Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5499/
1 tests failed.
FAILED: org.apache.solr.cloud.ReindexCollectionTest.testAbort
Error Message:
java.lang.AssertionError: {responseHeader={status=0, QTime=14},
status={state=notfound, msg=Did not find [7648649b-1fc2-4477-83ed-0139f435b4fd]
in any tasks queue}}
Stack Trace:
java.lang.AssertionError: {responseHeader={status=0, QTime=14},
status={state=notfound, msg=Did not find [7648649b-1fc2-4477-83ed-0139f435b4fd]
in any tasks queue}}
at
__randomizedtesting.SeedInfo.seed([CDDB90495B14E577:ABB827DE2FCE770E]:0)
at org.junit.Assert.fail(Assert.java:89)
at org.junit.Assert.assertTrue(Assert.java:42)
at org.junit.Assert.assertNotNull(Assert.java:713)
at
org.apache.solr.cloud.ReindexCollectionTest.testAbort(ReindexCollectionTest.java:425)
at
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at
java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
at
com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at
com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at
com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at
com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at
com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
at org.junit.rules.RunRules.evaluate(RunRules.java:20)
at
org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
at
org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at
org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at
org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at
org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.junit.rules.RunRules.evaluate(RunRules.java:20)
at
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at
com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
at
com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
at
com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
at
com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at
com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at
com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at
com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at
org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at
org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at
com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
at org.junit.rules.RunRules.evaluate(RunRules.java:20)
at
org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at
org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at
com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at
com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at
org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at
org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at
org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at
org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at
org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at org.junit.rules.RunRules.evaluate(RunRules.java:20)
at
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at
com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
at
com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
at java.base/java.lang.Thread.run(Thread.java:829)
Build Log:
[...truncated 6450 lines...]
# ERROR: IOException occurred when talking to server at:
https://localhost:8983/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at:
/tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO - 2023-09-21 11:17:07.061;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-09-21 11:17:07.066;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException:
IOException occurred when talking to server at:
https://localhost:8983/solr/admin/info/system
# at
org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: No subject alternative DNS
name matching localhost found.
# at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# at
java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# at
java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# at java.base/java.security.AccessController.doPrivileged(Native Method)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# at
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# at
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# at
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# at
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# at
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# at
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# at
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# at java.base/java.lang.Thread.run(Thread.java:829)
# Suppressed: java.io.IOException: Broken pipe
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# at
org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# at
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# at
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# at
org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# at
org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# at
org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# at
org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# at
org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# at
org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# at
org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# at
org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# ... 11 more
# Caused by: java.security.cert.CertificateException: No subject alternative
DNS name matching localhost found.
# at
java.base/sun.security.util.HostnameChecker.matchDNS(HostnameChecker.java:212)
# at
java.base/sun.security.util.HostnameChecker.match(HostnameChecker.java:103)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:455)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:429)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:283)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# ... 22 more
ok 60 start solr with ssl and auth in 22394ms
ok 61 start solr with client truststore and security manager in 25111ms
not ok 62 start solr with mTLS needed in 58098ms
# (in test file test/test_ssl.bats, line 301)
# `solr start -c -z localhost:9983 -p 8984' failed
# /tmp/bats-run-NOIjaH/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is
listening on port 8983.
#
# Started Solr server on port 8983 (pid=200151). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is
listening on port 8984.
#
# Started Solr server on port 8984 (pid=200574). Happy searching!
#
# INFO - 2023-09-21 11:18:30.852;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-09-21 11:18:30.857;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# INFO - 2023-09-21 11:18:31.230;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@2a640157(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for
Client@6e35bc3d[provider=null,keyStore=file:///tmp/bats-run-NOIjaH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NOIjaH/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-09-21 11:18:31.233;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@1e8ce150(root,h=[localhost],a=[/127.0.0.1],w=[]) for
Client@6e35bc3d[provider=null,keyStore=file:///tmp/bats-run-NOIjaH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NOIjaH/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-09-21 11:18:31.234;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@604f2bd2(ca,h=[localhost],a=[],w=[]) for
Client@6e35bc3d[provider=null,keyStore=file:///tmp/bats-run-NOIjaH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NOIjaH/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-21 11:18:31.265
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
# "certificate" : {
# "version" : "v3",
# "serial number" : "3E 60 01 5C",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:18:07.000 UTC",
# "not after" : "2023-12-20 11:18:07.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 54 3B DE 3F C8 3D C7 BA D9 F8 0C 3D D4 D0 53 BE
T;.?.=.....=..S.
