Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5540/
2 tests failed.
FAILED:
org.apache.solr.common.cloud.TestDocCollectionWatcher.testCanWaitForNonexistantCollection
Error Message:
java.lang.Exception: Test abandoned because suite timeout was reached.
Stack Trace:
java.lang.Exception: Test abandoned because suite timeout was reached.
at __randomizedtesting.SeedInfo.seed([6DE57BFFF1610502]:0)
FAILED: org.apache.solr.common.cloud.TestDocCollectionWatcher.classMethod
Error Message:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
Stack Trace:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
at __randomizedtesting.SeedInfo.seed([6DE57BFFF1610502]:0)
Build Log:
[...truncated 1324 lines...]
# ERROR: IOException occurred when talking to server at:
https://localhost:43519/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at:
/tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO - 2023-09-25 22:32:13.739;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-09-25 22:32:13.744;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# WARN - 2023-09-25 22:32:14.656; org.apache.solr.common.cloud.SolrZkClient;
Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it
creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to
Zookeeper nodes
# WARN - 2023-09-25 22:32:14.694; org.apache.solr.common.cloud.SolrZkClient;
Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates
'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22662ms
ok 61 start solr with client truststore and security manager in 24579ms
not ok 62 start solr with mTLS needed in 57362ms
# (in test file test/test_ssl.bats, line 325)
# `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-rsbToy/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is
listening on port 43519.
#
# Started Solr server on port 43519 (pid=199220). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is
listening on port 43520.
#
# Started Solr server on port 43520 (pid=199641). Happy searching!
#
# INFO - 2023-09-25 22:33:37.282;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-09-25 22:33:37.288;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# INFO - 2023-09-25 22:33:37.657;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for
Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-09-25 22:33:37.660;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for
Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-09-25 22:33:37.661;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for
Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-25 22:33:37.694
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
# "certificate" : {
# "version" : "v3",
# "serial number" : "57 05 95 84",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:13.000 UTC",
# "not after" : "2023-12-24 22:33:13.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 5E 69 13 48 5D C1 55 86 D7 69 EF 52 5B 3E 90 8C
^i.H].U..i.R[>..
# 0010: 9B FC 1B 6A ...j
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 93 58 4B A5 AE 12 72 1B 92 32 1E 6C 74 10 1B F4
.XK...r..2.lt...
# 0010: 79 B7 D2 26 y..&
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "50 13 C9 46",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:07.000 UTC",
# "not after" : "2023-12-24 22:33:07.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 16 99 F3 38 E6 D0 39 52 6F EE B5 53 02 BB DB FD
...8..9Ro..S....
# 0010: BD F0 40 57 ..@W
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 5E 69 13 48 5D C1 55 86 D7 69 EF 52 5B 3E 90 8C
^i.H].U..i.R[>..
# 0010: 9B FC 1B 6A ...j
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 22:33:37.699
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "50 13 C9 46",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:07.000 UTC",
# "not after" : "2023-12-24 22:33:07.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 16 99 F3 38 E6 D0 39 52 6F EE B5 53 02 BB DB FD
...8..9Ro..S....
# 0010: BD F0 40 57 ..@W
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 5E 69 13 48 5D C1 55 86 D7 69 EF 52 5B 3E 90 8C
^i.H].U..i.R[>..
# 0010: 9B FC 1B 6A ...j
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "14 3D 88 1F",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:05.000 UTC",
# "not after" : "2023-12-24 22:33:05.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 16 99 F3 38 E6 D0 39 52 6F EE B5 53 02 BB DB FD
...8..9Ro..S....
# 0010: BD F0 40 57 ..@W
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 22:33:37.715
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:38.049
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:38.050
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:38.051
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:38.051
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:38.204
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:38.204
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:38.206
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:38.206
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:38.212
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:38.224
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:38.225
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:38.225
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:38.228
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "26 BE 46 1C E8 59 BB 5C 14 CE 92 87 F5 17 9A 28 1C
AF A9 2D E6 04 56 26 EE 45 CF DD 87 62 94 54",
# "session id" : "19 27 E6 F0 A2 22 C7 C9 17 43 5C 89 9A 33 C7 D9 14
79 C4 7D 41 B5 A4 12 D9 1F 77 FD 18 A7 82 DC",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A),
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025),
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029),
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
# "compression methods" : "00",
# "extensions" : [
# "status_request (5)": {
# "certificate status type": ocsp
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# },
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "ec_point_formats (11)": {
# "formats": [uncompressed]
# },
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# },
# "status_request_v2 (17)": {
# "cert status request": {
# "certificate status type": ocsp_multi
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# }
# },
# "extended_master_secret (23)": {
# <empty>
# },
# "supported_versions (43)": {
# "versions": [TLSv1.3, TLSv1.2]
# },
# "psk_key_exchange_modes (45)": {
# "ke_modes": [psk_dhe_ke]
# },
# "key_share (51)": {
# "client_shares": [
# {
# "named group": x25519
# "key_exchange": {
# 0000: B3 A5 D3 C1 DC CE 6C 7D E0 01 3F 68 26 80 FC 71
......l...?h&..q
# 0010: 17 37 1A 08 2D D2 13 99 F1 1B C9 CA A8 37 B7 6E
.7..-........7.n
# }
# },
# ]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.336
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
# "server version" : "TLSv1.2",
# "random" : "0E 34 CF 30 6E 9B 53 15 E2 D2 6A AF 75 B4 20 35 05
18 EF 6A 8C A8 2F 0A 74 CD A1 CE 01 F1 B7 05",
# "session id" : "19 27 E6 F0 A2 22 C7 C9 17 43 5C 89 9A 33 C7 D9 14
79 C4 7D 41 B5 A4 12 D9 1F 77 FD 18 A7 82 DC",
# "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)",
# "compression methods" : "00",
# "extensions" : [
# "supported_versions (43)": {
# "selected version": [TLSv1.3]
# },
# "key_share (51)": {
# "server_share": {
# "named group": x25519
# "key_exchange": {
# 0000: A8 A0 7E E9 EE 1E 67 4D F1 6D 78 C0 4A E2 8F D8
......gM.mx.J...
