Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5592/
1 tests failed.
FAILED: org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod
Error Message:
com.carrotsearch.randomizedtesting.ThreadLeakError: 1 thread leaked from SUITE
scope at org.apache.solr.cloud.TestLeaderElectionZkExpiry:
1) Thread[id=302, name=zkConnectionManagerCallback-170-thread-1-EventThread,
state=BLOCKED, group=TGRP-TestLeaderElectionZkExpiry]
at
app//org.apache.solr.common.cloud.ZkStateReader.createClusterStateWatchersAndUpdate(ZkStateReader.java:558)
at
app//org.apache.solr.cloud.ZkController.onReconnect(ZkController.java:435)
at
app//org.apache.solr.cloud.ZkController.lambda$new$0(ZkController.java:381)
at
app//org.apache.solr.cloud.ZkController$$Lambda$503/0x000000084039f040.command(Unknown
Source)
at
app//org.apache.solr.common.cloud.ConnectionManager$1.update(ConnectionManager.java:199)
at
app//org.apache.solr.common.cloud.DefaultConnectionStrategy.reconnect(DefaultConnectionStrategy.java:59)
at
app//org.apache.solr.common.cloud.ConnectionManager.process(ConnectionManager.java:179)
at
app//org.apache.zookeeper.ClientCnxn$EventThread.processEvent(ClientCnxn.java:563)
at
app//org.apache.zookeeper.ClientCnxn$EventThread.run(ClientCnxn.java:538)
Stack Trace:
com.carrotsearch.randomizedtesting.ThreadLeakError: 1 thread leaked from SUITE
scope at org.apache.solr.cloud.TestLeaderElectionZkExpiry:
1) Thread[id=302, name=zkConnectionManagerCallback-170-thread-1-EventThread,
state=BLOCKED, group=TGRP-TestLeaderElectionZkExpiry]
at
app//org.apache.solr.common.cloud.ZkStateReader.createClusterStateWatchersAndUpdate(ZkStateReader.java:558)
at
app//org.apache.solr.cloud.ZkController.onReconnect(ZkController.java:435)
at
app//org.apache.solr.cloud.ZkController.lambda$new$0(ZkController.java:381)
at
app//org.apache.solr.cloud.ZkController$$Lambda$503/0x000000084039f040.command(Unknown
Source)
at
app//org.apache.solr.common.cloud.ConnectionManager$1.update(ConnectionManager.java:199)
at
app//org.apache.solr.common.cloud.DefaultConnectionStrategy.reconnect(DefaultConnectionStrategy.java:59)
at
app//org.apache.solr.common.cloud.ConnectionManager.process(ConnectionManager.java:179)
at
app//org.apache.zookeeper.ClientCnxn$EventThread.processEvent(ClientCnxn.java:563)
at
app//org.apache.zookeeper.ClientCnxn$EventThread.run(ClientCnxn.java:538)
at __randomizedtesting.SeedInfo.seed([77B27CFAA45B8786]:0)
Build Log:
[...truncated 2285 lines...]
# ERROR: IOException occurred when talking to server at:
https://localhost:39531/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at:
/tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO - 2023-10-02 11:38:17.466;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-10-02 11:38:17.472;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# WARN - 2023-10-02 11:38:18.381; org.apache.solr.common.cloud.SolrZkClient;
Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it
creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to
Zookeeper nodes
# WARN - 2023-10-02 11:38:18.421; org.apache.solr.common.cloud.SolrZkClient;
Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates
'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23364ms
ok 61 start solr with client truststore and security manager in 25533ms
not ok 62 start solr with mTLS needed in 59604ms
# (in test file test/test_ssl.bats, line 325)
# `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-fkSFXG/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406:
bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is
listening on port 39531.
#
# Started Solr server on port 39531 (pid=201874). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406:
bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is
listening on port 39532.