# 0010: B1 36 FA 56 .6.V
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: CE FD 77 3D 69 EA 13 D7 62 7C A8 84 91 D5 E1 9C
..w=i...b.......
# 0010: BD 66 AA 9C .f..
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "03 49 01 88",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:18:00.000 UTC",
# "not after" : "2023-12-20 11:18:00.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 27 F1 61 7B 11 2B D4 BB E6 75 D1 CB C6 C5 4F 99
'.a..+...u....O.
# 0010: 8E 71 8D 62 .q.b
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 54 3B DE 3F C8 3D C7 BA D9 F8 0C 3D D4 D0 53 BE
T;.?.=.....=..S.
# 0010: B1 36 FA 56 .6.V
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-21 11:18:31.269
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "5B 0D 54 C9",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:17:58.000 UTC",
# "not after" : "2023-12-20 11:17:58.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 27 F1 61 7B 11 2B D4 BB E6 75 D1 CB C6 C5 4F 99
'.a..+...u....O.
# 0010: 8E 71 8D 62 .q.b
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "03 49 01 88",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:18:00.000 UTC",
# "not after" : "2023-12-20 11:18:00.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 27 F1 61 7B 11 2B D4 BB E6 75 D1 CB C6 C5 4F 99
'.a..+...u....O.
# 0010: 8E 71 8D 62 .q.b
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 54 3B DE 3F C8 3D C7 BA D9 F8 0C 3D D4 D0 53 BE
T;.?.=.....=..S.
# 0010: B1 36 FA 56 .6.V
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-21 11:18:31.284
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-21 11:18:31.426
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-21 11:18:31.426
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-21 11:18:31.427
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-21 11:18:31.427
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-21 11:18:31.514
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:31.514
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-21 11:18:31.516
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-21 11:18:31.516
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:31.522
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:31.533
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:31.533
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:31.533
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:31.536
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "7A DA 88 69 1A 1A 40 FF 0F 34 7E B2 6A A9 8F B9 5C
8C 57 09 40 35 8A BB 34 DA CE 04 A3 FD 05 06",
# "session id" : "FE 69 EE 67 C1 C2 45 1B 7C FD 5E BA F2 76 4D D0 DB
4B 4E 01 BB 59 D6 CE F6 A1 6F 88 5F 8B DC 50",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A),
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025),
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029),
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
# "compression methods" : "00",
# "extensions" : [
# "status_request (5)": {
# "certificate status type": ocsp
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# },
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "ec_point_formats (11)": {
# "formats": [uncompressed]
# },
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# },
# "status_request_v2 (17)": {
# "cert status request": {
# "certificate status type": ocsp_multi
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# }
# },
# "extended_master_secret (23)": {
# <empty>
# },
# "supported_versions (43)": {
# "versions": [TLSv1.3, TLSv1.2]
# },
# "psk_key_exchange_modes (45)": {
# "ke_modes": [psk_dhe_ke]
# },
# "key_share (51)": {
# "client_shares": [
# {
# "named group": x25519
# "key_exchange": {
# 0000: EA 55 1D F2 B7 0A D9 9A 16 C2 88 67 DC 39 19 AA
.U.........g.9..
# 0010: 17 FD A4 07 01 E0 B4 0F A9 0B DA CE 2C 9E 0D 31
............,..1
# }
# },
# ]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.644
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
# "server version" : "TLSv1.2",
# "random" : "8E BF 15 4D 81 9B 6E F5 BC DA 9F 77 68 FA 0F C5 EA
B0 1F E4 12 AD D3 2D D8 DD F6 45 DA D7 F5 A4",
# "session id" : "FE 69 EE 67 C1 C2 45 1B 7C FD 5E BA F2 76 4D D0 DB
4B 4E 01 BB 59 D6 CE F6 A1 6F 88 5F 8B DC 50",
# "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)",
# "compression methods" : "00",
# "extensions" : [
# "supported_versions (43)": {
# "selected version": [TLSv1.3]
# },
# "key_share (51)": {
# "server_share": {
# "named group": x25519
# "key_exchange": {
# 0000: 8C 61 D9 1A 72 9B C6 93 05 CE 28 F7 AC E0 92 FF
.a..r.....(.....
# 0010: 87 83 36 00 42 85 A3 7C 7F 89 32 30 C3 0C E1 7E
..6.B.....20....
