root,h=[localhost],a=[/127.0.0.1],w=[]) for
Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-axGvhE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-axGvhE/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-09-18 06:02:53.712;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@1d3ac898(ca,h=[localhost],a=[],w=[]) for
Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-axGvhE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-axGvhE/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-18 06:02:53.746
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
# "certificate" : {
# "version" : "v3",
# "serial number" : "25 3D EC C9",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:29.000 UTC",
# "not after" : "2023-12-17 06:02:29.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: B0 C2 84 50 00 C6 14 C2 A1 B1 E2 E7 E2 71 AA E1
...P.........q..
# 0010: A8 C5 4A BC ..J.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 9B 04 EB 14 F0 71 59 E5 C3 4A 3C 48 8D 1E 22 30
.....qY..J<H.."0
# 0010: D4 AF 78 60 ..x`
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "57 A7 26 AC",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:23.000 UTC",
# "not after" : "2023-12-17 06:02:23.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 26 55 8C AB EA 64 08 95 73 AA 42 DC A0 BF 9D 92
&U...d..s.B.....
# 0010: 9E A8 5C 7B ..\.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: B0 C2 84 50 00 C6 14 C2 A1 B1 E2 E7 E2 71 AA E1
...P.........q..
# 0010: A8 C5 4A BC ..J.
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-18 06:02:53.751
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "57 A7 26 AC",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:23.000 UTC",
# "not after" : "2023-12-17 06:02:23.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 26 55 8C AB EA 64 08 95 73 AA 42 DC A0 BF 9D 92
&U...d..s.B.....
# 0010: 9E A8 5C 7B ..\.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: B0 C2 84 50 00 C6 14 C2 A1 B1 E2 E7 E2 71 AA E1
...P.........q..
# 0010: A8 C5 4A BC ..J.
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "19 8C D8 C3",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:21.000 UTC",
# "not after" : "2023-12-17 06:02:21.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 26 55 8C AB EA 64 08 95 73 AA 42 DC A0 BF 9D 92
&U...d..s.B.....
# 0010: 9E A8 5C 7B ..\.
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-18 06:02:53.765
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-18 06:02:54.089
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-18 06:02:54.090
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-18 06:02:54.090
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-18 06:02:54.091
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-18 06:02:54.246
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:02:54.247
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-18 06:02:54.248
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-18 06:02:54.249
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:02:54.254
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:02:54.265
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:02:54.265
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:02:54.266
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:02:54.269
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "3E 73 91 FE 0A 2B 5D CE 3E 93 D0 49 CA B7 C4 3C FC
C6 6A 31 1A A0 35 E4 F9 ED A4 06 77 7C 44 9B",
# "session id" : "AF 43 E8 E5 4B C3 9C C1 32 68 09 62 CD 80 9A 70 10
29 E1 8F 86 35 9E 07 B1 DD FB 4A ED 18 F0 0A",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A),
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025),
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029),
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
# "compression methods" : "00",
# "extensions" : [
# "status_request (5)": {
# "certificate status type": ocsp
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# },
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "ec_point_formats (11)": {
# "formats": [uncompressed]
# },
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# },
# "status_request_v2 (17)": {
# "cert status request": {
# "certificate status type": ocsp_multi
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# }
# },
# "extended_master_secret (23)": {
# <empty>
# },
# "supported_versions (43)": {
# "versions": [TLSv1.3, TLSv1.2]
# },
# "psk_key_exchange_modes (45)": {
# "ke_modes": [psk_dhe_ke]
# },
# "key_share (51)": {
# "client_shares": [
# {
# "named group": x25519
# "key_exchange": {
# 0000: 5D DC 79 6E BF CB 9C 7A CD 31 81 4D 42 12 D0 12
].yn...z.1.MB...
# 0010: 9F 94 33 A0 1C 8E 80 4C 15 B2 B1 68 1F 79 BD 0A
..3....L...h.y..
# }
# },
# ]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.385
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
# "server version" : "TLSv1.2",
# "random" : "C7 98 A0 FB C6 1E 85 18 81 D3 FF B4 90 96 8C 06 C2
C0 F7 88 A5 17 10 B5 4A C0 77 52 C4 FC EF B5",
# "session id" : "AF 43 E8 E5 4B C3 9C C1 32 68 09 62 CD 80 9A 70 10
29 E1 8F 86 35 9E 07 B1 DD FB 4A ED 18 F0 0A",
# "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)",
# "compression methods" : "00",
# "extensions" : [
# "supported_versions (43)": {
# "selected version": [TLSv1.3]
# },
# "key_share (51)": {
# "server_share": {
# "named group": x25519
# "key_exchange": {
# 0000: 55 A8 E6 1D 1C A3 79 7D A1 4F 1D 36 2A DC 40 94
U.....y..O.6*.@.
# 0010: 8D 62 97 6A 71 1B 4D C7 71 EA B6 EE 0A 78 55 06
.b.jq.M.q....xU.
