Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5557/
All tests passed Build Log: [...truncated 1232 lines...] # ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/octet-stream, application/vnd.apache.solr.javabin] but got text/html. <p> # Searching for Solr?<br/> # You must type the correct path.<br/> # Solr will respond. # </p> # -- # # Please find the SOLR_HOME snapshot for failed test #1 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/6-1 # WARN - 2023-09-27 17:34:11.758; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes # # ERROR: java.util.concurrent.TimeoutException: Could not connect to ZooKeeper localhost:34797 within 15000 ms # # Last output: # WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use. # To turn off: bin/solr config -c COLL_NAME -p 33797 -action set-user-property -property update.autoCreateFields -value false # # ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/octet-stream, application/vnd.apache.solr.javabin] but got text/html. <p> # Searching for Solr?<br/> # You must type the correct path.<br/> # Solr will respond. # </p> > Task :solr:core:renderSiteJavadoc > Task :solr:modules:jaegertracer-configurator:renderSiteJavadoc > Task :solr:modules:opentelemetry:renderSiteJavadoc > Task :solr:modules:clustering:renderSiteJavadoc > Task :solr:modules:analysis-extras:renderSiteJavadoc > Task :solr:modules:scripting:renderSiteJavadoc > Task :solr:modules:s3-repository:renderSiteJavadoc > Task :solr:modules:gcs-repository:renderSiteJavadoc > Task :solr:modules:jwt-auth:renderSiteJavadoc > Task :solr:modules:langid:renderSiteJavadoc > Task :solr:modules:hadoop-auth:renderSiteJavadoc > Task :solr:modules:sql:renderSiteJavadoc > Task :solr:modules:extraction:renderSiteJavadoc > Task :solr:modules:hdfs:renderSiteJavadoc > Task :solr:modules:ltr:renderSiteJavadoc > Task :solr:modules:analytics:renderSiteJavadoc > Task :solr:test-framework:renderSiteJavadoc > Task :solr:packaging:integrationTests ok 7 reject d option with invalid config dir in 16631ms > Task :solr:benchmark:renderSiteJavadoc > Task :solr:documentation:documentation > Task :solr:packaging:integrationTests not ok 8 accept d option with builtin config in 18035ms # (from function `assert_output' in file /tmp/src/solr/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247, # in test file test/test_create_collection.bats, line 53) # `assert_output --partial "Created collection 'COLL_NAME'"' failed # # -- output does not contain substring -- # substring (1 lines): # Created collection 'COLL_NAME' # output (6 lines): # # ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <p> # Searching for Solr?<br/> # You must type the correct path.<br/> # Solr will respond. # </p> # -- # # Please find the SOLR_HOME snapshot for failed test #3 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/8-3 # WARN - 2023-09-27 17:34:46.473; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes # # ERROR: java.util.concurrent.TimeoutException: Could not connect to ZooKeeper localhost:34797 within 15000 ms # # Last output: # # ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <p> # Searching for Solr?<br/> # You must type the correct path.<br/> # Solr will respond. # </p> > Task :solr:documentation:checkBrokenLinks > Task :solr:packaging:integrationTests not ok 9 accept d option with explicit path to config in 18059ms # (from function `assert_output' in file /tmp/src/solr/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247, # in test file test/test_create_collection.bats, line 63) # `assert_output --partial "Created collection 'COLL_NAME'"' failed # # -- output does not contain substring -- # substring (1 lines): # Created collection 'COLL_NAME' # output (6 lines): # # ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <p> # Searching for Solr?<br/> # You must type the correct path.<br/> # Solr will respond. # </p> # -- # # Please find the SOLR_HOME snapshot for failed test #4 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/9-4 # WARN - 2023-09-27 17:35:04.546; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes # # ERROR: java.util.concurrent.TimeoutException: Could not connect to ZooKeeper localhost:34797 within 15000 ms # # Last output: # # ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <p> # Searching for Solr?<br/> # You must type the correct path.<br/> # Solr will respond. # </p> not ok 10 accept n option as config name in 18410ms # (from function `assert_output' in file /tmp/src/solr/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247, # in test file test/test_create_collection.bats, line 68) # `assert_output --partial "Created collection 'COLL_NAME'"' failed # # -- output does not contain substring -- # substring (1 lines): # Created collection 'COLL_NAME' # output (6 lines): # # ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <p> # Searching for Solr?<br/> # You must type the correct path.<br/> # Solr will respond. # </p> # -- # # Please find the SOLR_HOME snapshot for failed test #5 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/10-5 # WARN - 2023-09-27 17:35:22.993; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes # # ERROR: java.util.concurrent.TimeoutException: Could not connect to ZooKeeper localhost:34797 within 15000 ms # # Last output: # # ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <p> # Searching for Solr?