# }
# },
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.644
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.644
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.645
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.646
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.646
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.646
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.646
UTC|SSLExtensions.java:163|Ignore unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.646
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.646
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.647
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.648
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.648
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.649
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.649
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.649
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.649
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.649
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.650
UTC|SSLExtensions.java:207|Ignore unavailable extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.650
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.650
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-21 11:18:31.650
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-21 11:18:31.650
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.650
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.650
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.657
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.659
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.660
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.663
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake
message (
# "EncryptedExtensions": [
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.664
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.664
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.664
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.664
UTC|SSLExtensions.java:192|Consumed extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.664
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.664
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-21 11:18:31.664
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-21 11:18:31.665
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.666
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
# "certificate_request_context": "",
# "extensions": [
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "certificate_authorities (47)": {
# "certificate authorities": [
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.666
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.667
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.667
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.668
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.668
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-21 11:18:31.668
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.671
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message
(
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "15 E9 DB CA",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:18:03.000 UTC",
# "not after" : "2023-12-20 11:18:03.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 54 3B DE 3F C8 3D C7 BA D9 F8 0C 3D D4 D0 53 BE
T;.?.=.....=..S.
# 0010: B1 36 FA 56 .6.V
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# serverAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 0B 8B 3D 63 E4 2E C2 15 6B 3C B2 44 33 E9 43 5B
..=c....k<.D3.C[
# 0010: 75 84 1F 48 u..H
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.671
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.749
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
# "certificate" : {
# "version" : "v3",
# "serial number" : "03 49 01 88",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:18:00.000 UTC",
# "not after" : "2023-12-20 11:18:00.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 27 F1 61 7B 11 2B D4 BB E6 75 D1 CB C6 C5 4F 99
'.a..+...u....O.
# 0010: 8E 71 8D 62 .q.b
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 54 3B DE 3F C8 3D C7 BA D9 F8 0C 3D D4 D0 53 BE
T;.?.=.....=..S.
# 0010: B1 36 FA 56 .6.V
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.753
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 4A 6D E1 0F B2 94 8A C2 F7 9B 32 50 B3 14 41 38 Jm........2P..A8
# 0010: E9 AD 15 DA 73 AA C0 EC 5B F3 CC 98 66 2C D0 29 ....s...[...f,.)
# 0020: 81 84 AF 5C 2D 0E 6B E4 A2 69 2E 6E 33 7C AF 16 ...\-.k..i.n3...
# 0030: 2B B3 13 4F 04 84 92 71 5B A2 CA 60 3A 46 AC FD +..O...q[..`:F..
# 0040: 9F 68 C1 56 6D F3 AA B6 53 2D F7 09 D1 A0 A8 9C .h.Vm...S-......
# 0050: 4D C4 3B 2F 73 C3 D3 01 B5 24 32 5D 77 1B EC 7A M.;/s....$2]w..z
# 0060: 20 2B 2F 22 EA 80 62 18 6A 6A 17 9E AD 33 8A ED +/"..b.jj...3..
# 0070: B5 01 E2 2E 87 AB 8C 56 71 BF C6 7C 50 34 4C 95 .......Vq...P4L.
# 0080: F4 FD 30 7F 2D A2 93 B1 14 E5 CD EF CA D2 BC A6 ..0.-...........
# 0090: A3 06 40 A6 28 04 71 57 62 73 CE 0A 17 81 5F 80 ..@.(.qWbs...._.
# 00A0: B3 C1 3A 94 D3 4B 9C 5D F9 50 AD EA 22 7B A3 51 ..:..K.].P.."..Q
# 00B0: B1 2C A7 81 81 06 59 A2 20 A5 1F 56 A9 AF 4C 03 .,....Y. ..V..L.
# 00C0: F2 BC D4 AB DF AA 29 FD 37 2C 3D 39 0B 5F 96 C4 ......).7,=9._..
# 00D0: 36 59 15 57 C8 3A 9F D7 87 94 44 2F A1 01 EA 48 6Y.W.:....D/...H
# 00E0: 48 C2 BE 98 D3 6F CF 67 71 FC CA BC 42 52 0F AD H....o.gq...BR..
# 00F0: 5D 42 30 6D F8 1A 87 6B 43 64 11 26 A1 B2 12 DC ]B0m...kCd.&....
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.755
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: A6 98 5F 26 21 88 D4 A6 57 E0 6F ED 54 9F 87 B1 .._&!...W.o.T...
# 0010: 7D 1C 48 DF 66 E8 75 C9 13 33 A0 C0 A9 A8 DD B7 ..H.f.u..3......
# 0020: 16 BB EE 75 6C 79 65 71 FE 6C FB 97 F7 29 9C A6 ...ulyeq.l...)..
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.757
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-21 11:18:31.758
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-21 11:18:31.759
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-21 11:18:31.759
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-21 11:18:31.759
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-21 11:18:31.759
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-21 11:18:31.759
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.760
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.762
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "3E 60 01 5C",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:18:07.000 UTC",
# "not after" : "2023-12-20 11:18:07.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational
Unit, O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 54 3B DE 3F C8 3D C7 BA D9 F8 0C 3D D4 D0 53 BE
T;.?.=.....=..S.