#
# Started Solr server on port 39532 (pid=202333). Happy searching!
#
# INFO - 2023-10-02 11:39:42.482;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-10-02 11:39:42.488;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# INFO - 2023-10-02 11:39:42.886;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for
Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-10-02 11:39:42.889;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for
Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-10-02 11:39:42.890;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for
Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 11:39:42.922
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
# "certificate" : {
# "version" : "v3",
# "serial number" : "4D 67 81 F6",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:18.000 UTC",
# "not after" : "2023-12-31 11:39:18.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 45 72 CD EA 2C 3E 62 0F 52 15 95 39 21 EC 9E 34
Er..,>b.R..9!..4
# 0010: 67 3E D5 AB g>..
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: D8 0C 6A C4 70 62 90 32 99 8D 4C 38 8D C6 64 4F
..j.pb.2..L8..dO
# 0010: 8D 81 61 0E ..a.
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "60 DA 4B 43",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:12.000 UTC",
# "not after" : "2023-12-31 11:39:12.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: C6 D7 FE 11 43 65 D0 5D 97 86 8D FE 8C 71 72 FB
....Ce.].....qr.
# 0010: D1 9C 07 CC ....
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 45 72 CD EA 2C 3E 62 0F 52 15 95 39 21 EC 9E 34
Er..,>b.R..9!..4
# 0010: 67 3E D5 AB g>..
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 11:39:42.927
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "74 FB 56 D9",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:10.000 UTC",
# "not after" : "2023-12-31 11:39:10.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: C6 D7 FE 11 43 65 D0 5D 97 86 8D FE 8C 71 72 FB
....Ce.].....qr.
# 0010: D1 9C 07 CC ....
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "60 DA 4B 43",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:12.000 UTC",
# "not after" : "2023-12-31 11:39:12.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: C6 D7 FE 11 43 65 D0 5D 97 86 8D FE 8C 71 72 FB
....Ce.].....qr.
# 0010: D1 9C 07 CC ....
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 45 72 CD EA 2C 3E 62 0F 52 15 95 39 21 EC 9E 34
Er..,>b.R..9!..4
# 0010: 67 3E D5 AB g>..
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 11:39:42.942
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:43.246
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:43.247
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:43.248
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:43.248
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:43.422
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:43.423
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:43.425
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:43.425
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:43.431
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:43.442
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:43.443
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:43.443
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:43.445
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "DF AE DD 05 B1 8D 63 7B EA 21 2A BF 4A C4 70 F5 FA
89 16 98 C2 97 59 0D D5 53 47 9A 5F 2A 56 BE",
# "session id" : "2E A1 B9 B8 D9 9D 2F C2 9D 5D C7 48 47 C2 05 49 66
D9 04 89 F2 68 79 93 24 D8 4A 15 26 66 5D 35",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A),
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025),
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029),
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
# "compression methods" : "00",
# "extensions" : [
# "status_request (5)": {
# "certificate status type": ocsp
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# },
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "ec_point_formats (11)": {
# "formats": [uncompressed]
# },
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# },
# "status_request_v2 (17)": {
# "cert status request": {
# "certificate status type": ocsp_multi
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# }
# },
# "extended_master_secret (23)": {
# <empty>
# },
# "supported_versions (43)": {
# "versions": [TLSv1.3, TLSv1.2]
# },
# "psk_key_exchange_modes (45)": {
# "ke_modes": [psk_dhe_ke]
# },
# "key_share (51)": {
# "client_shares": [
# {
# "named group": x25519
# "key_exchange": {
# 0000: 5D 00 71 76 A2 3D 0E BC CC D2 50 72 C9 8F 93 14
].qv.=....Pr....
# 0010: 72 5E FC A3 9D 64 4F 14 3C 14 DA 03 BC FD 57 09
r^...dO.<.....W.