# 0010: 0E CF E1 D4 70 94 B2 ED 7A 12 8D 8B 37 26 8B 2A
....p...z...7&.*
# }
# },
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.336
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.336
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.338
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.338
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.338
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.338
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.338
UTC|SSLExtensions.java:163|Ignore unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.338
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.339
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.339
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.341
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.341
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.341
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.342
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.342
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.342
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.342
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.342
UTC|SSLExtensions.java:207|Ignore unavailable extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.342
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.343
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:38.343
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:38.343
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.343
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.343
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.351
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.353
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.354
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.358
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake
message (
# "EncryptedExtensions": [
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.358
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.358
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.359
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.359
UTC|SSLExtensions.java:192|Consumed extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.359
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.359
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:38.359
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:38.359
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.361
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
# "certificate_request_context": "",
# "extensions": [
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "certificate_authorities (47)": {
# "certificate authorities": [
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.362
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.362
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.362
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.363
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.364
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:38.365
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.369
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message
(
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "47 91 87 DE",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:09.000 UTC",
# "not after" : "2023-12-24 22:33:09.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 5E 69 13 48 5D C1 55 86 D7 69 EF 52 5B 3E 90 8C
^i.H].U..i.R[>..
# 0010: 9B FC 1B 6A ...j
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# serverAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: DA DE B9 8F 0F 52 C7 CE 81 63 AD 6B 50 18 A9 A0
.....R...c.kP...
# 0010: 4D 5A 3F 08 MZ?.
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.369
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.456
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
# "certificate" : {
# "version" : "v3",
# "serial number" : "50 13 C9 46",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:07.000 UTC",
# "not after" : "2023-12-24 22:33:07.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 16 99 F3 38 E6 D0 39 52 6F EE B5 53 02 BB DB FD
...8..9Ro..S....
# 0010: BD F0 40 57 ..@W
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 5E 69 13 48 5D C1 55 86 D7 69 EF 52 5B 3E 90 8C
^i.H].U..i.R[>..
# 0010: 9B FC 1B 6A ...j
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.460
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 91 93 89 C7 A5 4F B6 44 42 25 F6 9B 09 CD CB 43 .....O.DB%.....C
# 0010: C5 B3 33 06 83 0A 78 07 41 B0 FA DE 40 2D F2 B2 ..3...x.A...@-..
# 0020: 62 DF 9B C2 CC 63 15 B3 CD EE D4 9C AB 10 74 EE b....c........t.
# 0030: F6 15 38 42 93 6F 9F 43 33 2B 3F C3 4B 32 01 9A ..8B.o.C3+?.K2..
# 0040: FF E3 39 D6 1D EB 0C DC FC 04 D2 09 C4 AC E2 D2 ..9.............
# 0050: 93 4A 3E 58 D4 2B C9 F3 C1 5A 02 76 AB 57 37 9C .J>X.+...Z.v.W7.
# 0060: 10 86 D9 9E 17 C1 59 3E B8 9D 42 C6 FC 1A 52 0E ......Y>..B...R.
# 0070: 94 73 BC 54 4F FF 9B 26 CF 02 FD 6A 10 43 55 C2 .s.TO..&...j.CU.
# 0080: 39 3E 7E FE FF 59 1F 5B 96 7E 83 05 6F DF E7 55 9>...Y.[....o..U
# 0090: 7C D4 A1 93 26 2F 89 5E DB B8 B9 23 BF EE 20 D9 ....&/.^...#.. .
# 00A0: 46 07 B5 3C 5D 67 5C A3 FF AB 88 64 05 79 BB 0F F..<]g\....d.y..
# 00B0: 6C C5 B0 83 F9 4F E9 D3 60 FF 8B 34 31 ED 17 A3 l....O..`..41...
# 00C0: A7 85 4E 5A 91 BB FE 51 AF D2 86 02 C2 9E 5A 91 ..NZ...Q......Z.
# 00D0: B6 E2 BB BE 84 0E 8A 7D AE 61 FF 99 4C DA AE D3 .........a..L...
# 00E0: 96 E0 E8 F7 7C 7A DC 99 1F 69 79 61 BB 1A AB B7 .....z...iya....
# 00F0: C9 13 23 50 AF E7 C9 4F CB 84 18 22 81 7A 46 6F ..#P...O...".zFo
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.462
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: C4 A6 30 10 64 41 F2 33 5A 02 57 97 92 3F 3D E4 ..0.dA.3Z.W..?=.