# }
# },
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.385
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.386
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.387
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.387
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.387
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.387
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.387
UTC|SSLExtensions.java:163|Ignore unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.387
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.388
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.388
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.389
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.390
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.390
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.390
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.390
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.390
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.391
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.391
UTC|SSLExtensions.java:207|Ignore unavailable extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.391
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.391
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-18 06:02:54.391
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-18 06:02:54.391
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.391
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.391
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.399
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.401
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.402
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.405
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake
message (
# "EncryptedExtensions": [
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.406
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.406
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.406
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.406
UTC|SSLExtensions.java:192|Consumed extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.406
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.406
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-18 06:02:54.406
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-18 06:02:54.406
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.408
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
# "certificate_request_context": "",
# "extensions": [
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "certificate_authorities (47)": {
# "certificate authorities": [
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.408
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.409
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.409
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.410
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.410
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-18 06:02:54.410
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.413
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message
(
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "66 DF 80 5F",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:25.000 UTC",
# "not after" : "2023-12-17 06:02:25.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: B0 C2 84 50 00 C6 14 C2 A1 B1 E2 E7 E2 71 AA E1
...P.........q..
# 0010: A8 C5 4A BC ..J.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# serverAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 89 E1 E2 96 92 43 92 CE 97 CC AA 93 AF CD D5 5F
.....C........._
# 0010: E0 2D 8C 76 .-.v
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.413
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.517
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
# "certificate" : {
# "version" : "v3",
# "serial number" : "57 A7 26 AC",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:23.000 UTC",
# "not after" : "2023-12-17 06:02:23.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 26 55 8C AB EA 64 08 95 73 AA 42 DC A0 BF 9D 92
&U...d..s.B.....
# 0010: 9E A8 5C 7B ..\.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: B0 C2 84 50 00 C6 14 C2 A1 B1 E2 E7 E2 71 AA E1
...P.........q..
# 0010: A8 C5 4A BC ..J.
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.520
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 01 01 FE 46 01 AB 82 A6 31 5C 7F B0 82 B0 7B EE ...F....1\......
# 0010: 7F 60 45 A5 C5 F5 42 FE 26 26 3D DD FF 5B 35 A8 .`E...B.&&=..[5.
# 0020: 11 24 0D 71 61 4C A5 DD DB C5 64 2A 97 59 A5 32 .$.qaL....d*.Y.2
# 0030: 79 0F BD A6 8D 4A FA C3 53 B9 35 92 F6 12 22 A9 y....J..S.5...".
# 0040: BC FB 71 59 D5 AB BF 1F BC 93 85 9C B6 AE 2F 41 ..qY........../A
# 0050: 46 60 5A 03 75 55 DA DD B6 47 89 F6 23 02 05 6C F`Z.uU...G..#..l
# 0060: 2F 5B 71 BA 90 4F 60 AE E5 4E 97 E0 59 47 29 3E /[q..O`..N..YG)>
# 0070: 7E 24 D9 54 8E 17 A3 A8 56 2A C1 BC 33 55 00 6C .$.T....V*..3U.l
# 0080: C7 B7 96 62 0F 72 EC 2B 4D AE AC 4C 2D 62 7A 72 ...b.r.+M..L-bzr
# 0090: 6F 8C EE 9D CA 3E FA 4D 2B F6 63 8E 9D 77 CC 1F o....>.M+.c..w..
# 00A0: 63 16 5A 68 DB 57 EE 0B 79 16 41 0D CA 8D 21 9D c.Zh.W..y.A...!.
# 00B0: FA 80 25 69 33 EE DE 0D B7 D7 42 A9 DF AA 20 8E ..%i3.....B... .
# 00C0: 9F BA FA 22 FA 80 A3 67 7B 25 22 6A 0C F0 B2 BE ..."...g.%"j....
# 00D0: A4 28 B0 AB EC 5B 4B 8F 82 C8 3A 89 CB 98 BB 2C .(...[K...:....,
# 00E0: 06 74 9A AF D5 A3 9B 2C 61 01 65 BE 6C 86 08 3F .t.....,a.e.l..?
# 00F0: B8 AB 43 F8 60 87 3B F8 FC C0 9A 9F E9 DF 16 4B ..C.`.;........K
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.522
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: 78 3E 49 63 EA 56 BF 84 15 6B 2C 8C 48 1D B1 B7 x>Ic.V...k,.H...
# 0010: 87 A3 B0 ED D1 DC 89 41 DA 54 39 8E 4D 03 B4 38 .......A.T9.M..8
# 0020: 57 AA 7E AA 66 F0 DF D8 F7 4F EC 3A E7 66 E6 09 W...f....O.:.f..
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.524
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-18 06:02:54.525
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-18 06:02:54.525
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-18 06:02:54.525
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-18 06:02:54.525
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-18 06:02:54.526
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-18 06:02:54.526
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.527
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.529
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "25 3D EC C9",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:29.000 UTC",
# "not after" : "2023-12-17 06:02:29.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational
Unit, O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: B0 C2 84 50 00 C6 14 C2 A1 B1 E2 E7 E2 71 AA E1
...P.........q..