# 0010: B1 36 FA 56 .6.V
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: CE FD 77 3D 69 EA 13 D7 62 7C A8 84 91 D5 E1 9C
..w=i...b.......
# 0010: BD 66 AA 9C .f..
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "03 49 01 88",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:18:00.000 UTC",
# "not after" : "2023-12-20 11:18:00.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 27 F1 61 7B 11 2B D4 BB E6 75 D1 CB C6 C5 4F 99
'.a..+...u....O.
# 0010: 8E 71 8D 62 .q.b
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 54 3B DE 3F C8 3D C7 BA D9 F8 0C 3D D4 D0 53 BE
T;.?.=.....=..S.
# 0010: B1 36 FA 56 .6.V
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.788
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake
message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: B4 5D 81 EE A9 E5 D0 D1 CC 47 EC 9A DB F5 72 6C .].......G....rl
# 0010: 3E 95 14 82 89 A1 87 B1 14 4B 77 03 1D 01 4C 21 >........Kw...L!
# 0020: 23 8E D0 9E E1 7F AD 34 62 BF 91 6E 23 81 99 EB #......4b..n#...
# 0030: 8F DF 7C 8B E4 74 46 63 50 75 0B 5C 08 FC 72 E2 .....tFcPu.\..r.
# 0040: 09 61 77 D6 B7 7C 67 88 0F 29 F7 06 BA 44 97 6E .aw...g..)...D.n
# 0050: FD 95 56 0C 78 9D 82 C2 C2 BA 1F AA F6 28 F8 54 ..V.x........(.T
# 0060: BA FE AA 1A 4B 02 82 DB 29 EE 4F AF 84 6F CA 72 ....K...).O..o.r
# 0070: 96 24 0B 61 29 25 51 09 27 C4 E9 E7 34 30 54 84 .$.a)%Q.'...40T.
# 0080: 4A 54 6D 84 A8 40 51 D6 26 FE 25 81 B0 6E A5 E1 JTm..@Q.&.%..n..
# 0090: 71 D3 27 CD 4A 7D 02 27 0D 45 B5 8C 73 7F 95 A2 q.'.J..'.E..s...
# 00A0: 3E 61 AE 46 A2 90 7D 0B A7 53 16 AD 55 25 88 BB >a.F.....S..U%..
# 00B0: 7C 17 71 90 DB DB C2 0B 21 35 1A 04 30 8A 4E 15 ..q.....!5..0.N.
# 00C0: 79 65 EF EC 87 2B 18 9C 64 65 D7 FC 4C 24 CF 5F ye...+..de..L$._
# 00D0: 37 C4 81 5F A3 82 79 BA 8D 3E 9D 6A 74 43 74 5C 7.._..y..>.jtCt\
# 00E0: CC A5 DF 85 C8 84 46 9F 45 FE 28 9E A8 A3 79 20 ......F.E.(...y
# 00F0: 48 FE 01 70 A7 60 53 A0 40 A6 05 AB 4E 86 F5 6E H..p.`[email protected]
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.789
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: EE 44 8F 17 9A 9F 56 1E 19 C9 BD 36 69 11 59 62 .D....V....6i.Yb
# 0010: 80 41 57 16 54 0A 4D 32 47 93 97 9C 94 96 21 F4 .AW.T.M2G.....!.
# 0020: B3 5E FC 69 A7 4E 52 97 89 C0 70 2F F1 9D 6B 10 .^.i.NR...p/..k.
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.790
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:31.838
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
# "ticket_lifetime" : "86,400",
# "ticket_age_add" : "<omitted>",
# "ticket_nonce" : "01",
# "ticket" : "1D FE F2 78 27 B4 40 77 7B 61 FB F6 48 D7 DB 0F
F4 20 66 8E 4C A8 43 1E 28 51 84 49 91 3C CE 16",
# "extensions" : [
# <no extension>
# ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-21 11:18:32.126
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-21 11:18:32.127
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound
application data
# INFO - 2023-09-21 11:18:33.060;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-09-21 11:18:33.065;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# INFO - 2023-09-21 11:18:33.452;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@2dca0d64(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for
Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-NOIjaH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NOIjaH/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-09-21 11:18:33.454;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@7b84fcf8(root,h=[localhost],a=[/127.0.0.1],w=[]) for
Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-NOIjaH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NOIjaH/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-09-21 11:18:33.455;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@30b19518(ca,h=[localhost],a=[],w=[]) for
Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-NOIjaH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NOIjaH/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-21 11:18:33.486
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
# "certificate" : {
# "version" : "v3",
# "serial number" : "3E 60 01 5C",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:18:07.000 UTC",
# "not after" : "2023-12-20 11:18:07.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 54 3B DE 3F C8 3D C7 BA D9 F8 0C 3D D4 D0 53 BE
T;.?.=.....=..S.