# 0010: 24 78 7C 94 32 D1 44 63 06 F4 9D E9 05 49 30 8B $x..2.Dc.....I0.
# 0020: BD E4 B1 F7 1E 52 6E 8A 78 B1 9D F6 35 84 A3 1E .....Rn.x...5...
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.465
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 22:33:38.466
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:38.466
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 22:33:38.467
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:38.467
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 22:33:38.467
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:38.468
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.468
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.471
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "57 05 95 84",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:13.000 UTC",
# "not after" : "2023-12-24 22:33:13.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational
Unit, O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 5E 69 13 48 5D C1 55 86 D7 69 EF 52 5B 3E 90 8C
^i.H].U..i.R[>..
# 0010: 9B FC 1B 6A ...j
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 93 58 4B A5 AE 12 72 1B 92 32 1E 6C 74 10 1B F4
.XK...r..2.lt...
# 0010: 79 B7 D2 26 y..&
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "50 13 C9 46",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:07.000 UTC",
# "not after" : "2023-12-24 22:33:07.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 16 99 F3 38 E6 D0 39 52 6F EE B5 53 02 BB DB FD
...8..9Ro..S....
# 0010: BD F0 40 57 ..@W
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 5E 69 13 48 5D C1 55 86 D7 69 EF 52 5B 3E 90 8C
^i.H].U..i.R[>..
# 0010: 9B FC 1B 6A ...j
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.496
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake
message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: AA 2C 47 76 EE 4A 30 F8 37 13 82 0F 7E 99 BA 5A .,Gv.J0.7......Z
# 0010: 27 48 0C 3C E5 23 34 21 DE 9B 0D 6C 29 9C D9 65 'H.<.#4!...l)..e
# 0020: 96 8F 98 C0 80 06 52 84 57 B3 A9 C0 86 6D F4 3F ......R.W....m.?
# 0030: 39 CB F6 C6 0F 0B B1 A7 29 E5 7B 6E 8C DD B7 1B 9.......)..n....
# 0040: 9F 1A CE 3C 64 7B 08 51 06 63 EC 95 47 AF 41 C3 ...<d..Q.c..G.A.
# 0050: 6A 6A 82 F2 92 42 4F 5B 64 41 3D FC FC C6 C9 2E jj...BO[dA=.....
# 0060: 79 FB 81 0C 30 4D 84 F9 38 55 A7 59 54 56 71 8C y...0M..8U.YTVq.
# 0070: C9 0B 25 77 09 60 81 B7 98 F6 15 7C 20 0F 76 51 ..%w.`...... .vQ
# 0080: 32 6D 9D 99 25 E0 82 6D 5A 79 44 D8 1C BC 8E AF 2m..%..mZyD.....
# 0090: 95 93 00 52 B0 9F 49 59 3A 7E 79 CC CC C1 7C 4C ...R..IY:.y....L
# 00A0: 4B 1F 1F A3 5B 4D AE 57 33 F9 E2 6D 69 A7 74 04 K...[M.W3..mi.t.
# 00B0: 74 A8 87 07 15 44 E0 5F 4F CA D7 0D 2A 93 0C 5E t....D._O...*..^
# 00C0: 2E 9A 37 5A 33 72 79 65 C4 C7 6F DB 5A 85 E1 DC ..7Z3rye..o.Z...
# 00D0: 55 DB 20 C3 28 C4 6C 1F 6E C1 AD B4 98 4F 14 0C U. .(.l.n....O..
# 00E0: FF 57 13 80 96 A0 B2 34 F2 BC E7 28 B9 D1 21 3B .W.....4...(..!;
# 00F0: BB 71 90 65 11 49 6D E3 BB 19 2D 71 84 E4 AE CE .q.e.Im...-q....
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.497
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: 35 BE 29 AD F0 BF 1A A3 69 5A FC 43 5A DD 48 94 5.).....iZ.CZ.H.