# }
# },
# ]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.567
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
# "server version" : "TLSv1.2",
# "random" : "D5 50 86 B7 E6 78 4C C1 1E E9 25 03 9D E7 08 99 87
E3 90 91 52 8C 30 59 E8 AA 05 E0 EB 03 17 73",
# "session id" : "2E A1 B9 B8 D9 9D 2F C2 9D 5D C7 48 47 C2 05 49 66
D9 04 89 F2 68 79 93 24 D8 4A 15 26 66 5D 35",
# "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)",
# "compression methods" : "00",
# "extensions" : [
# "supported_versions (43)": {
# "selected version": [TLSv1.3]
# },
# "key_share (51)": {
# "server_share": {
# "named group": x25519
# "key_exchange": {
# 0000: 98 10 8F 2F 9D D8 03 59 05 87 43 34 96 AB B6 77
.../...Y..C4...w
# 0010: C5 A9 87 1B 1D C5 46 A0 BD 24 EF 22 54 39 3E 59
......F..$."T9>Y
# }
# },
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.567
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.567
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.568
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.569
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.569
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.569
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.569
UTC|SSLExtensions.java:163|Ignore unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.569
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.570
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.570
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.572
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.572
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.572
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.572
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.572
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.573
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.573
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.573
UTC|SSLExtensions.java:207|Ignore unavailable extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.573
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.573
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:43.573
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:43.574
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.574
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.574
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.582
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.583
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.584
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.588
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake
message (
# "EncryptedExtensions": [
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.588
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.589
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.589
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.589
UTC|SSLExtensions.java:192|Consumed extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.589
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.589
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:43.590
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:43.590
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.591
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
# "certificate_request_context": "",
# "extensions": [
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "certificate_authorities (47)": {
# "certificate authorities": [
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.592
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.592
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.593
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.594
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.595
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:43.595
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.599
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message
(
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "01 78 64 F5",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:14.000 UTC",
# "not after" : "2023-12-31 11:39:14.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 45 72 CD EA 2C 3E 62 0F 52 15 95 39 21 EC 9E 34
Er..,>b.R..9!..4
# 0010: 67 3E D5 AB g>..
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# serverAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: E2 47 3C 22 CD 38 D0 43 23 05 73 77 70 C0 A2 59
.G<".8.C#.swp..Y
# 0010: D0 98 0B 85 ....
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.599
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.682
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
# "certificate" : {
# "version" : "v3",
# "serial number" : "60 DA 4B 43",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:12.000 UTC",
# "not after" : "2023-12-31 11:39:12.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: C6 D7 FE 11 43 65 D0 5D 97 86 8D FE 8C 71 72 FB
....Ce.].....qr.
# 0010: D1 9C 07 CC ....
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 45 72 CD EA 2C 3E 62 0F 52 15 95 39 21 EC 9E 34
Er..,>b.R..9!..4
# 0010: 67 3E D5 AB g>..
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.686
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 09 77 22 D2 68 E4 F8 B4 64 1B E9 20 1A 6B ED 2E .w".h...d.. .k..