# 0010: A8 C5 4A BC ..J.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 9B 04 EB 14 F0 71 59 E5 C3 4A 3C 48 8D 1E 22 30
.....qY..J<H.."0
# 0010: D4 AF 78 60 ..x`
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "57 A7 26 AC",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:23.000 UTC",
# "not after" : "2023-12-17 06:02:23.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 26 55 8C AB EA 64 08 95 73 AA 42 DC A0 BF 9D 92
&U...d..s.B.....
# 0010: 9E A8 5C 7B ..\.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: B0 C2 84 50 00 C6 14 C2 A1 B1 E2 E7 E2 71 AA E1
...P.........q..
# 0010: A8 C5 4A BC ..J.
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.556
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake
message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 73 E9 3E 3C 74 9C C4 1B F6 A4 96 8A 40 12 C5 D2 s.><t.......@...
# 0010: AD 4D 8A 0A 1F 1A 95 D1 8A A2 91 48 E4 73 44 F9 .M.........H.sD.
# 0020: 3C 9C 0B 60 18 A1 55 E1 2A 71 EA 3B DB 17 7C F6 <..`..U.*q.;....
# 0030: 86 95 D6 A5 6C BA 97 48 F1 65 35 CB 95 6C AA 49 ....l..H.e5..l.I
# 0040: E0 72 04 B7 2B 78 E3 F9 7F AD A9 39 37 60 64 07 .r..+x.....97`d.
# 0050: 25 DE 38 0D 97 FC B7 76 5E DB 54 75 5D 47 1D 87 %.8....v^.Tu]G..
# 0060: C7 ED FF 47 AD 73 92 3A A8 58 25 C1 DB 3A 31 85 ...G.s.:.X%..:1.
# 0070: 02 BE 60 51 81 12 AA E1 72 9C F7 C5 86 7A 01 B7 ..`Q....r....z..
# 0080: 2F E3 D7 EB B5 8D 39 77 02 B1 60 8A F5 F1 BE 13 /.....9w..`.....
# 0090: 67 0A 2F 50 7D 97 9B A7 FB C1 81 8F FF C9 CB 35 g./P...........5
# 00A0: F9 31 17 7F E3 7F 65 38 69 61 AE 2E C2 B1 25 65 .1....e8ia....%e
# 00B0: 92 8E 88 88 11 0E FC 95 14 E6 79 37 A3 83 C5 34 ..........y7...4
# 00C0: 3B 4C AA A9 32 47 17 2B DD 1E AE 70 0C 13 45 8E ;L..2G.+...p..E.
# 00D0: 2D 5E ED B7 B2 F6 FE ED D7 44 7D 42 9E C0 07 B5 -^.......D.B....
# 00E0: FA B1 5B 74 CB 47 28 E1 3D B1 6A 4B 17 68 6A 98 ..[t.G(.=.jK.hj.
# 00F0: F3 39 2F 3B 6F C5 26 D4 6D 85 67 EE 54 7A C6 18 .9/;o.&.m.g.Tz..
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.557
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: C0 F6 57 2F AB 2D 8C 28 F0 A7 31 22 A1 A5 E7 BA ..W/.-.(..1"....
# 0010: DA 04 91 C6 F5 70 E4 19 29 43 C0 CF 20 3B 74 0A .....p..)C.. ;t.
# 0020: A1 8E 45 16 6C C1 4A CB 6E FF AE DC 9C 69 8F B9 ..E.l.J.n....i..
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.558
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:54.610
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
# "ticket_lifetime" : "86,400",
# "ticket_age_add" : "<omitted>",
# "ticket_nonce" : "01",
# "ticket" : "ED 43 0E 71 8E BB DB 98 3F 4C 17 0C BB A3 D2 A6
C8 F1 70 A2 D5 DA 1F B2 59 AC E2 91 54 53 58 CC",
# "extensions" : [
# <no extension>
# ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-18 06:02:54.909
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-18 06:02:54.910
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound
application data
# INFO - 2023-09-18 06:02:55.850;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-09-18 06:02:55.856;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# INFO - 2023-09-18 06:02:56.220;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@49d3c823(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for
Client@5d8bafa9[provider=null,keyStore=file:///tmp/bats-run-axGvhE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-axGvhE/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-09-18 06:02:56.223;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@ff684e1(root,h=[localhost],a=[/127.0.0.1],w=[]) for
Client@5d8bafa9[provider=null,keyStore=file:///tmp/bats-run-axGvhE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-axGvhE/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-09-18 06:02:56.224;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@23aa363a(ca,h=[localhost],a=[],w=[]) for
Client@5d8bafa9[provider=null,keyStore=file:///tmp/bats-run-axGvhE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-axGvhE/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-18 06:02:56.255
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
# "certificate" : {
# "version" : "v3",
# "serial number" : "25 3D EC C9",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:29.000 UTC",
# "not after" : "2023-12-17 06:02:29.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: B0 C2 84 50 00 C6 14 C2 A1 B1 E2 E7 E2 71 AA E1
...P.........q..