# 0010: 00 E6 DC 42 61 5B C3 B0 BA 25 22 04 99 E7 B8 B7 ...Ba[...%".....
# 0020: 84 C6 03 DB 8D C0 CD 38 95 87 A4 43 8A 62 60 0E .......8...C.b`.
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.498
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.548
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
# "ticket_lifetime" : "86,400",
# "ticket_age_add" : "<omitted>",
# "ticket_nonce" : "01",
# "ticket" : "88 CA E9 49 E3 74 EE 9F 4E 5D DA 10 7E 50 92 FA
7E EF AE 4B ED F7 86 87 F6 94 DD 81 8F 1C B2 24",
# "extensions" : [
# <no extension>
# ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-25 22:33:38.819
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-25 22:33:38.821
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound
application data
# INFO - 2023-09-25 22:33:39.765;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-09-25 22:33:39.770;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# INFO - 2023-09-25 22:33:40.135;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for
Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-09-25 22:33:40.138;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for
Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-09-25 22:33:40.138;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for
Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-25 22:33:40.170
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
# "certificate" : {
# "version" : "v3",
# "serial number" : "57 05 95 84",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:13.000 UTC",
# "not after" : "2023-12-24 22:33:13.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 5E 69 13 48 5D C1 55 86 D7 69 EF 52 5B 3E 90 8C
^i.H].U..i.R[>..
# 0010: 9B FC 1B 6A ...j
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 93 58 4B A5 AE 12 72 1B 92 32 1E 6C 74 10 1B F4
.XK...r..2.lt...
# 0010: 79 B7 D2 26 y..&
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "50 13 C9 46",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:07.000 UTC",
# "not after" : "2023-12-24 22:33:07.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 16 99 F3 38 E6 D0 39 52 6F EE B5 53 02 BB DB FD
...8..9Ro..S....
# 0010: BD F0 40 57 ..@W
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 5E 69 13 48 5D C1 55 86 D7 69 EF 52 5B 3E 90 8C
^i.H].U..i.R[>..
# 0010: 9B FC 1B 6A ...j
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 22:33:40.174
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "50 13 C9 46",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:07.000 UTC",
# "not after" : "2023-12-24 22:33:07.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 16 99 F3 38 E6 D0 39 52 6F EE B5 53 02 BB DB FD
...8..9Ro..S....
# 0010: BD F0 40 57 ..@W
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 5E 69 13 48 5D C1 55 86 D7 69 EF 52 5B 3E 90 8C
^i.H].U..i.R[>..
# 0010: 9B FC 1B 6A ...j
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "14 3D 88 1F",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:05.000 UTC",
# "not after" : "2023-12-24 22:33:05.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 16 99 F3 38 E6 D0 39 52 6F EE B5 53 02 BB DB FD
...8..9Ro..S....
# 0010: BD F0 40 57 ..@W
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 22:33:40.189
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:40.422
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:40.423
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:40.424
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:40.425
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:40.430
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:40.441
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:40.442
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:40.442
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:40.444
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "6E CA 45 4C 4E 4C 77 2D 6D 80 C0 88 A0 54 1D D9 A5
20 6A E1 68 60 1E CA B8 78 1D A6 69 4D FE 7F",
# "session id" : "66 B8 54 23 45 06 0A BE 05 68 6A 40 E2 69 13 52 00
FB D1 30 CB B0 27 45 7B 95 73 BB 4C E6 50 7E",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A),
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025),
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029),
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
# "compression methods" : "00",
# "extensions" : [
# "status_request (5)": {
# "certificate status type": ocsp
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# },
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "ec_point_formats (11)": {
# "formats": [uncompressed]
# },
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# },
# "status_request_v2 (17)": {
# "cert status request": {
# "certificate status type": ocsp_multi
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# }
# },
# "extended_master_secret (23)": {
# <empty>
# },
# "supported_versions (43)": {
# "versions": [TLSv1.3, TLSv1.2]
# },
# "psk_key_exchange_modes (45)": {
# "ke_modes": [psk_dhe_ke]
# },
# "key_share (51)": {
# "client_shares": [
# {
# "named group": x25519
# "key_exchange": {
# 0000: 34 62 7D E0 8D 24 7B AD 2B C3 58 9F AF 4C D5 06
4b...$..+.X..L..
# 0010: 15 E5 1F B0 62 15 8C F2 FA E4 E4 81 D9 74 0D 24
....b........t.$
# }
# },
# ]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.555
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
# "server version" : "TLSv1.2",
# "random" : "F7 7A CD B1 1C A3 3D 4F 75 C3 12 B2 A4 7E 10 C3 2D
16 74 54 7B B4 E5 D6 56 26 2A 5D 2B 16 33 81",
# "session id" : "66 B8 54 23 45 06 0A BE 05 68 6A 40 E2 69 13 52 00
FB D1 30 CB B0 27 45 7B 95 73 BB 4C E6 50 7E",
# "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)",
# "compression methods" : "00",
# "extensions" : [
# "supported_versions (43)": {
# "selected version": [TLSv1.3]
# },
# "key_share (51)": {
# "server_share": {
# "named group": x25519
# "key_exchange": {
# 0000: D4 DC 13 61 A5 EB F1 23 8F D9 53 6C 60 B2 C9 78
...a...#..Sl`..x
# 0010: D9 82 30 BC 2C A8 64 47 78 CF 33 33 0C F8 66 54
..0.,.dGx.33..fT
# }
# },
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.555
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.555
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.556
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.556
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.557
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.557
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.557
UTC|SSLExtensions.java:163|Ignore unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.557
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.557
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.557
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.559
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.559
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.560
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.560
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.560
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.560
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.560
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.560
UTC|SSLExtensions.java:207|Ignore unavailable extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.560
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.561
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:40.561
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:40.561
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.561
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.561
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.568
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.569
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.570
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.574
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake
message (
# "EncryptedExtensions": [
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.574
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.574
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.574
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.575
UTC|SSLExtensions.java:192|Consumed extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.575
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.575
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:40.575
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:40.575
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.576
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
# "certificate_request_context": "",
# "extensions": [
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "certificate_authorities (47)": {
# "certificate authorities": [
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.577
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.577
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.577
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.578
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.579
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:40.579
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.582
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message
(
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "47 91 87 DE",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:09.000 UTC",
# "not after" : "2023-12-24 22:33:09.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 5E 69 13 48 5D C1 55 86 D7 69 EF 52 5B 3E 90 8C
^i.H].U..i.R[>..