# 0010: B1 36 FA 56 .6.V
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: CE FD 77 3D 69 EA 13 D7 62 7C A8 84 91 D5 E1 9C
..w=i...b.......
# 0010: BD 66 AA 9C .f..
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "03 49 01 88",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:18:00.000 UTC",
# "not after" : "2023-12-20 11:18:00.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 27 F1 61 7B 11 2B D4 BB E6 75 D1 CB C6 C5 4F 99
'.a..+...u....O.
# 0010: 8E 71 8D 62 .q.b
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 54 3B DE 3F C8 3D C7 BA D9 F8 0C 3D D4 D0 53 BE
T;.?.=.....=..S.
# 0010: B1 36 FA 56 .6.V
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-21 11:18:33.490
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "5B 0D 54 C9",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:17:58.000 UTC",
# "not after" : "2023-12-20 11:17:58.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 27 F1 61 7B 11 2B D4 BB E6 75 D1 CB C6 C5 4F 99
'.a..+...u....O.
# 0010: 8E 71 8D 62 .q.b
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "03 49 01 88",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:18:00.000 UTC",
# "not after" : "2023-12-20 11:18:00.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 27 F1 61 7B 11 2B D4 BB E6 75 D1 CB C6 C5 4F 99
'.a..+...u....O.
# 0010: 8E 71 8D 62 .q.b
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 54 3B DE 3F C8 3D C7 BA D9 F8 0C 3D D4 D0 53 BE
T;.?.=.....=..S.
# 0010: B1 36 FA 56 .6.V
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-21 11:18:33.505
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-21 11:18:33.605
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-21 11:18:33.605
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-21 11:18:33.606
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-21 11:18:33.606
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-21 11:18:33.741
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:33.741
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-21 11:18:33.743
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-21 11:18:33.743
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:33.749
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:33.760
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:33.760
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:33.760
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:33.762
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "61 D1 F1 75 F4 8E A6 97 EB 7C CE B7 8B 35 02 E4 B0
31 1C DE 59 24 3E E6 F1 C1 0D 81 33 BC 9B 2E",
# "session id" : "05 A8 C8 E4 D0 B3 89 EE 1B 50 4C A0 C2 F8 2B 13 DC
0E DF E0 81 EB 8E F4 15 DA 42 DC 8D 23 0B 0F",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A),
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025),
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029),
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
# "compression methods" : "00",
# "extensions" : [
# "status_request (5)": {
# "certificate status type": ocsp
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# },
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "ec_point_formats (11)": {
# "formats": [uncompressed]
# },
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# },
# "status_request_v2 (17)": {
# "cert status request": {
# "certificate status type": ocsp_multi
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# }
# },
# "extended_master_secret (23)": {
# <empty>
# },
# "supported_versions (43)": {
# "versions": [TLSv1.3, TLSv1.2]
# },
# "psk_key_exchange_modes (45)": {
# "ke_modes": [psk_dhe_ke]
# },
# "key_share (51)": {
# "client_shares": [
# {
# "named group": x25519
# "key_exchange": {
# 0000: A8 FF 21 2C C3 81 8A 34 E3 3C F4 CB 50 C0 E7 BD
..!,...4.<..P...
# 0010: 03 01 68 10 91 65 29 A1 83 CD BC 0F 4E 5E CD 37
..h..e).....N^.7
# }
# },
# ]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.860
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
# "server version" : "TLSv1.2",
# "random" : "81 EF 50 A4 E1 3B 9C AC 95 44 F1 53 5C 46 23 04 F1
82 9A E1 96 8F 76 3C 42 64 2B A5 6D 24 5A 31",
# "session id" : "05 A8 C8 E4 D0 B3 89 EE 1B 50 4C A0 C2 F8 2B 13 DC
0E DF E0 81 EB 8E F4 15 DA 42 DC 8D 23 0B 0F",
# "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)",
# "compression methods" : "00",
# "extensions" : [
# "supported_versions (43)": {
# "selected version": [TLSv1.3]
# },
# "key_share (51)": {
# "server_share": {
# "named group": x25519
# "key_exchange": {
# 0000: 99 38 BD F6 7C 13 DD 76 59 3D BE CA 34 8F 85 C7
.8.....vY=..4...