# 0010: A8 C5 4A BC ..J.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 9B 04 EB 14 F0 71 59 E5 C3 4A 3C 48 8D 1E 22 30
.....qY..J<H.."0
# 0010: D4 AF 78 60 ..x`
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "57 A7 26 AC",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:23.000 UTC",
# "not after" : "2023-12-17 06:02:23.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 26 55 8C AB EA 64 08 95 73 AA 42 DC A0 BF 9D 92
&U...d..s.B.....
# 0010: 9E A8 5C 7B ..\.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: B0 C2 84 50 00 C6 14 C2 A1 B1 E2 E7 E2 71 AA E1
...P.........q..
# 0010: A8 C5 4A BC ..J.
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-18 06:02:56.259
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "57 A7 26 AC",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:23.000 UTC",
# "not after" : "2023-12-17 06:02:23.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 26 55 8C AB EA 64 08 95 73 AA 42 DC A0 BF 9D 92
&U...d..s.B.....
# 0010: 9E A8 5C 7B ..\.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: B0 C2 84 50 00 C6 14 C2 A1 B1 E2 E7 E2 71 AA E1
...P.........q..
# 0010: A8 C5 4A BC ..J.
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "19 8C D8 C3",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:21.000 UTC",
# "not after" : "2023-12-17 06:02:21.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 26 55 8C AB EA 64 08 95 73 AA 42 DC A0 BF 9D 92
&U...d..s.B.....
# 0010: 9E A8 5C 7B ..\.
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-18 06:02:56.273
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-18 06:02:56.558
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-18 06:02:56.559
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-18 06:02:56.560
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-18 06:02:56.560
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-18 06:02:56.719
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:02:56.719
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-18 06:02:56.721
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-18 06:02:56.721
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:02:56.727
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:02:56.738
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:02:56.739
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:02:56.739
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:02:56.741
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "97 38 8D 80 72 B1 F7 13 D6 AB 13 17 28 7B DB 80 B7
CC 8C 66 85 E7 4D 36 6A C1 D7 31 1B CA BD E9",
# "session id" : "8D 68 FD 9B EF F6 F9 4D 81 BE D5 5F 96 69 9D 69 83
77 E3 2E F2 B6 02 78 81 BB 05 DE 34 DF 3C EE",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A),
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025),
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029),
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
# "compression methods" : "00",
# "extensions" : [
# "status_request (5)": {
# "certificate status type": ocsp
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# },
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "ec_point_formats (11)": {
# "formats": [uncompressed]
# },
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# },
# "status_request_v2 (17)": {
# "cert status request": {
# "certificate status type": ocsp_multi
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# }
# },
# "extended_master_secret (23)": {
# <empty>
# },
# "supported_versions (43)": {
# "versions": [TLSv1.3, TLSv1.2]
# },
# "psk_key_exchange_modes (45)": {
# "ke_modes": [psk_dhe_ke]
# },
# "key_share (51)": {
# "client_shares": [
# {
# "named group": x25519
# "key_exchange": {
# 0000: 61 82 7B 2F 32 58 5B 5F 5A E5 6E C5 37 B5 DC D2
a../2X[_Z.n.7...
# 0010: 45 21 65 D3 88 F9 DE C3 4B F0 0E B2 E7 EE C8 1E
E!e.....K.......
# }
# },
# ]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.851
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
# "server version" : "TLSv1.2",
# "random" : "14 E9 38 91 B0 61 86 15 56 6B 55 37 35 A4 57 DD 01
FE 29 9A DC 9C 9E 41 69 A0 AE F6 84 9B FA 78",
# "session id" : "8D 68 FD 9B EF F6 F9 4D 81 BE D5 5F 96 69 9D 69 83
77 E3 2E F2 B6 02 78 81 BB 05 DE 34 DF 3C EE",
# "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)",
# "compression methods" : "00",
# "extensions" : [
# "supported_versions (43)": {
# "selected version": [TLSv1.3]
# },
# "key_share (51)": {
# "server_share": {
# "named group": x25519
# "key_exchange": {
# 0000: AA DA 83 80 0C 0F 2E 51 7A B2 89 B5 6C B5 E6 89
.......Qz...l...
# 0010: A6 55 9A E5 B3 9C 94 40 BA EB D0 E6 68 2D B4 1E
[email protected]..
# }
# },
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.852
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.852
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.853
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.853
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.853
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.853
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.854
UTC|SSLExtensions.java:163|Ignore unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.854
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.854
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.854
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.856
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.856
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.857
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.857
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.857
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.857
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.857
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.857
UTC|SSLExtensions.java:207|Ignore unavailable extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.857
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.858
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-18 06:02:56.858
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-18 06:02:56.858
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.858
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.858
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.865
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.867
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.868
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.871
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake
message (
# "EncryptedExtensions": [
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.871
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.872
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.872
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.872
UTC|SSLExtensions.java:192|Consumed extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.872
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.873
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-18 06:02:56.873
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-18 06:02:56.873
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.875
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
# "certificate_request_context": "",
# "extensions": [
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "certificate_authorities (47)": {
# "certificate authorities": [
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.875
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.875
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.876
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.876
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.877
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-18 06:02:56.877
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.880
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message
(
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "66 DF 80 5F",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:25.000 UTC",
# "not after" : "2023-12-17 06:02:25.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: B0 C2 84 50 00 C6 14 C2 A1 B1 E2 E7 E2 71 AA E1
...P.........q..