<br/> # You must type the correct path.<br/> # Solr will respond. # </p> > Task :solr:documentation:check > Task :solr:packaging:integrationTests not ok 11 allow config reuse when n option specifies same config in 17961ms # (in test file test/test_create_collection.bats, line 73) # `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1 # Please find the SOLR_HOME snapshot for failed test #6 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/11-6 # WARN - 2023-09-27 17:35:40.981; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes # # ERROR: java.util.concurrent.TimeoutException: Could not connect to ZooKeeper localhost:34797 within 15000 ms # # Last output: # # ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/octet-stream, application/vnd.apache.solr.javabin] but got text/html. <p> # Searching for Solr?<br/> # You must type the correct path.<br/> # Solr will respond. # </p> not ok 12 create multisharded collections when s provided in 18293ms # (in test file test/test_create_collection.bats, line 83) # `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1 # Please find the SOLR_HOME snapshot for failed test #7 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/12-7 # WARN - 2023-09-27 17:35:59.296; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes # # ERROR: java.util.concurrent.TimeoutException: Could not connect to ZooKeeper localhost:34797 within 15000 ms # # Last output: # WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use. # To turn off: bin/solr config -c COLL_NAME -p 33797 -action set-user-property -property update.autoCreateFields -value false # # ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/octet-stream, application/vnd.apache.solr.javabin] but got text/html. <p> # Searching for Solr?<br/> # You must type the correct path.<br/> # Solr will respond. # </p> not ok 13 create replicated collections when rf provided in 18324ms # (in test file test/test_create_collection.bats, line 89) # `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1 # Please find the SOLR_HOME snapshot for failed test #8 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/13-8 # WARN - 2023-09-27 17:36:17.646; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes # # ERROR: java.util.concurrent.TimeoutException: Could not connect to ZooKeeper localhost:34797 within 15000 ms # # Last output: # WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use. # To turn off: bin/solr config -c COLL_NAME -p 33797 -action set-user-property -property update.autoCreateFields -value false # # ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <p> # Searching for Solr?<br/> # You must type the correct path.<br/> # Solr will respond. # </p> ok 14 can delete collections in 9626ms ok 15 collection delete also deletes zk config in 7966ms ok 16 deletes accompanying zk config with nondefault name in 8201ms ok 17 deleteConfig option can opt to leave config in zk in 8291ms ok 18 SOLR-16755 test works with noprompt in 37866ms ok 19 Check export command in 29001ms ok 20 export fails on non cloud mode in 17074ms ok 21 using curl to extract a single pdf file in 24121ms ok 22 using the bin/solr post tool to extract content from pdf in 24581ms ok 23 using the bin/solr post tool to crawl web site in 27130ms ok 24 healthcheck on cloud solr in 36041ms ok 25 start help flag prints help in 150ms ok 26 stop help flag prints help in 144ms ok 27 restart help flag prints help in 149ms ok 28 status help flag prints help in 47ms # skip Currently the status -help flag doesn't return nice help text! ok 29 healthcheck help flag prints help in 143ms ok 30 create help flag prints help in 143ms ok 31 createcore help flag prints help in 145ms ok 32 createcollection help flag prints help in 145ms ok 33 delete help flag prints help in 143ms ok 34 version help flag prints help in 47ms # skip Currently the version -help flag doesn't return nice help text! ok 35 zk help flag prints help in 147ms ok 36 auth help flag prints help in 145ms ok 37 assert help flag prints help in 985ms ok 38 post help flag prints help in 980ms ok 39 SQL Module in 23801ms ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 26043ms ok 41 icu collation in analysis-extras module in 19208ms ok 42 package detects no running solr in 232ms ok 43 lifecycle of package in 16372ms ok 44 deploying and undeploying a collection level package in 20412ms ok 45 Affinity placement plugin using sysprop in 23758ms ok 46 Random placement plugin using ENV in 22576ms ok 47 Check help command in 2864ms ok 48 basic post with a type specified in 5949ms ok 49 basic post WITHOUT a type specified in 12932ms ok 50 crawling a directory in 4611ms ok 51 crawling a web site in 5292ms ok 52 commit and optimize and delete in 4003ms ok 53 args mode in 6587ms ok 54 stdin mode in 3448ms ok 55 post solr log into solr via script in 9529ms ok 56 post solr log into solr via cli in 7535ms ok 57 allowPaths - backup in 23183ms ok 58 start solr with ssl in 25100ms not ok 59 use different hostname when not checking peer-name in 26865ms # (from function `assert_output' in file /tmp/src/solr/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247, # in test file test/test_ssl.bats, line 116) # `assert_output --partial 'Server refused connection'' failed # NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33797. # # Started Solr server on port 33797 (pid=196291). Happy searching! # # INFO - 2023-09-27 17:48:52.981; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-09-27 17:48:52.987; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-09-27 17:48:53.340; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@758705fa(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@2a640157[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/59/ssl/solr-ssl.keystore.p12] # WARN - 2023-09-27 17:48:53.410; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@2a640157[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/59/ssl/solr-ssl.keystore.p12] # WARN - 2023-09-27 17:48:53.411; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@2a640157[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/59/ssl/solr-ssl.keystore.p12] # # -- output does not contain substring -- # substring (1 lines): # Server refused connection # output (5 lines): # INFO - 2023-09-27 17:49:02.579; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-09-27 17:49:02.585; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-09-27 17:49:02.968; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/59/ssl/solr-ssl.keystore.p12] # # ERROR: IOException occurred when talking to server at: https://localhost:33797/solr/test/select # -- # # Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2 # Last output: # INFO - 2023-09-27 17:49:04.475; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-09-27 17:49:04.481; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # WARN - 2023-09-27 17:49:05.387; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes # WARN - 2023-09-27 17:49:05.426; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes ok 60 start solr with ssl and auth in 22596ms ok 61 start solr with client truststore and security manager in 24921ms not ok 62 start solr with mTLS needed in 61527ms # (in test file test/test_ssl.bats, line 325) # `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed # /tmp/bats-run-VTfCc6/test/62/ssl # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33797. # # Started Solr server on port 33797 (pid=201172). Happy searching! # # NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33798. # # Started Solr server on port 33798 (pid=201599). Happy searching! # # INFO - 2023-09-27 17:50:28.248; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-09-27 17:50:28.253; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-09-27 17:50:28.644; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-27 17:50:28.648; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-27 17:50:28.648; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-09-27 17:50:28.684 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "71 48 A8 80", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-27 17:50:04.000 UTC", # "not after" : "2023-12-26 17:50:04.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: B8 05 59 F9 36 CF CE BA FD 62 92 77 79 52 C2 DE ..Y.6....b.wyR.. # 0010: C0 41 B0 38 .A.8 # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: C4 E7 E5 B6 08 59 7C 00 9B DA A1 25 89 0A 93 78 .....Y.....%...x # 0010: 6B 08 B4 53 k..S # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "12 6E 57 A6", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-27 17:49:58.000 UTC", # "not after" : "2023-12-26 17:49:58.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 10 E9 DF C4 34 6E EA DD 9B 9E A8 A0 F4 D2 B3 DE ....4n.......... # 0010: 65 29 FE A3 e).. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: B8 05 59 F9 36 CF CE BA FD 62 92 77 79 52 C2 DE ..Y.6....b.wyR.. # 0010: C0 41 B0 38 .A.8 # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-27 17:50:28.689 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "6C 1B 8E CA", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-27 17:49:56.000 UTC", # "not after" : "2023-12-26 17:49:56.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 10 E9 DF C4 34 6E EA DD 9B 9E A8 A0 F4 D2 B3 DE ....4n.......... # 0010: 65 29 FE A3 e).. # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "12 6E 57 A6", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-27 17:49:58.000 UTC", # "not after" : "2023-12-26 17:49:58.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 10 E9 DF C4 34 6E EA DD 9B 9E A8 A0 F4 D2 B3 DE ....4n.......... # 0010: 65 29 FE A3 e).. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: B8 05 59 F9 36 CF CE BA FD 62 92 77 79 52 C2 DE ..Y.6....b.wyR.. # 0010: C0 41 B0 38 .A.8 # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-27 17:50:28.706 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:50:29.042 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:50:29.043 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:50:29.043 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:50:29.043 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 17:50:29.192 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:29.193 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 17:50:29.195 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 17:50:29.195 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:29.201 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:29.213 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:29.213 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:29.213 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:29.216 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "13 7E 15 02 4A 21 4C 4F 55 B7 D9 36 69 12 EC BD E5 F0 B4 B8 F1 31 B9 44 B9 E5 20 5B CB 92 F1 9D", # "session id" : "BF FE 13 80 36 BC 27 1F 02 10 42 AE E1 6E 62 F0 22 80 07 0B 34 CE 3F D2 41 CA D3 AD 9F F4 A2 47", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: B8 75 86 27 DC 60 0F 85 B6 CB 4D 79 F7 DD E5 9B .u.'