# 0010: A1 61 D6 60 9B 75 00 B0 EB FB 14 49 B6 71 70 06 .a.`.u.....I.qp.
# 0020: 8A EC 36 7D 11 82 F7 8D 6B 0C 12 AA 21 81 9D F0 ..6.....k...!...
# 0030: 9F 03 5F 99 39 F8 8D BA C2 A6 B3 15 4A DE D2 AE .._.9.......J...
# 0040: 23 42 39 97 0D 96 FE C9 D3 92 35 73 A6 49 B9 5B #B9.......5s.I.[
# 0050: 41 94 EE 38 90 23 64 72 9F 48 5D 0E 1A 10 83 FA A..8.#dr.H].....
# 0060: 6C E1 C9 83 F7 87 79 C5 E7 61 F7 A7 47 3D 4B BE l.....y..a..G=K.
# 0070: 18 AE 00 B1 D3 98 C9 EB 6F DF 41 1B A7 12 D1 85 ........o.A.....
# 0080: 74 1C CC A0 61 DF 43 ED 1D 8C 68 AF EC A7 6B 4F t...a.C...h...kO
# 0090: 2E E3 E4 BC 1B 11 8B 66 91 29 C3 C9 E0 A6 8E D9 .......f.)......
# 00A0: 92 32 F8 99 0B 82 97 A4 1D FD D8 3B DB A5 08 78 .2.........;...x
# 00B0: CA 50 97 EC A5 15 73 93 5E 87 30 AE 73 F5 79 7A .P....s.^.0.s.yz
# 00C0: 5D 31 3B CB 45 CC D0 63 C8 D3 13 37 4A 12 FA F6 ]1;.E..c...7J...
# 00D0: 6C 8D 52 3B F3 80 9F 10 FA 1B 1E F1 7C E5 EB 9C l.R;............
# 00E0: 15 D5 26 F0 23 A7 9A 12 7F EE D6 C2 44 CA DA D6 ..&.#.......D...
# 00F0: 4F 73 15 B8 90 D8 CA 5A 6D 9C A2 B8 E5 DF 04 58 Os.....Zm......X
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.688
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: C9 33 C6 FC 01 9E 96 76 50 63 E0 74 C2 9A CB 40 .3.....vPc.t...@
# 0010: 00 32 CC 93 DB C3 7A D4 C4 D5 A2 E7 B4 9A 3E 56 .2....z.......>V
# 0020: 1C 55 64 EB A7 42 73 87 F5 B8 E6 F5 52 12 DB 20 .Ud..Bs.....R..
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.691
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 11:39:43.692
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:43.692
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 11:39:43.692
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:43.692
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 11:39:43.693
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:43.693
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.693
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.697
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "4D 67 81 F6",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:18.000 UTC",
# "not after" : "2023-12-31 11:39:18.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational
Unit, O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 45 72 CD EA 2C 3E 62 0F 52 15 95 39 21 EC 9E 34
Er..,>b.R..9!..4
# 0010: 67 3E D5 AB g>..
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: D8 0C 6A C4 70 62 90 32 99 8D 4C 38 8D C6 64 4F
..j.pb.2..L8..dO
# 0010: 8D 81 61 0E ..a.
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "60 DA 4B 43",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:12.000 UTC",
# "not after" : "2023-12-31 11:39:12.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: C6 D7 FE 11 43 65 D0 5D 97 86 8D FE 8C 71 72 FB
....Ce.].....qr.
# 0010: D1 9C 07 CC ....
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 45 72 CD EA 2C 3E 62 0F 52 15 95 39 21 EC 9E 34
Er..,>b.R..9!..4
# 0010: 67 3E D5 AB g>..
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.723
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake
message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 76 C4 99 63 1E 1E F5 39 AC A2 18 7A A8 36 68 C5 v..c...9...z.6h.