# 0010: A8 C5 4A BC ..J.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# serverAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 89 E1 E2 96 92 43 92 CE 97 CC AA 93 AF CD D5 5F
.....C........._
# 0010: E0 2D 8C 76 .-.v
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.880
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.984
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
# "certificate" : {
# "version" : "v3",
# "serial number" : "57 A7 26 AC",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:23.000 UTC",
# "not after" : "2023-12-17 06:02:23.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 26 55 8C AB EA 64 08 95 73 AA 42 DC A0 BF 9D 92
&U...d..s.B.....
# 0010: 9E A8 5C 7B ..\.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: B0 C2 84 50 00 C6 14 C2 A1 B1 E2 E7 E2 71 AA E1
...P.........q..
# 0010: A8 C5 4A BC ..J.
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.988
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 02 FD A2 ED 81 64 9D B2 09 41 94 C8 4B 1D 10 6D .....d...A..K..m
# 0010: 32 9D F8 43 DA 67 85 0D 52 DA 73 37 40 D4 BF 62 [email protected]
# 0020: 67 12 DD 58 4E 87 D4 31 67 22 94 9F A7 CF D0 FC g..XN..1g"......
# 0030: 54 BE 66 B6 74 CA 89 F2 A8 32 4D DF 35 7E E6 43 T.f.t....2M.5..C
# 0040: B2 D1 E3 35 A3 EA 34 03 29 CE 66 37 FF E0 FC CB ...5..4.).f7....
# 0050: 6F 87 D2 7A FC 3D 02 EA E4 56 09 F9 87 93 DC 7D o..z.=...V......
# 0060: 37 81 09 31 25 69 56 20 14 A7 5E 06 2F E9 B9 43 7..1%iV ..^./..C
# 0070: 1F 56 6D C7 C6 14 A6 7E DB 74 69 50 45 9C AD 08 .Vm......tiPE...
# 0080: 44 9E E1 DB 8A 38 15 D7 97 38 71 1F 36 54 84 B3 D....8...8q.6T..
# 0090: E4 99 66 78 1B 68 1E 4C CA 26 58 28 66 55 8B D6 ..fx.h.L.&X(fU..
# 00A0: 30 AD F1 E1 24 90 1C 90 AC 24 54 FB 64 E0 27 2F 0...$....$T.d.'/
# 00B0: 86 EE 92 68 D5 BB 31 CF 41 33 D4 FF E7 F9 0A 28 ...h..1.A3.....(
# 00C0: 85 8B 83 D1 AF 16 86 21 7A 80 F4 7E 32 28 71 E2 .......!z...2(q.
# 00D0: C7 91 7C CE 5A 62 2B 04 08 E6 D2 5B 0B 3B 8E F4 ....Zb+....[.;..
# 00E0: 1F 9F 05 8F 25 94 A1 57 F5 88 70 EA 7A 83 FD 0F ....%..W..p.z...
# 00F0: 14 2D 0B 32 2D 72 63 B7 9A 25 04 CB 12 6B 53 66 .-.2-rc..%...kSf
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.990
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: 6B 66 00 AC A8 15 44 4E 57 34 AD E0 B0 A4 E2 AC kf....DNW4......
# 0010: 0F 43 5E 9D 7E 8B 39 50 98 88 52 3A 1D DC 3E 7D .C^...9P..R:..>.
# 0020: 99 62 E8 F7 C1 A6 6D 5B 63 46 15 F2 BD 9B 6E 41 .b....m[cF....nA
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.993
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-18 06:02:56.994
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-18 06:02:56.994
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-18 06:02:56.994
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-18 06:02:56.994
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-18 06:02:56.995
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-18 06:02:56.995
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.996
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:56.998
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "25 3D EC C9",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:29.000 UTC",
# "not after" : "2023-12-17 06:02:29.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational
Unit, O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: B0 C2 84 50 00 C6 14 C2 A1 B1 E2 E7 E2 71 AA E1
...P.........q..
# 0010: A8 C5 4A BC ..J.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 9B 04 EB 14 F0 71 59 E5 C3 4A 3C 48 8D 1E 22 30
.....qY..J<H.."0
# 0010: D4 AF 78 60 ..x`
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "57 A7 26 AC",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:23.000 UTC",
# "not after" : "2023-12-17 06:02:23.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 26 55 8C AB EA 64 08 95 73 AA 42 DC A0 BF 9D 92
&U...d..s.B.....