.`....My.... # 0010: 90 74 54 11 AD 8E 35 0F AA 6F 8C C1 89 E0 F5 5E .tT...5..o.....^ # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.333 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "DF DA 23 B7 C0 E2 10 37 5E 58 1E C8 B1 4C B9 4A B0 21 01 8A 82 62 C5 D1 93 D5 EF 83 A2 F8 59 B2", # "session id" : "BF FE 13 80 36 BC 27 1F 02 10 42 AE E1 6E 62 F0 22 80 07 0B 34 CE 3F D2 41 CA D3 AD 9F F4 A2 47", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: 68 AB 9A E9 A5 E8 FA 5C D7 A7 12 69 7E 2E EF 7B h......\...i.... # 0010: 16 B6 93 29 A4 E7 76 E1 EC 17 E0 CB 64 04 A8 23 ...)..v.....d..# # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.333 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.334 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.335 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.335 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.335 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.335 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.335 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.336 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.336 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.336 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.338 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.338 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.338 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.339 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.339 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.339 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.339 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.339 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.340 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.340 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:29.340 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:29.340 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.340 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.340 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.348 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.350 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.351 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.355 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.355 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.355 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.356 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.356 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.356 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.356 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:29.356 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:29.357 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.358 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.359 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.359 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.360 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.361 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.362 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:29.362 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.365 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "27 36 5F 97", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-27 17:50:00.000 UTC", # "not after" : "2023-12-26 17:50:00.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: B8 05 59 F9 36 CF CE BA FD 62 92 77 79 52 C2 DE ..Y.6....b.wyR.. # 0010: C0 41 B0 38 .A.8 # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 23 74 71 93 76 A6 1B CB D1 6F 0A 49 3E 28 66 E1 #tq.v....o.I>(f. # 0010: 0D DA EA 1D .... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.366 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.454 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "12 6E 57 A6", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-27 17:49:58.000 UTC", # "not after" : "2023-12-26 17:49:58.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 10 E9 DF C4 34 6E EA DD 9B 9E A8 A0 F4 D2 B3 DE ....4n.......... # 0010: 65 29 FE A3 e).. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: B8 05 59 F9 36 CF CE BA FD 62 92 77 79 52 C2 DE ..Y.6....b.wyR.. # 0010: C0 41 B0 38 .A.8 # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.458 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 0A 2B 98 C0 CD CD C2 70 FC DC B2 4D 05 74 EE 8B .+.....p...M.t.. # 0010: 6E DF 97 36 FE D3 11 CC 76 9A 3F 7D 76 A1 50 AA n..6....v.?.v.P. # 0020: A5 C9 F4 EF 3F 93 FF AB 3E 13 0A 9A F4 7C D9 A7 ....?...>....... # 0030: E5 13 32 25 07 68 70 A9 D2 82 13 B1 E0 56 22 81 ..2%.hp......V". # 0040: 5E 62 08 78 B4 E2 37 68 CE 11 7E 89 07 75 73 FF ^b.x..7h.....us. # 0050: 52 3C DB 32 EB 0F 12 FE D3 FC E5 15 B0 85 81 BD R<.2............ # 0060: B4 F4 3D E2 2D 17 13 F5 57 59 74 46 00 3D 50 C1 ..=.-...WYtF.=P. # 0070: 5F 59 C7 46 A0 DD CE CB D1 BB F3 48 BA 39 86 2F _Y.F.......H.9./ # 0080: 55 F0 38 41 C9 15 71 4A 36 F2 16 9B D7 FD 12 4D U.8A..qJ6......M # 0090: ED C3 CA E9 83 3C EE 5B E5 55 D3 1F 29 1B 6A 5D .....