# 0010: 90 22 F3 3E 47 4A 53 D6 13 77 2D 47 A5 18 08 4F
.".>GJS..w-G...O
# }
# },
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.861
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.861
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.862
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.862
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.862
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.863
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.863
UTC|SSLExtensions.java:163|Ignore unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.863
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.863
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.863
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.865
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.865
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.865
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.866
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.866
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.866
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.866
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.866
UTC|SSLExtensions.java:207|Ignore unavailable extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.866
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.866
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-21 11:18:33.866
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-21 11:18:33.867
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.867
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.867
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.874
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.875
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.876
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.880
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake
message (
# "EncryptedExtensions": [
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.880
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.880
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.880
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.881
UTC|SSLExtensions.java:192|Consumed extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.881
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.881
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-21 11:18:33.881
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-21 11:18:33.881
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.882
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
# "certificate_request_context": "",
# "extensions": [
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "certificate_authorities (47)": {
# "certificate authorities": [
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.883
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.883
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.883
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.884
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.885
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-21 11:18:33.885
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.888
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message
(
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "15 E9 DB CA",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:18:03.000 UTC",
# "not after" : "2023-12-20 11:18:03.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 54 3B DE 3F C8 3D C7 BA D9 F8 0C 3D D4 D0 53 BE
T;.?.=.....=..S.
# 0010: B1 36 FA 56 .6.V
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# serverAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 0B 8B 3D 63 E4 2E C2 15 6B 3C B2 44 33 E9 43 5B
..=c....k<.D3.C[
# 0010: 75 84 1F 48 u..H
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.888
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.965
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
# "certificate" : {
# "version" : "v3",
# "serial number" : "03 49 01 88",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:18:00.000 UTC",
# "not after" : "2023-12-20 11:18:00.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 27 F1 61 7B 11 2B D4 BB E6 75 D1 CB C6 C5 4F 99
'.a..+...u....O.
# 0010: 8E 71 8D 62 .q.b
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 54 3B DE 3F C8 3D C7 BA D9 F8 0C 3D D4 D0 53 BE
T;.?.=.....=..S.
# 0010: B1 36 FA 56 .6.V
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.969
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 2D E6 89 D0 D8 E0 5E AD 76 96 50 1F 0C 07 EB 24 -.....^.v.P....$