# 0010: 9E A8 5C 7B ..\.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: B0 C2 84 50 00 C6 14 C2 A1 B1 E2 E7 E2 71 AA E1
...P.........q..
# 0010: A8 C5 4A BC ..J.
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:57.026
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake
message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 57 6B 9A 12 95 33 B4 3F A4 11 09 CE 96 A1 BF 83 Wk...3.?........
# 0010: AA C3 00 05 AC 55 12 87 51 B1 39 AE 1E E3 44 4E .....U..Q.9...DN
# 0020: 0F 53 FF 3A 37 B6 0B 0C C3 6D DE 3C 66 53 73 E2 .S.:7....m.<fSs.
# 0030: 59 18 7B 1F 55 2D 97 8B A7 21 26 53 3E 42 07 A1 Y...U-...!&S>B..
# 0040: A6 F0 CF C3 2C A4 07 2F AC BD E3 DB F0 42 DD D9 ....,../.....B..
# 0050: 8F BC F0 E1 76 DC 09 91 69 5D F8 2C F6 20 E6 F9 ....v...i].,. ..
# 0060: 37 6D 87 F7 8F A4 BA C8 7C F7 EB 74 B7 C5 6E 49 7m.........t..nI
# 0070: C4 FE CE A3 27 8C 49 FF 8E C3 E1 20 72 85 EE ED ....'.I.... r...
# 0080: 0A BA D1 D6 5F 4E 0E F1 3C E8 2B 58 2D 5A D7 41 ...._N..<.+X-Z.A
# 0090: 4C 8D CB 82 E8 23 CD 0B 4E A2 CA 4C CF 8D 54 7D L....#..N..L..T.
# 00A0: A2 F3 5E D7 E3 A8 2E DB 4F F2 FA E1 12 13 E5 DF ..^.....O.......
# 00B0: 11 68 60 E1 14 0F D2 59 71 DC 80 8E 55 08 6F 9B .h`....Yq...U.o.
# 00C0: CE 08 B0 6E 3A DC 74 16 2A 7A C6 17 47 62 53 D4 ...n:.t.*z..GbS.
# 00D0: B0 D6 8E FC 0F 2E 39 8C A5 ED 55 9E C4 F5 EE 84 ......9...U.....
# 00E0: 7C 80 D5 9C 92 04 D4 B6 69 18 92 66 94 68 59 8A ........i..f.hY.
# 00F0: BE 7E F8 59 10 CF 59 2A 88 57 F4 CF 5B 8E 69 AD ...Y..Y*.W..[.i.
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:57.027
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: F3 1D 08 32 2A 8A CE 1F E7 89 AF E7 F0 DE 2C 8B ...2*.........,.
# 0010: 7E E1 F8 74 1B C8 A2 F6 6D B3 71 40 DC 8A A9 74 [email protected]
# 0020: 95 C1 25 57 53 8D 81 1B B7 4C F6 5E 88 3C 32 09 ..%WS....L.^.<2.
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:57.028
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:02:57.080
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
# "ticket_lifetime" : "86,400",
# "ticket_age_add" : "<omitted>",
# "ticket_nonce" : "01",
# "ticket" : "43 ED 9C FD FF FB 3E 34 62 54 D5 E0 9C 8D B2 96
6B 28 AE 92 FD BD 5F CB 76 2D 65 88 5E E0 5E 21",
# "extensions" : [
# <no extension>
# ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-18 06:02:57.393
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-18 06:02:57.394
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound
application data
#
# -- output does not contain substring --
# substring (1 lines):
# Server refused connection
# output (491 lines):
# INFO - 2023-09-18 06:03:07.864;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# javax.net.ssl|DEBUG|01|main|2023-09-18 06:03:08.183
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "57 A7 26 AC",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:23.000 UTC",
# "not after" : "2023-12-17 06:02:23.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 26 55 8C AB EA 64 08 95 73 AA 42 DC A0 BF 9D 92
&U...d..s.B.....
# 0010: 9E A8 5C 7B ..\.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: B0 C2 84 50 00 C6 14 C2 A1 B1 E2 E7 E2 71 AA E1
...P.........q..
# 0010: A8 C5 4A BC ..J.
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "19 8C D8 C3",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-18 06:02:21.000 UTC",
# "not after" : "2023-12-17 06:02:21.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 26 55 8C AB EA 64 08 95 73 AA 42 DC A0 BF 9D 92
&U...d..s.B.....