<.[.U..).j] # 00A0: 5E 15 27 CF 13 8B 20 B8 AF 73 BA 4A C5 D9 71 E7 ^.'... ..s.J..q. # 00B0: 12 FA 93 5A 8D A4 ED 99 E8 4B CE AB 8A 6D A9 C4 ...Z.....K...m.. # 00C0: 98 63 B8 2A EA 03 79 53 AF F8 C8 91 E8 9C 8B 45 .c.*..yS.......E # 00D0: E7 62 F6 16 E0 C8 71 C8 40 7E AE 9B 73 3D 39 0B [email protected]=9. # 00E0: BA 66 42 65 12 2A 96 CE 51 7D 27 78 12 7D 18 C7 .fBe.*..Q.'x.... # 00F0: E5 7E 59 9A BA B8 54 0B 30 5D 5E 65 6F 56 4B 6A ..Y...T.0]^eoVKj # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.459 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: E0 0B 78 9A D7 75 FF 37 F3 31 38 AF 2E E3 4A 34 ..x..u.7.18...J4 # 0010: FB 81 1C B2 F1 52 D2 4C 7A 1F D9 6A 1A 59 C4 FB .....R.Lz..j.Y.. # 0020: 34 81 25 59 99 89 BB 89 EB CF 13 27 C0 69 72 14 4.%Y.......'.ir. # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.462 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 17:50:29.463 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:29.463 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 17:50:29.463 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:29.463 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 17:50:29.464 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:29.464 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.465 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.468 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "71 48 A8 80", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-27 17:50:04.000 UTC", # "not after" : "2023-12-26 17:50:04.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: B8 05 59 F9 36 CF CE BA FD 62 92 77 79 52 C2 DE ..Y.6....b.wyR.. # 0010: C0 41 B0 38 .A.8 # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: C4 E7 E5 B6 08 59 7C 00 9B DA A1 25 89 0A 93 78 .....Y.....%...x # 0010: 6B 08 B4 53 k..S # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "12 6E 57 A6", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-27 17:49:58.000 UTC", # "not after" : "2023-12-26 17:49:58.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 10 E9 DF C4 34 6E EA DD 9B 9E A8 A0 F4 D2 B3 DE ....4n.......... # 0010: 65 29 FE A3 e).. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: B8 05 59 F9 36 CF CE BA FD 62 92 77 79 52 C2 DE ..Y.6....b.wyR.. # 0010: C0 41 B0 38 .A.8 # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.495 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 1B 9D 9E 4A 9B EB D3 19 28 43 16 8D DB 7F 4A C5 ...J....(C....J. # 0010: 76 41 A7 CB FA 4D 71 CA 1D D7 F0 39 06 95 C8 A6 vA...Mq....9.... # 0020: E2 29 06 11 97 F6 C6 B9 DB E8 AB C2 54 14 BF B4 .)..........T... # 0030: 47 2F A3 C3 A7 C5 77 B3 26 04 C7 AA E2 4C 16 64 G/....w.&....L.d # 0040: 0D 19 EC 4D 72 2E 7D 5B 93 3F 07 71 30 E8 AF DB ...Mr..[.?.q0... # 0050: A6 0A 03 2E 7D 29 EF B5 0E 98 BF 08 CE 66 9B 57 .....).......f.W # 0060: AC 3A A0 09 21 E7 64 F6 05 1F 61 FD 69 72 1B 6E .:..!.d...a.ir.n # 0070: C9 C2 CD 26 26 D2 36 F4 8B 76 84 9C 00 68 CA C7 ...&&.6..v...h.. # 0080: 35 B3 F6 14 91 5F 6B F2 D8 47 3D C4 06 E5 D8 64 5...._k..G=....d # 0090: 9E 88 BF 96 D3 34 9D 5B 95 61 5D 52 BE 20 AA 70 .....4.[.a]R. .p # 00A0: AF 23 23 AD 01 16 95 34 FA B6 4C 8D 28 E9 B7 EF .##....4..L.(... # 00B0: C6 3D 8E 76 9B 2A CF D8 53 E9 34 FC 34 76 8E F1 .=.v.*..S.4.4v.. # 00C0: BF 2A 18 65 71 73 2D A6 C9 57 C2 87 06 00 CD 69 .*.eqs-..W.....i # 00D0: D7 53 5A 57 3D 66 4B 8E 95 20 ED 34 9C 2C C6 20 .SZW=fK.. .4.,. # 00E0: 3D 10 E1 45 3A 87 8A 2F D2 A0 2F E2 BB C3 86 53 =..E:../../....S # 00F0: 79 D8 C3 BD 59 1F 48 ED 3A CE DA B1 BD 50 06 2F y...Y.H.:....P./ # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.497 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: D2 A9 A7 68 27 67 E6 23 07 9A 71 B4 F3 B1 1A 04 ...h'g.#..q..... # 0010: B0 0D 48 EC 6B E5 42 34 57 92 1B F0 B1 4C 85 A4 ..H.k.B4W....L.. # 0020: 91 FD 4B F9 CD F5 40 8E 41 FE 6A 46 38 AA FC 85 [email protected]... # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.498 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.549 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "89 DA 83 76 EE 36 CC 12 E8 A7 CE 07 8D 16 44 52 FF 99 94 8A 00 99 02 74 AF 5D 10 E4 77 55 40 8A", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|ALL|01|main|2023-09-27 17:50:29.871 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-09-27 17:50:29.872 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # INFO - 2023-09-27 17:50:30.812; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-09-27 17:50:30.818; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-09-27 17:50:31.240; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-27 17:50:31.243; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-27 17:50:31.244; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-09-27 17:50:31.278 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "71 48 A8 80", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-27 17:50:04.000 UTC", # "not after" : "2023-12-26 17:50:04.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: B8 05 59 F9 36 CF CE BA FD 62 92 77 79 52 C2 DE ..Y.6....b.wyR.. # 0010: C0 41 B0 38 .A.8 # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: C4 E7 E5 B6 08 59 7C 00 9B DA A1 25 89 0A 93 78 .....Y.....