# 0010: BD A8 A4 AF 39 3F 6D 13 73 30 A5 B6 EC 8D AA 9B ....9?m.s0......
# 0020: 1E 3F BA BD 62 68 F6 F3 36 46 4F 78 70 7D 64 7F .?..bh..6FOxp.d.
# 0030: 12 54 A3 7A ED B0 24 39 FE A6 2F DF D3 51 F3 2C .T.z..$9../..Q.,
# 0040: ED 77 A3 D5 50 B6 F1 08 31 3D FD 20 32 E1 47 A2 .w..P...1=. 2.G.
# 0050: DE 24 68 4E 8F 53 2E F2 D8 34 24 0B 4E FC D4 6B .$hN.S...4$.N..k
# 0060: EC 54 76 24 38 E6 51 C5 EA FC 52 25 FD 64 19 94 .Tv$8.Q...R%.d..
# 0070: 1D B1 11 F4 38 56 72 57 E3 FB 3B C3 7B D6 E3 EF ....8VrW..;.....
# 0080: 37 D1 B8 02 AF 48 B8 CB 53 7B 3C 09 A9 A8 9F DC 7....H..S.<.....
# 0090: BD 97 41 83 AC B0 D2 BB A0 31 3E 30 87 65 81 B2 ..A......1>0.e..
# 00A0: A3 38 C9 05 26 4A 7F 64 AE 2E 0F B5 6F 55 54 F1 .8..&J.d....oUT.
# 00B0: 0C C3 57 04 1B E4 80 A3 EA 40 A4 02 E4 8D 62 E4 [email protected].
# 00C0: 2D 73 56 E2 22 BF 20 47 55 B4 D1 85 E2 D1 F5 3E -sV.". GU......>
# 00D0: 8A 7D 07 5A 35 EE A8 AA CC 53 EE 1A FE A3 48 23 ...Z5....S....H#
# 00E0: 9E 82 0B 6E B9 54 CF 5A DA 4A 0F F5 42 02 B6 0D ...n.T.Z.J..B...
# 00F0: 22 33 79 46 77 D2 B5 65 80 5A 81 27 29 3C 45 53 "3yFw..e.Z.')<ES
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.725
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: CE 76 CF A6 4B 56 6B 74 5F 44 EC 31 C1 27 B9 5D .v..KVkt_D.1.'.]
# 0010: B0 81 4A DB D4 E7 CD E1 E0 C8 85 88 87 C1 34 3E ..J...........4>
# 0020: 47 D9 45 BE 2C A4 B7 2C FE EC CD 49 55 30 95 B7 G.E.,..,...IU0..
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.725
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.777
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
# "ticket_lifetime" : "86,400",
# "ticket_age_add" : "<omitted>",
# "ticket_nonce" : "01",
# "ticket" : "31 28 0C 45 0D 8E 39 66 BE 45 F1 01 D9 F7 83 12
E6 C0 AB 40 34 52 C4 7D DD DF 18 39 D5 F2 7A 5C",
# "extensions" : [
# <no extension>
# ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 11:39:44.070
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 11:39:44.074
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound
application data
# INFO - 2023-10-02 11:39:45.040;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-10-02 11:39:45.046;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# INFO - 2023-10-02 11:39:45.415;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for
Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-10-02 11:39:45.418;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for
Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-10-02 11:39:45.418;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for
Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 11:39:45.450
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
# "certificate" : {
# "version" : "v3",
# "serial number" : "4D 67 81 F6",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:18.000 UTC",
# "not after" : "2023-12-31 11:39:18.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 45 72 CD EA 2C 3E 62 0F 52 15 95 39 21 EC 9E 34
Er..,>b.R..9!..4
# 0010: 67 3E D5 AB g>..
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: D8 0C 6A C4 70 62 90 32 99 8D 4C 38 8D C6 64 4F
..j.pb.2..L8..dO
# 0010: 8D 81 61 0E ..a.
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "60 DA 4B 43",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:12.000 UTC",
# "not after" : "2023-12-31 11:39:12.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: C6 D7 FE 11 43 65 D0 5D 97 86 8D FE 8C 71 72 FB
....Ce.].....qr.
# 0010: D1 9C 07 CC ....
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 45 72 CD EA 2C 3E 62 0F 52 15 95 39 21 EC 9E 34
Er..,>b.R..9!..4
# 0010: 67 3E D5 AB g>..
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 11:39:45.454
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "74 FB 56 D9",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:10.000 UTC",
# "not after" : "2023-12-31 11:39:10.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: C6 D7 FE 11 43 65 D0 5D 97 86 8D FE 8C 71 72 FB
....Ce.].....qr.
# 0010: D1 9C 07 CC ....
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "60 DA 4B 43",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:12.000 UTC",
# "not after" : "2023-12-31 11:39:12.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: C6 D7 FE 11 43 65 D0 5D 97 86 8D FE 8C 71 72 FB
....Ce.].....qr.
# 0010: D1 9C 07 CC ....
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 45 72 CD EA 2C 3E 62 0F 52 15 95 39 21 EC 9E 34