# 0010: 9E A8 5C 7B ..\.
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-18 06:03:08.197
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-18 06:03:08.420
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:03:08.420
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-18 06:03:08.421
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-18 06:03:08.422
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:03:08.427
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:03:08.438
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:03:08.438
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:03:08.438
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-18 06:03:08.440
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "EF A7 CD 07 4D 31 35 E8 D1 9A F6 07 56 3C BF 2E
18 58 FB 5B 0C AC 4D AB 97 E0 CA 64 6B 7B AF D8",
# "session id" : "A7 CA 5C 76 81 04 09 13 50 38 B3 67 FA 1E 4C 31
FD B2 DB C3 F2 03 0D 82 4F 6F C4 A1 DC A6 BC EF",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A),
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025),
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029),
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
# "compression methods" : "00",
# "extensions" : [
# "status_request (5)": {
# "certificate status type": ocsp
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# },
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448,
ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "ec_point_formats (11)": {
# "formats": [uncompressed]
# },
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# },
# "status_request_v2 (17)": {
# "cert status request": {
# "certificate status type": ocsp_multi
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# }
# },
# "extended_master_secret (23)": {
# <empty>
# },
# "supported_versions (43)": {
# "versions": [TLSv1.3, TLSv1.2]
# },
# "psk_key_exchange_modes (45)": {
# "ke_modes": [psk_dhe_ke]
# },
# "key_share (51)": {
# "client_shares": [
# {
# "named group": x25519
# "key_exchange": {
# 0000: 51 F5 1A CE 53 D9 48 B0 D0 A7 4D 78 8D E3 EF E2
Q...S.H...Mx....
# 0010: 2A 68 EC CE C2 36 02 BB 11 08 4F A5 75 12 65 51
*h...6....O.u.eQ
# }
# },
# ]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:03:08.463
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
# "server version" : "TLSv1.2",
# "random" : "CE 2C A7 BD F7 AF 71 65 62 DF 7C B8 E3 E5 FA DD
57 7A 9B 7E 8A 15 E1 2F E4 1E 04 51 AF A6 86 1C",
# "session id" : "A7 CA 5C 76 81 04 09 13 50 38 B3 67 FA 1E 4C 31
FD B2 DB C3 F2 03 0D 82 4F 6F C4 A1 DC A6 BC EF",
# "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)",
# "compression methods" : "00",
# "extensions" : [
# "supported_versions (43)": {
# "selected version": [TLSv1.3]
# },
# "key_share (51)": {
# "server_share": {
# "named group": x25519
# "key_exchange": {
# 0000: 2D 4C CA 71 11 39 A4 05 E8 02 52 21 13 49 9C BD
-L.q.9....R!.I..
# 0010: 67 AB DC 00 0B 50 45 3F 45 F8 42 F4 94 DB 58 64
g....PE?E.B...Xd
# }
# },
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:03:08.463
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:03:08.464
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:03:08.465
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:03:08.465
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:03:08.465
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:03:08.465
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:03:08.465
UTC|SSLExtensions.java:163|Ignore unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:03:08.465
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-18 06:03:08.465
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ss
[...truncated too long message...]
:2123)
2> at
app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
2> at
app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
2> at
app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
2> at [email protected]/java.lang.Thread.run(Thread.java:829)
2> 22) Thread[id=46, name=qtp963791969-46, state=TIMED_WAITING,
group=TGRP-ConcurrentUpdateHttp2SolrClientMultiCollectionTest]
2> at [email protected]/jdk.internal.misc.Unsafe.park(Native Method)
2> at
[email protected]/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
2> at
[email protected]/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
2> at
app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
2> at
app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
2> at
app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
2> at [email protected]/java.lang.Thread.run(Thread.java:829)
2> 23) Thread[id=59, name=zkConnectionManagerCallback-20-thread-1,
state=WAITING, group=TGRP-ConcurrentUpdateHttp2SolrClientMultiCollectionTest]
2> at [email protected]/jdk.internal.misc.Unsafe.park(Native Method)
2> at
[email protected]/java.util.concurrent.locks.LockSupport.park(LockSupport.java:194)
2> at
[email protected]/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.await(AbstractQueuedSynchronizer.java:2081)
2> at
[email protected]/java.util.concurrent.LinkedBlockingQueue.take(LinkedBlockingQueue.java:433)
2> at
[email protected]/java.util.concurrent.ThreadPoolExecutor.getTask(ThreadPoolExecutor.java:1054)
2> at
[email protected]/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1114)
2> at
[email protected]/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
2> at [email protected]/java.lang.Thread.run(Thread.java:829)
2> 24) Thread[id=18, name=NIOServerCxnFactory.SelectorThread-0,
state=RUNNABLE, group=TGRP-ConcurrentUpdateHttp2SolrClientMultiCollectionTest]
2> at [email protected]/sun.nio.ch.IOUtil.drain(Native Method)
2> at
[email protected]/sun.nio.ch.EPollSelectorImpl.clearInterrupt(EPollSelectorImpl.java:266)