# 0010: D9 9F AD 03 F5 1B FD 1E 96 05 7D 44 3E 97 C5 BC ...........D>...
# 0020: 30 AF D0 C9 F8 24 4D 3B 1E 73 04 A3 7B 7C DA 75 0....$M;.s.....u
# 0030: B0 77 4A 10 8E 9A E5 74 C4 77 AE 83 C4 9E 5B F3 .wJ....t.w....[.
# 0040: 18 C4 0A 68 87 74 36 9E 1B 89 11 54 19 03 A2 60 ...h.t6....T...`
# 0050: 49 33 13 E4 7C 1A 83 B0 BE 74 E1 C1 99 84 6E 21 I3.......t....n!
# 0060: B1 CE EC 4F CC 85 29 A2 A5 9E B2 67 43 1A 6E 93 ...O..)....gC.n.
# 0070: 0F 60 FD 9C 7E D5 48 EF 81 EE 3B 1E 42 7D 25 CC .`....H...;.B.%.
# 0080: 0F EE 02 5F 46 E2 EF C7 00 5E 1E 1A DC B2 74 29 ..._F....^....t)
# 0090: CF AA C2 29 FA 9E 72 7B 1C F6 C8 FF 15 6C 8B 95 ...)..r......l..
# 00A0: B7 DA 4B 50 C6 55 28 F0 A4 E5 02 30 D3 39 A5 19 ..KP.U(....0.9..
# 00B0: 7C 65 78 2B 6D 77 DC 8D 4D F6 01 06 E8 3A 09 3F .ex+mw..M....:.?
# 00C0: 6D F6 FC B8 B6 43 14 9D 99 7D 95 BF 7E D7 02 E8 m....C..........
# 00D0: 7E 81 7D 03 97 AB 48 73 77 F2 40 40 F3 77 FA A6 ......Hsw.@@.w..
# 00E0: 1B B5 E8 30 DD 2D 21 3E 92 6D 5E 04 8B 6E 61 28 ...0.-!>.m^..na(
# 00F0: F3 57 85 4D FC 1F 3E 3B 54 88 E7 7F 7A 6C 95 00 .W.M..>;T...zl..
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.971
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: 94 18 56 3E C3 E6 77 AE BC 12 7B B0 C0 0F F1 3C ..V>..w........<
# 0010: 9A D2 0B 50 EB 6C FB 12 1B 7A E1 01 93 EC E8 A1 ...P.l...z......
# 0020: 44 D2 F8 D7 EF 40 AC 02 1B 4C A9 B4 69 5A AE 0B [email protected]..
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.974
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-21 11:18:33.974
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-21 11:18:33.975
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-21 11:18:33.975
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-21 11:18:33.975
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-21 11:18:33.975
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-21 11:18:33.975
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.976
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:33.979
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "3E 60 01 5C",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:18:07.000 UTC",
# "not after" : "2023-12-20 11:18:07.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational
Unit, O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 54 3B DE 3F C8 3D C7 BA D9 F8 0C 3D D4 D0 53 BE
T;.?.=.....=..S.
# 0010: B1 36 FA 56 .6.V
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: CE FD 77 3D 69 EA 13 D7 62 7C A8 84 91 D5 E1 9C
..w=i...b.......
# 0010: BD 66 AA 9C .f..
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "03 49 01 88",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:18:00.000 UTC",
# "not after" : "2023-12-20 11:18:00.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 27 F1 61 7B 11 2B D4 BB E6 75 D1 CB C6 C5 4F 99
'.a..+...u....O.
# 0010: 8E 71 8D 62 .q.b
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 54 3B DE 3F C8 3D C7 BA D9 F8 0C 3D D4 D0 53 BE
T;.?.=.....=..S.
# 0010: B1 36 FA 56 .6.V
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:34.005
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake
message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 12 0D D8 80 2E 1A 39 02 00 91 65 31 0E 10 69 9C ......9...e1..i.
# 0010: 3A 25 6B F5 D8 6D 94 30 A6 46 CD 03 21 4B C2 80 :%k..m.0.F..!K..
# 0020: E1 1D B3 BF 49 59 4E 55 D0 21 4D 3F 1C F0 CB 80 ....IYNU.!M?....
# 0030: 02 39 84 38 2F E4 54 05 45 18 E5 FC 85 29 14 AC .9.8/.T.E....)..
# 0040: AE DD 25 DA 08 8D 37 4C 75 E1 82 E4 93 1B 47 A1 ..%...7Lu.....G.
# 0050: E2 66 D6 18 B2 48 19 96 9A 31 44 D0 54 36 4F A1 .f...H...1D.T6O.
# 0060: 8B 09 04 92 BD 16 0B F9 9D FA 3F A2 21 21 0D 4D ..........?.!!.M
# 0070: 4D E3 91 4D E4 C5 37 BD 50 DC 9F 5B 6B A3 A6 CA M..M..7.P..[k...
# 0080: AD D5 FF 74 BC 03 09 51 5E 6C FB 60 91 A7 1C FA ...t...Q^l.`....
# 0090: 18 3B 72 A6 C0 22 01 15 FA 4E 2F 15 A3 F7 CE 1C .;r.."...N/.....
# 00A0: 53 9B 34 05 79 B4 C4 4C 0C 87 20 F2 62 E4 6C 37 S.4.y..L.. .b.l7
# 00B0: 82 52 31 D3 58 5F C6 67 9B 2F 71 B0 5A 7B 50 36 .R1.X_.g./q.Z.P6
# 00C0: 2C D8 EE 77 76 47 DA 33 C3 3B 07 82 96 8F 45 57 ,..wvG.3.;....EW
# 00D0: D7 FD C4 19 93 FB 6E 34 2E 1A 78 4D C8 F6 ED 0D ......n4..xM....
# 00E0: BD 8F AD BA 94 0B A0 D7 F2 1A F1 71 CF A2 E5 FD ...........q....
# 00F0: C3 18 21 35 A5 04 17 5D 34 01 D0 85 56 7F 96 BF ..!5...]4...V...
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:34.006
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: 5D 5E 5B 51 9C B9 CA CA 68 07 D3 AE E9 30 43 9D ]^[Q....h....0C.