# 0010: 9B FC 1B 6A ...j
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# serverAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: DA DE B9 8F 0F 52 C7 CE 81 63 AD 6B 50 18 A9 A0
.....R...c.kP...
# 0010: 4D 5A 3F 08 MZ?.
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.582
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:40.635
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:40.635
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:40.636
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:40.636
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.658
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
# "certificate" : {
# "version" : "v3",
# "serial number" : "50 13 C9 46",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:07.000 UTC",
# "not after" : "2023-12-24 22:33:07.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 16 99 F3 38 E6 D0 39 52 6F EE B5 53 02 BB DB FD
...8..9Ro..S....
# 0010: BD F0 40 57 ..@W
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 5E 69 13 48 5D C1 55 86 D7 69 EF 52 5B 3E 90 8C
^i.H].U..i.R[>..
# 0010: 9B FC 1B 6A ...j
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.662
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 58 A3 AF 0D 54 C9 05 B9 B0 99 90 5C 2A 71 AA 39 X...T......\*q.9
# 0010: 73 7D F3 3E 51 80 B0 1B 9C 76 84 A8 99 67 B7 99 s..>Q....v...g..
# 0020: 5F 0C 42 44 9B 52 27 C2 F8 8D A0 4A 2A 93 4F 69 _.BD.R'....J*.Oi
# 0030: 15 B4 57 2E A9 3C FF DB DA EC E0 CF AD 62 1A 2B ..W..<.......b.+
# 0040: FA F0 44 16 FB 0B 17 1B 65 E0 38 BB 58 7C 4D A0 ..D.....e.8.X.M.
# 0050: 55 5E 12 8B FC 0D FC C6 C7 F8 A1 29 01 37 12 F3 U^.........).7..
# 0060: 69 A9 D3 D4 25 3E 97 44 99 1D 8F B3 7F DE 6F 1D i...%>.D......o.
# 0070: 12 2F AC 99 B6 D9 7C B5 9F 40 32 BA 3E EC E0 2D ./.......@2.>..-
# 0080: 77 F5 C6 71 32 71 AF 5C 23 21 E8 3B 86 9A 2C 77 w..q2q.\#!.;..,w
# 0090: D3 F0 9C 07 E5 1F DC F5 9B 91 17 07 50 64 1E 1B ............Pd..
# 00A0: 88 46 7A 23 7E 42 E0 2C 29 76 6A 32 C9 D4 4E 36 .Fz#.B.,)vj2..N6
# 00B0: A6 3F 0F ED 6E 48 0E 6D 13 09 2D EE C3 0D 27 E1 .?..nH.m..-...'.
# 00C0: 3E 64 99 45 54 A2 98 6C C8 55 A0 68 4D 73 78 2C >d.ET..l.U.hMsx,
# 00D0: 0E 39 79 F4 BC 77 3A E9 B5 24 F5 3D AD 4C 22 15 .9y..w:..$.=.L".
# 00E0: FA AA 7B A2 F1 D3 0B 68 9C 5E 4D 5B 3C 80 52 C9 .......h.^M[<.R.
# 00F0: DA DA 0B E8 37 1F 5D A4 73 81 0D 1F F0 27 80 A8 ....7.].s....'..
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.664
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: 41 24 8A A8 D3 69 7B FD 8B 60 41 60 BD 49 4A 4F A$...i...`A`.IJO
# 0010: 5A A0 6C 5B 6C D7 86 93 48 90 B5 36 39 A7 BF D6 Z.l[l...H..69...
# 0020: AF 2E 71 E5 C4 73 96 6A 22 6B F8 05 51 08 8C F5 ..q..s.j"k..Q...
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.666
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 22:33:40.667
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:40.668
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 22:33:40.668
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:40.668
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 22:33:40.668
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:40.669
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.669
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.671
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "57 05 95 84",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:13.000 UTC",
# "not after" : "2023-12-24 22:33:13.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational
Unit, O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 5E 69 13 48 5D C1 55 86 D7 69 EF 52 5B 3E 90 8C
^i.H].U..i.R[>..