2> at
[email protected]/sun.nio.ch.EPollSelectorImpl.processEvents(EPollSelectorImpl.java:203)
2> at
[email protected]/sun.nio.ch.EPollSelectorImpl.doSelect(EPollSelectorImpl.java:137)
2> at
[email protected]/sun.nio.ch.SelectorImpl.lockAndDoSelect(SelectorImpl.java:124)
2> at
[email protected]/sun.nio.ch.SelectorImpl.select(SelectorImpl.java:141)
2> at
app//org.apache.zookeeper.server.NIOServerCnxnFactory$SelectorThread.select(NIOServerCnxnFactory.java:403)
2> at
app//org.apache.zookeeper.server.NIOServerCnxnFactory$SelectorThread.run(NIOServerCnxnFactory.java:368)
2> 25) Thread[id=39, name=qtp963791969-39, state=TIMED_WAITING,
group=TGRP-ConcurrentUpdateHttp2SolrClientMultiCollectionTest]
2> at [email protected]/jdk.internal.misc.Unsafe.park(Native Method)
2> at
[email protected]/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
2> at
[email protected]/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
2> at
app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
2> at
app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
2> at
app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
2> at [email protected]/java.lang.Thread.run(Thread.java:829)
2> 26) Thread[id=47, name=Session-HouseKeeper-2666fcc-1,
state=TIMED_WAITING,
group=TGRP-ConcurrentUpdateHttp2SolrClientMultiCollectionTest]
2> at [email protected]/jdk.internal.misc.Unsafe.park(Native Method)
2> at
[email protected]/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
2> at
[email protected]/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
2> at
[email protected]/java.util.concurrent.ScheduledThreadPoolExecutor$DelayedWorkQueue.take(ScheduledThreadPoolExecutor.java:1182)
2> at
[email protected]/java.util.concurrent.ScheduledThreadPoolExecutor$DelayedWorkQueue.take(ScheduledThreadPoolExecutor.java:899)
2> at
[email protected]/java.util.concurrent.ThreadPoolExecutor.getTask(ThreadPoolExecutor.java:1054)
2> at
[email protected]/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1114)
2> at
[email protected]/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
2> at [email protected]/java.lang.Thread.run(Thread.java:829)
2> 27) Thread[id=29, name=NIOWorkerThread-3, state=WAITING,
group=TGRP-ConcurrentUpdateHttp2SolrClientMultiCollectionTest]
2> at [email protected]/jdk.internal.misc.Unsafe.park(Native Method)
2> at
[email protected]/java.util.concurrent.locks.LockSupport.park(LockSupport.java:194)
2> at
[email protected]/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.await(AbstractQueuedSynchronizer.java:2081)
2> at
[email protected]/java.util.concurrent.LinkedBlockingQueue.take(LinkedBlockingQueue.java:433)
2> at
[email protected]/java.util.concurrent.ThreadPoolExecutor.getTask(ThreadPoolExecutor.java:1054)
2> at
[email protected]/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1114)
2> at
[email protected]/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
2> at [email protected]/java.lang.Thread.run(Thread.java:829)
> java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
> at __randomizedtesting.SeedInfo.seed([2CB8CBB327F2AFE5]:0)
2> NOTE: test params are: codec=Asserting(Lucene95): {}, docValues:{},
maxPointsInLeafNode=542, maxMBSortInHeap=7.283329644162272,
sim=Asserting(RandomSimilarity(queryNorm=true): {}), locale=es-PE,
timezone=America/Nuuk
2> NOTE: Linux 5.4.0-100-generic amd64/Oracle Corporation 11.0.16
(64-bit)/cpus=1,threads=33,free=276020576,total=343932928
2> NOTE: All tests run in this JVM:
[ConcurrentUpdateHttp2SolrClientMultiCollectionTest]
2> NOTE: reproduce with: gradlew test --tests
ConcurrentUpdateHttp2SolrClientMultiCollectionTest
-Dtests.seed=2CB8CBB327F2AFE5 -Dtests.locale=es-PE
-Dtests.timezone=America/Nuuk -Dtests.asserts=true -Dtests.file.encoding=UTF-8
:solr:solrj:test (FAILURE): 1135 test(s), 1 failure(s), 43 skipped
1135 tests completed, 1 failed, 43 skipped
> Task :solr:solrj:test FAILED
> Task :solr:solrj:wipeTaskTemp
ERROR: The following test(s) have failed:
-
org.apache.solr.client.solrj.impl.ConcurrentUpdateHttp2SolrClientMultiCollectionTest.classMethod
(:solr:solrj)
Test output:
/tmp/src/solr/solr/solrj/build/test-results/test/outputs/OUTPUT-org.apache.solr.client.solrj.impl.ConcurrentUpdateHttp2SolrClientMultiCollectionTest.txt
Reproduce with: gradlew :solr:solrj:test --tests
"org.apache.solr.client.solrj.impl.ConcurrentUpdateHttp2SolrClientMultiCollectionTest.classMethod"
-Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC
-XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m"
-Ptests.seed=2CB8CBB327F2AFE5 -Ptests.file.encoding=US-ASCII
FAILURE: Build completed with 2 failures.
1: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 286
* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command
> '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished
> with non-zero exit value 1
* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================
2: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:solrj:test'.
> There were failing tests. See the results at:
> file:///tmp/src/solr/solr/solrj/build/test-results/test/
* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================
* Get more help at https://help.gradle.org
BUILD FAILED in 2h 2m 31s
673 actionable tasks: 656 executed, 17 up-to-date
[0m[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1
Total time: 2h3m1s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**'
'**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such
file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code
23) at main.c(1684) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)
+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]