%...x # 0010: 6B 08 B4 53 k..S # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "12 6E 57 A6", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-27 17:49:58.000 UTC", # "not after" : "2023-12-26 17:49:58.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 10 E9 DF C4 34 6E EA DD 9B 9E A8 A0 F4 D2 B3 DE ....4n.......... # 0010: 65 29 FE A3 e).. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: B8 05 59 F9 36 CF CE BA FD 62 92 77 79 52 C2 DE ..Y.6....b.wyR.. # 0010: C0 41 B0 38 .A.8 # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-27 17:50:31.283 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "6C 1B 8E CA", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-27 17:49:56.000 UTC", # "not after" : "2023-12-26 17:49:56.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 10 E9 DF C4 34 6E EA DD 9B 9E A8 A0 F4 D2 B3 DE ....4n.......... # 0010: 65 29 FE A3 e).. # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "12 6E 57 A6", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-27 17:49:58.000 UTC", # "not after" : "2023-12-26 17:49:58.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 10 E9 DF C4 34 6E EA DD 9B 9E A8 A0 F4 D2 B3 DE ....4n.......... # 0010: 65 29 FE A3 e).. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: B8 05 59 F9 36 CF CE BA FD 62 92 77 79 52 C2 DE ..Y.6....b.wyR.. # 0010: C0 41 B0 38 .A.8 # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-27 17:50:31.298 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:50:31.657 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:50:31.657 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:50:31.658 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:50:31.658 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 17:50:31.791 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:31.792 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 17:50:31.794 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 17:50:31.795 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:31.801 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:31.814 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:31.814 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:31.815 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:31.818 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "D9 AC 8E F7 47 6D 6E 8A 2A 07 DA 95 D2 9F 10 27 C4 F6 38 67 60 4B 32 D1 13 1D D1 77 2C A8 E5 CE", # "session id" : "7F 8B 1D F1 6C 6B 95 A9 C7 3C A0 05 6C 36 EF E9 57 DB DE A2 03 00 2D 49 F6 58 BB 0D 65 A1 D9 9C", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: 8F 2C C0 40 BC 74 2B CC E3 7E BC 79 B8 65 D6 55 .,[email protected]+....y.e.U # 0010: EE CF 4A 1A 07 05 AE 5F 08 A3 1A C6 C2 DF 33 2A ..J...._......3* # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.934 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "61 54 93 A6 59 57 54 35 E3 F3 7E 3C F7 BB CD C9 BB D9 13 05 7D 91 5B 1C 52 8E FF E1 3D D4 FE 97", # "session id" : "7F 8B 1D F1 6C 6B 95 A9 C7 3C A0 05 6C 36 EF E9 57 DB DE A2 03 00 2D 49 F6 58 BB 0D 65 A1 D9 9C", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: 90 89 A7 C5 48 7B 4E CF CA 0F D6 61 2E C7 F9 11 ....H.N....a.... # 0010: 54 DC D6 37 18 98 1B E2 E3 B5 39 1F BA 54 BC 7C T..7......9..T.. # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.935 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.935 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.936 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.936 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.936 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.936 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.937 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.937 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.937 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.937 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.939 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.939 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.939 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:31.941 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:31.941 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.949 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.951 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.952 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.956 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.956 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.956 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.956 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.957 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.957 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.957 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:31.957 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:31.957 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.959 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.959 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.960 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.960 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.961 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.962 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:31.962 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.966 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "27 36 5F 97", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-27 17:50:00.000 UTC", # "not after" : "2023-12-26 17:50:00.