# 0010: AF 0D 09 80 9E AF B1 F3 4C FD 9A 5E 3C F6 AF 78 ........L..^<..x
# 0020: 87 0E E7 80 57 E0 CF 5A EB A7 AB DB C7 64 85 9D ....W..Z.....d..
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:34.007
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-21 11:18:34.056
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
# "ticket_lifetime" : "86,400",
# "ticket_age_add" : "<omitted>",
# "ticket_nonce" : "01",
# "ticket" : "7E 8B 4B ED 5F DE 96 57 F1 D2 26 BF 18 9C BA 91
49 F4 64 8B 1E 8E FF E2 67 2B 54 43 B8 57 23 2D",
# "extensions" : [
# <no extension>
# ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-21 11:18:34.324
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-21 11:18:34.326
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound
application data
#
# -- output does not contain substring --
# substring (1 lines):
# Server refused connection
# output (491 lines):
# INFO - 2023-09-21 11:18:44.923;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# javax.net.ssl|DEBUG|01|main|2023-09-21 11:18:45.262
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "5B 0D 54 C9",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:17:58.000 UTC",
# "not after" : "2023-12-20 11:17:58.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 27 F1 61 7B 11 2B D4 BB E6 75 D1 CB C6 C5 4F 99
'.a..+...u....O.
# 0010: 8E 71 8D 62 .q.b
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "03 49 01 88",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-21 11:18:00.000 UTC",
# "not after" : "2023-12-20 11:18:00.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 27 F1 61 7B 11 2B D4 BB E6 75 D1 CB C6 C5 4F 99
'.a..+...u....O.
# 0010: 8E 71 8D 62 .q.b
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 54 3B DE 3F C8 3D C7 BA D9 F8 0C 3D D4 D0 53 BE
T;.?.=.....=..S.
# 0010: B1 36 FA 56 .6.V
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-21 11:18:45.277
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-21 11:18:45.504
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:45.504
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-21 11:18:45.506
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-21 11:18:45.506
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:45.511
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:45.523
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:45.523
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:45.523
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-21 11:18:45.525
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "F1 3A 54 C6 4F 51 F4 01 68 F7 88 5A 89 73 F4 4D
8C ED DB 86 80 ED 5F 66 C8 03 81 B2 C6 ED 2A EC",
# "session id" : "1B 07 85 E9 1A 9E F8 DE 07 50 CF C7 7D 6B B2 17
2D BE 51 E5 DD 69 26 4D 6E F0 6E EE 8E 1B 58 C0",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_12
[...truncated too long message...]
va.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# at
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# ... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-21 11:20:05.561
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound
application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-21 11:20:05.597
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-21 11:20:05.598
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-21 11:20:05.598
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-21 11:20:05.599
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException:
IOException occurred when talking to server at:
https://localhost:8984/solr/admin/info/system
# at
org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed:
sun.security.provider.certpath.SunCertPathBuilderException: unable to find
valid certification path to requested target
# at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# at
java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# at
java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# at java.base/java.security.AccessController.doPrivileged(Native Method)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# at
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# at
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# at
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# at
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# at
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# at
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# at
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# at java.base/java.lang.Thread.run(Thread.java:829)
# Suppressed: java.io.IOException: Broken pipe
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# at
org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# at
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# at
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# at
org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# at
org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# at
org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# at
org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# at
org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# at
org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# at
org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# at
org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# ... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building
failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to
find valid certification path to requested target
# at
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# at
java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# at
java.base/sun.security.validator.Validator.validate(Validator.java:264)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# ... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable
to find valid certification path to requested target
# at
java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# at
java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# at
java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# at
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# ... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28281ms
ok 65 stop command for single port in 30696ms
ok 66 status detects locally running solr in 14373ms
ok 67 status does not expose cli parameters to end user in 217ms
ok 68 listing out files in 2217ms
ok 69 copying files around in 6577ms
ok 70 upconfig in 2636ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1240ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1235ms
> Task :solr:packaging:integrationTests FAILED
ERROR: The following test(s) have failed:
- org.apache.solr.cloud.ReindexCollectionTest.testAbort (:solr:core)
Test output:
/tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.ReindexCollectionTest.txt
Reproduce with: gradlew :solr:core:test --tests
"org.apache.solr.cloud.ReindexCollectionTest.testAbort" -Ptests.jvms=96
"-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC
-XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m"
-Ptests.seed=CDDB90495B14E577 -Ptests.file.encoding=ISO-8859-1
FAILURE: Build completed with 2 failures.
1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at:
> file:///tmp/src/solr/solr/core/build/test-results/test/
* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================
2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 286
* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command
> '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished
> with non-zero exit value 1
* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================
* Get more help at https://help.gradle.org
BUILD FAILED in 20m 49s
654 actionable tasks: 637 executed, 17 up-to-date
[0m[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1
Total time: 21m16s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**'
'**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such
file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code
23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)
+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]