# 0010: 9B FC 1B 6A ...j
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 93 58 4B A5 AE 12 72 1B 92 32 1E 6C 74 10 1B F4
.XK...r..2.lt...
# 0010: 79 B7 D2 26 y..&
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "50 13 C9 46",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:07.000 UTC",
# "not after" : "2023-12-24 22:33:07.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 16 99 F3 38 E6 D0 39 52 6F EE B5 53 02 BB DB FD
...8..9Ro..S....
# 0010: BD F0 40 57 ..@W
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 5E 69 13 48 5D C1 55 86 D7 69 EF 52 5B 3E 90 8C
^i.H].U..i.R[>..
# 0010: 9B FC 1B 6A ...j
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.698
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake
message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 03 FD 04 CB 09 50 8B 88 99 6D C0 31 F7 37 5B D0 .....P...m.1.7[.
# 0010: B2 3D DE 4B CD 17 AA A1 09 4B 5F D5 3F EC FD 82 .=.K.....K_.?...
# 0020: 86 21 70 A2 09 25 0E 7F 70 6E 43 49 F7 AA 7E FD .!p..%..pnCI....
# 0030: 0E 28 0B 89 E6 B5 1A FA AD 84 8B 62 C5 8F 03 E8 .(.........b....
# 0040: 8D 1B EF A9 F0 20 67 7B 82 7C 99 1F 0A 4D 7B 3A ..... g......M.:
# 0050: 02 41 9E 6F C8 EA 3B 40 13 E4 78 16 8B 07 E0 8E .A.o..;@..x.....
# 0060: 03 4C 50 3B 51 26 9A 77 E4 8A 38 F7 D2 75 C8 11 .LP;Q&.w..8..u..
# 0070: 31 23 48 BC 39 E2 96 EB F7 C6 60 ED 78 0D B4 BB 1#H.9.....`.x...
# 0080: E8 B6 93 CE 0E 13 9E 44 08 6A E2 F4 97 3A 53 BF .......D.j...:S.
# 0090: 53 0C 4B 08 0C BD 53 82 C6 2A FC BB 51 91 85 2F S.K...S..*..Q../
# 00A0: 09 74 43 69 71 2B 6A D0 65 46 67 64 BD 5B 7B 56 .tCiq+j.eFgd.[.V
# 00B0: 7B CC 27 6E 8F B2 AD 8E 54 99 53 EB 40 07 64 0C ..'[email protected].
# 00C0: 9B 91 C1 AB 14 BD 61 91 29 0E B2 60 03 B1 95 8E ......a.)..`....
# 00D0: 1C D8 F6 A6 E3 CF 49 BF 2A AA 62 2C 5A EA 5D 65 ......I.*.b,Z.]e
# 00E0: CC 5A 77 29 97 44 66 A1 78 0A 18 70 F6 6D EC E2 .Zw).Df.x..p.m..
# 00F0: A6 F0 CD EE 93 CC 8C 4D 52 0C 74 94 4E B1 E1 16 .......MR.t.N...
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.699
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: CE A7 ED A6 1C C5 AA 82 05 9C D3 62 5D 7B B7 1B ...........b]...
# 0010: F4 28 F4 F9 21 93 BD 92 B5 BF D2 68 F4 AA EB 0D .(..!......h....
# 0020: D5 D1 93 46 0F 56 79 98 2A 00 35 60 0F 61 EC 31 ...F.Vy.*.5`.a.1
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.700
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.749
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
# "ticket_lifetime" : "86,400",
# "ticket_age_add" : "<omitted>",
# "ticket_nonce" : "01",
# "ticket" : "B1 BF 66 21 D4 D1 C1 B1 BE A3 C5 6D 57 2F 96 96
89 C9 28 CF F6 CB 56 3D 96 DC B4 18 92 24 95 F4",
# "extensions" : [
# <no extension>
# ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-25 22:33:41.019
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-25 22:33:41.020
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound
application data
#
# -- output does not contain substring --
# substring (1 lines):
# Server refused connection
# output (491 lines):
# INFO - 2023-09-25 22:33:52.342;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# javax.net.ssl|DEBUG|01|main|2023-09-25 22:33:52.674
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "50 13 C9 46",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:07.000 UTC",
# "not after" : "2023-12-24 22:33:07.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 16 99 F3 38 E6 D0 39 52 6F EE B5 53 02 BB DB FD
...8..9Ro..S....
# 0010: BD F0 40 57 ..@W
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 5E 69 13 48 5D C1 55 86 D7 69 EF 52 5B 3E 90 8C
^i.H].U..i.R[>..
# 0010: 9B FC 1B 6A ...j
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "14 3D 88 1F",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-09-25 22:33:05.000 UTC",
# "not after" : "2023-12-24 22:33:05.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 16 99 F3 38 E6 D0 39 52 6F EE B5 53 02 BB DB FD
...8..9Ro..S....