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: B8 05 59 F9 36 CF CE BA FD 62 92 77 79 52 C2 DE ..Y.6....b.wyR.. # 0010: C0 41 B0 38 .A.8 # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 23 74 71 93 76 A6 1B CB D1 6F 0A 49 3E 28 66 E1 #tq.v....o.I>(f. # 0010: 0D DA EA 1D .... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.966 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.049 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "12 6E 57 A6", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-27 17:49:58.000 UTC", # "not after" : "2023-12-26 17:49:58.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 10 E9 DF C4 34 6E EA DD 9B 9E A8 A0 F4 D2 B3 DE ....4n.......... # 0010: 65 29 FE A3 e).. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: B8 05 59 F9 36 CF CE BA FD 62 92 77 79 52 C2 DE ..Y.6....b.wyR.. # 0010: C0 41 B0 38 .A.8 # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.053 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 67 10 7B 5B C0 30 36 BB C2 98 D0 9A D2 8D 07 12 g..[.06......... # 0010: 0E 3D 5A D8 01 FB 18 AB 08 43 8F D3 7E 10 8C 52 .=Z......C.....R # 0020: 68 D4 2D C3 35 1D C9 7B 34 1B 5E AC 0B 41 4B 1E h.-.5...4.^..AK. # 0030: B1 4F 3A 3F 52 E6 26 D2 1B 18 E2 8C D3 A2 33 D1 .O:?R.&.......3. # 0040: F5 E6 AA AF 71 49 85 83 5C 70 FB EF 28 06 F3 F5 ....qI..\p..(... # 0050: 50 DA E5 34 3A AB 8C 55 3D 49 F1 53 F5 1C 1A E2 P..4:..U=I.S.... # 0060: 75 21 20 97 CF BB 59 2A BB EA 0A 35 4E D0 7E 6A u! ...Y*...5N..j # 0070: 38 EB 3B AA C4 D6 C2 F8 09 E5 24 6F EE 51 B0 68 8.;.......$o.Q.h # 0080: BF A9 BA 7B 22 7F B9 E0 EC 82 2F 2C 9A A0 28 1B ...."...../,..(. # 0090: DF 02 D6 15 F4 6C D2 93 63 B8 8B C5 FB A4 16 E3 .....l..c....... # 00A0: DA 54 CD DE FE 2F AD 6F BD 65 B5 6F D8 D3 A7 E1 .T.../.o.e.o.... # 00B0: B6 CA 71 17 EC 8D 93 19 A9 76 1A D6 99 C4 4B AC ..q......v....K. # 00C0: 43 5A 6E C2 47 4B 8D 33 F3 09 EC AA A5 20 14 48 CZn.GK.3..... .H # 00D0: B1 40 8D 83 4F 07 8B 97 37 2C 0E 45 5B AB E7 B6 [email protected],.E[... # 00E0: AE C4 EC 2D 5C 6B 1E 81 CF C7 A5 10 20 ED 00 02 ...-\k...... ... # 00F0: 0F BC 8C A2 37 CE 9E CE 70 75 22 7E 4A 07 AB 65 ....7...pu".J..e # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.055 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: B1 C8 5D 11 31 2C E9 85 66 F5 08 55 E3 79 C5 E7 ..].1,..f..U.y.. # 0010: 5F 89 AB 6E E8 E2 D6 06 75 8A E2 73 11 3E EB B0 _..n....u..s.>.. # 0020: B1 EC D1 64 19 2A C7 E8 33 76 FD 62 A4 10 0F 6C ...d.*..3v.b...l # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.057 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 17:50:32.058 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:32.058 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 17:50:32.059 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:32.059 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 17:50:32.059 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:32.059 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.060 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.062 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "71 48 A8 80", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-27 17:50:04.000 UTC", # "not after" : "2023-12-26 17:50:04.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: B8 05 59 F9 36 CF CE BA FD 62 92 77 79 52 C2 DE ..Y.6....b.wyR.. # 0010: C0 41 B0 38 .A.8 # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: C4 E7 E5 B6 08 59 7C 00 9B DA A1 25 89 0A 93 78 .....Y.....%...x # 0010: 6B 08 B4 53 k..S # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "12 6E 57 A6", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-27 17:49:58.000 UTC", # "not after" : "2023-12-26 17:49:58.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 10 E9 DF C4 34 6E EA DD 9B 9E A8 A0 F4 D2 B3 DE ....4n.......... # 0010: 65 29 FE A3 e).. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: B8 05 59 F9 36 CF CE BA FD 62 92 77 79 52 C2 DE ..Y.6....b.wyR.. # 0010: C0 41 B0 38 .A.8 # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.089 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 04 DC E7 06 24 87 46 06 3F 9C D3 A7 B2 D8 DD 03 ....$.F.?....... # 0010: 40 66 28 10 10 99 C1 57 B3 54 70 81 B5 CE 69 F3 @f(....W.Tp...i. # 0020: B1 87 88 E3 EC 82 91 9B 60 D5 B4 34 4F D1 84 13 ........`..4O... # 0030: 87 BA 91 4C BA 9F F4 78 20 0D E0 88 16 65 B0 00 ...L...x ....e.. # 0040: 09 60 4F 25 E4 BE 5D 94 2D 66 87 E0 66 48 47 A8 .`O%..].-f..fHG. # 0050: 00 F1 91 09 DA CC A1 CF 1C FB F9 EA 73 B1 0E 87 ............s... # 0060: 93 13 F4 CB CC 69 62 E7 23 00 14 DB AA 57 16 DD .....ib.#....W.. # 0070: 15 15 37 35 54 19 96 40 52 59 0A B0 79 D4 81 DA [email protected]... # 0080: 14 48 A4 8F CD CA DB 01 40 54 27 C6 FD 8D C6 20 .H......@T'.... # 0090: 7C A8 21 3A F6 81 16 AB 16 9D 31 C9 6F 47 E3 98 ..!:......1.oG.. # 00A0: 02 2D 47 97 68 99 16 40 78 83 A8 E2 7E 55 B6 D6 [email protected].. # 00B0: F4 AF 20 9A F5 C8 53 64 2E 5A 99 97 77 AC D3 0A .. ...Sd.Z..w... # 00C0: 98 09 D4 77 D2 FF B6 69 F6 01 75 CC 81 21 2A 72 ...w...i..u..!*r # 00D0: 66 5A 3D 81 7E F4 F6 BB D8 F6 03 2D D4 9C 22 20 fZ=........-.." # 00E0: 56 82 74 FA 06 C8 6F BC 87 D3 B8 98 76 9E 59 51 V.t...o.....v.YQ # 00F0: BF 4D 3B 2C DD 13 6A B3 85 2F FE 31 C8 B8 CE A4 .M;,..j../.1.... # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.090 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: 47 D5 CB 69 82 D0 93 F1 1C 82 27 20 63 9A 19 99 G..i......' c... # 0010: CD 91 84 A1 A4 FE 31 69 DA 6B 99 F1 52 17 23 3E ......1i.k..R.