# 0010: BD F0 40 57 ..@W
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 22:33:52.691
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:53.083
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:53.083
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:53.084
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:53.084
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:53.169
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:53.170
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:53.171
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:53.172
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:53.178
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:53.190
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:53.190
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:53.190
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:53.193
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "15 F3 84 C4 B9 2F ED DD 6A 10 7F D7 AD 0C 1B 95
36 29 15 A9 7A C2 41 BE B9 CD AA 33 AA 01 D8 12",
# "session id" : "24 48 1F B1 80 B4 1F E1 2A 7D 26 98 92 0A 62 4E
46 A9 DB E5 10 3B 75 13 9B 8D 2E 4F 59 FE BB 6A",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A),
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025),
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029),
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
# "compression methods" : "00",
# "extensions" : [
# "status_request (5)": {
# "certificate status type": ocsp
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# },
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448,
ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "ec_point_formats (11)": {
# "formats": [uncompressed]
# },
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# },
# "status_request_v2 (17)": {
# "cert status request": {
# "certificate status type": ocsp_multi
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# }
# },
# "extended_master_secret (23)": {
# <empty>
# },
# "supported_versions (43)": {
# "versions": [TLSv1.3, TLSv1.2]
# },
# "psk_key_exchange_modes (45)": {
# "ke_modes": [psk_dhe_ke]
# },
# "key_share (51)": {
# "client_shares": [
# {
# "named group": x25519
# "key_exchange": {
# 0000: A3 41 EA FD 02 B1 68 31 3C 66 24 BA 2C F5 49 AC
.A....h1<f$.,.I.
# 0010: 18 72 25 74 B8 A1 AD 6B 06 67 23 54 EF 32 0C 1A
.r%t...k.g#T.2..
# }
# },
# ]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.212
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
# "server version" : "TLSv1.2",
# "random" : "08 18 5B FF 85 00 19 DA B4 E5 70 15 20 40 E3 2C
79 66 C8 A9 BD 9A 9F 32 FF 0E 14 71 94 FA 88 3A",
# "session id" : "24 48 1F B1 80 B4 1F E1 2A 7D 26 98 92 0A 62 4E
46 A9 DB E5 10 3B 75 13 9B 8D 2E 4F 59 FE BB 6A",
# "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)",
# "compression methods" : "00",
# "extensions" : [
# "supported_versions (43)": {
# "selected version": [TLSv1.3]
# },
# "key_share (51)": {
# "server_share": {
# "named group": x25519
# "key_exchange": {
# 0000: C7 3B 8D 0E CD EB 80 7A 59 9D 84 0E 2D D7 F6 98
.;.....zY...-...
# 0010: B5 17 6D B2 45 47 BA 24 68 26 AF 38 27 DF 59 4D
..m.EG.$h&.8'.YM
# }
# },
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.213
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.213
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.214
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.214
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.214
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.215
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.215
UTC|SSLExtensions.java:163|Ignore unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.215
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.215
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.215
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.217
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.218
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.218
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.218
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.218
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.219
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.219
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.219
UTC|SSLExtensions.java:207|Ignore unavailable extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.219
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.219
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:53.219
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:53.219
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.220
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.220
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.227
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.229
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.230
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.234
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake
message (
# "EncryptedExtensions": [
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.234
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.234
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.234
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.234
UTC|SSLExtensions.java:192|Consumed extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.234
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.234
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:53.235
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:3
[...truncated too long message...]