#> # 0020: D3 22 B2 3C A4 A0 34 41 3D 36 0F 72 95 58 AD 9E .".<..4A=6.r.X.. # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.091 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.148 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "F4 C3 4E BA 1A B3 C8 C4 C6 11 B9 58 B1 B4 70 FB 19 62 58 E8 76 AE 0D D1 3D 1E D9 19 CA 55 E1 6D", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|ALL|01|main|2023-09-27 17:50:32.419 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-09-27 17:50:32.421 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # # -- output does not contain substring -- # substring (1 lines): # Server refused connection # output (491 lines): # INFO - 2023-09-27 17:50:43.697; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # javax.net.ssl|DEBUG|01|main|2023-09-27 17:50:44.022 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "6C 1B 8E CA", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, [...truncated too long message...] dEndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more} # # ) # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:52:07.378 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:52:07.420 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:52:07.421 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:52:07.421 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:52:07.421 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:33798/solr/admin/info/system # at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550) # at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192) # at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582) # at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481) # at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438) # at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158) # at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153) # Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) # at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) # at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061) # at java.base/java.security.AccessController.doPrivileged(Native Method) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657) # at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84) # at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Suppressed: java.io.IOException: Broken pipe # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138) # at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254) # at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386) # at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292) # at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243) # at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224) # at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821) # at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793) # at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161) # at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451) # at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87) # ... 11 more # Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) # at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) # at java.base/sun.security.validator.Validator.validate(Validator.java:264) # at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335) # ... 22 more # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more ok 64 SOLR-11740 check 'solr stop' connection in 28081ms ok 65 stop command for single port in 30725ms ok 66 status detects locally running solr in 14352ms ok 67 status does not expose cli parameters to end user in 214ms ok 68 listing out files in 2161ms ok 69 copying files around in 6505ms ok 70 upconfig in 2595ms ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1225ms ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1230ms ok 73 Cleanup in 1227ms > Task :solr:packaging:integrationTests FAILED FAILURE: Build failed with an exception. * Where: Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301 * What went wrong: Execution failed for task ':solr:packaging:integrationTests'. > Process 'command > '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished > with non-zero exit value 1 * Try: > Run with --stacktrace option to get the stack trace. > Run with --info or --debug option to get more log output. > Run with --scan to get full insights. * Get more help at https://help.gradle.org BUILD FAILED in 26m 32s 673 actionable tasks: 656 executed, 17 up-to-date [0m[?12l[?25h ------------------------------------------------------------------------ Build Failed: returned 1 Total time: 26m58s ------------------------------------------------------------------------ + status=1 + ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*' Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2) rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3] rsync: [Receiver] write error: Broken pipe (32) + exit 1 Build step 'Execute shell' marked build as failure Archiving artifacts Recording test results [Checks API] No suitable checks publisher found. Email was triggered for: Failure - Any Sending email for trigger: Failure - Any
--------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