2> at
app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
2> at
app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
2> at
app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
2> at [email protected]/java.lang.Thread.run(Thread.java:829)
2> 71) Thread[id=77, name=qtp1094083871-77, state=TIMED_WAITING,
group=TGRP-TestDocCollectionWatcher]
2> at [email protected]/jdk.internal.misc.Unsafe.park(Native Method)
2> at
[email protected]/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
2> at
[email protected]/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
2> at
app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
2> at
app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
2> at
app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
2> at [email protected]/java.lang.Thread.run(Thread.java:829)
2> 72) Thread[id=81, name=qtp734515328-81, state=TIMED_WAITING,
group=TGRP-TestDocCollectionWatcher]
2> at [email protected]/jdk.internal.misc.Unsafe.park(Native Method)
2> at
[email protected]/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
2> at
[email protected]/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
2> at
app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
2> at
app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
2> at
app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
2> at [email protected]/java.lang.Thread.run(Thread.java:829)
2> 73) Thread[id=95, name=qtp1094083871-95, state=TIMED_WAITING,
group=TGRP-TestDocCollectionWatcher]
2> at [email protected]/jdk.internal.misc.Unsafe.park(Native Method)
2> at
[email protected]/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
2> at
[email protected]/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
2> at
app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
2> at
app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
2> at
app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
2> at [email protected]/java.lang.Thread.run(Thread.java:829)
2> 74) Thread[id=132, name=h2sc-61-thread-1, state=RUNNABLE,
group=TGRP-TestDocCollectionWatcher]
2> at [email protected]/sun.nio.ch.EPoll.wait(Native Method)
2> at
[email protected]/sun.nio.ch.EPollSelectorImpl.doSelect(EPollSelectorImpl.java:120)
2> at
[email protected]/sun.nio.ch.SelectorImpl.lockAndDoSelect(SelectorImpl.java:124)
2> at
[email protected]/sun.nio.ch.SelectorImpl.select(SelectorImpl.java:141)
2> at
app//org.eclipse.jetty.io.ManagedSelector.nioSelect(ManagedSelector.java:180)
2> at
app//org.eclipse.jetty.io.ManagedSelector.select(ManagedSelector.java:187)
2> at
app//org.eclipse.jetty.io.ManagedSelector$SelectorProducer.select(ManagedSelector.java:604)
2> at
app//org.eclipse.jetty.io.ManagedSelector$SelectorProducer.produce(ManagedSelector.java:541)
2> at
app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
2> at
app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
2> at
app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
2> at
app//org.eclipse.jetty.io.ManagedSelector$$Lambda$276/0x0000000840362c40.run(Unknown
Source)
2> at
app//org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
2> at
app//org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor$$Lambda$277/0x0000000840362440.run(Unknown
Source)
2> at
[email protected]/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
2> at
[email protected]/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
2> at [email protected]/java.lang.Thread.run(Thread.java:829)
2> 75) Thread[id=84, name=qtp1094083871-84, state=TIMED_WAITING,
group=TGRP-TestDocCollectionWatcher]
2> at [email protected]/jdk.internal.misc.Unsafe.park(Native Method)
2> at
[email protected]/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
2> at
[email protected]/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
2> at
app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
2> at
app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
2> at
app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
2> at [email protected]/java.lang.Thread.run(Thread.java:829)
> java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
> at __randomizedtesting.SeedInfo.seed([6DE57BFFF1610502]:0)
2> NOTE: test params are: codec=Asserting(Lucene95): {}, docValues:{},
maxPointsInLeafNode=592, maxMBSortInHeap=5.967649802224547,
sim=Asserting(RandomSimilarity(queryNorm=true): {}), locale=en-UG,
timezone=Africa/Tripoli
2> NOTE: Linux 5.4.0-100-generic amd64/Oracle Corporation 11.0.16
(64-bit)/cpus=1,threads=87,free=157643144,total=322961408
2> NOTE: All tests run in this JVM: [LargeVolumeBinaryJettyTest,
TestDocCollectionWatcher]
2> NOTE: reproduce with: gradlew test --tests TestDocCollectionWatcher
-Dtests.seed=6DE57BFFF1610502 -Dtests.locale=en-UG
-Dtests.timezone=Africa/Tripoli -Dtests.asserts=true -Dtests.file.encoding=UTF-8
:solr:solrj:test (FAILURE): 1136 test(s), 2 failure(s), 40 skipped
1136 tests completed, 2 failed, 40 skipped
> Task :solr:solrj:test FAILED
> Task :solr:solrj:wipeTaskTemp
ERROR: The following test(s) have failed:
-
org.apache.solr.common.cloud.TestDocCollectionWatcher.testCanWaitForNonexistantCollection
(:solr:solrj)
Test output:
/tmp/src/solr/solr/solrj/build/test-results/test/outputs/OUTPUT-org.apache.solr.common.cloud.TestDocCollectionWatcher.txt
Reproduce with: gradlew :solr:solrj:test --tests
"org.apache.solr.common.cloud.TestDocCollectionWatcher.testCanWaitForNonexistantCollection"
-Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC
-XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m"
-Ptests.seed=6DE57BFFF1610502 -Ptests.file.encoding=US-ASCII
- org.apache.solr.common.cloud.TestDocCollectionWatcher.classMethod
(:solr:solrj)
Test output:
/tmp/src/solr/solr/solrj/build/test-results/test/outputs/OUTPUT-org.apache.solr.common.cloud.TestDocCollectionWatcher.txt
Reproduce with: gradlew :solr:solrj:test --tests
"org.apache.solr.common.cloud.TestDocCollectionWatcher.classMethod"
-Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC
-XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m"
-Ptests.seed=6DE57BFFF1610502 -Ptests.file.encoding=US-ASCII
FAILURE: Build completed with 2 failures.
1: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301
* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command
> '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished
> with non-zero exit value 1
* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================
2: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:solrj:test'.
> There were failing tests. See the results at:
> file:///tmp/src/solr/solr/solrj/build/test-results/test/
* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================
* Get more help at https://help.gradle.org
BUILD FAILED in 2h 2m 39s
673 actionable tasks: 656 executed, 17 up-to-date
[0m[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1
Total time: 2h3m2s
------------------------------------------------------------------------
Error: Error parsing md5sums for crave update
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**'
'**/hs_err_pid*'
Error: Error parsing md5sums for crave update
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such
file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code
23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)
+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]