Er..,>b.R..9!..4
# 0010: 67 3E D5 AB g>..
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 11:39:45.469
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:45.532
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:45.541
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:45.541
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:45.542
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:45.703
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:45.703
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:45.705
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:45.706
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:45.711
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:45.722
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:45.723
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:45.723
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:45.725
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "31 81 BD 59 5C 54 9E 5F 9A C1 49 4F 2B 04 A2 D6 49
D9 2D 27 4C FD 5A A7 37 AF 0C CA 44 6A 85 59",
# "session id" : "5C 02 1F C3 3D 76 51 8E BB 44 41 10 C7 C4 E9 0A A8
B0 F2 35 EE 04 AC 4A 6D 4D 3E 10 CE 14 BD BA",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A),
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025),
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029),
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
# "compression methods" : "00",
# "extensions" : [
# "status_request (5)": {
# "certificate status type": ocsp
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# },
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "ec_point_formats (11)": {
# "formats": [uncompressed]
# },
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# },
# "status_request_v2 (17)": {
# "cert status request": {
# "certificate status type": ocsp_multi
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# }
# },
# "extended_master_secret (23)": {
# <empty>
# },
# "supported_versions (43)": {
# "versions": [TLSv1.3, TLSv1.2]
# },
# "psk_key_exchange_modes (45)": {
# "ke_modes": [psk_dhe_ke]
# },
# "key_share (51)": {
# "client_shares": [
# {
# "named group": x25519
# "key_exchange": {
# 0000: A1 17 7E D4 65 A9 B3 0F 27 05 72 AB 12 9C 2A 53
....e...'.r...*S
# 0010: 9F 16 66 A6 5F 30 09 33 D2 B9 47 8F AC 4C 71 1B
..f._0.3..G..Lq.
# }
# },
# ]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.845
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
# "server version" : "TLSv1.2",
# "random" : "35 04 36 DA 6E 09 6B F1 9E 44 7B 40 43 4F 04 03 E2
AC 19 B3 0C A5 30 97 8E 23 93 3B 1A 71 89 D2",
# "session id" : "5C 02 1F C3 3D 76 51 8E BB 44 41 10 C7 C4 E9 0A A8
B0 F2 35 EE 04 AC 4A 6D 4D 3E 10 CE 14 BD BA",
# "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)",
# "compression methods" : "00",
# "extensions" : [
# "supported_versions (43)": {
# "selected version": [TLSv1.3]
# },
# "key_share (51)": {
# "server_share": {
# "named group": x25519
# "key_exchange": {
# 0000: A9 AA 01 31 56 5A B0 28 40 43 A6 40 6A C2 8D 62
...1VZ.(@[email protected]
# 0010: 2E BD 5A 08 CF 81 E2 55 E7 52 BD B0 41 0E 6C 0A
..Z....U.R..A.l.
# }
# },
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.846
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.846
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.847
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.847
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.847
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.847
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.848
UTC|SSLExtensions.java:163|Ignore unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.848
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.848
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.848
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.850
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.850
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.850
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.851
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.851
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.851
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.851
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.851
UTC|SSLExtensions.java:207|Ignore unavailable extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.851
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.851
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:45.852
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:45.852
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.852
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.852
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.859
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.861
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.862
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.865
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake
message (
# "EncryptedExtensions": [
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.866
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.866
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.866
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.866
UTC|SSLExtensions.java:192|Consumed extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.866
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.867
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:45.867
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:45.867
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.869
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
# "certificate_request_context": "",
# "extensions": [
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "certificate_authorities (47)": {
# "certificate authorities": [
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.869
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.869
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.869
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.870
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.871
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:45.871
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.874
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message
(
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "01 78 64 F5",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:14.000 UTC",
# "not after" : "2023-12-31 11:39:14.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 45 72 CD EA 2C 3E 62 0F 52 15 95 39 21 EC 9E 34
Er..,>b.R..9!..4
# 0010: 67 3E D5 AB g>..
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# serverAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: E2 47 3C 22 CD 38 D0 43 23 05 73 77 70 C0 A2 59
.G<".8.C#.swp..Y
# 0010: D0 98 0B 85 ....
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.874
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.955
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
# "certificate" : {
# "version" : "v3",
# "serial number" : "60 DA 4B 43",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:12.000 UTC",
# "not after" : "2023-12-31 11:39:12.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: C6 D7 FE 11 43 65 D0 5D 97 86 8D FE 8C 71 72 FB
....Ce.].....qr.
# 0010: D1 9C 07 CC ....
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 45 72 CD EA 2C 3E 62 0F 52 15 95 39 21 EC 9E 34
Er..,>b.R..9!..4
# 0010: 67 3E D5 AB g>..
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.959
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 8D F1 C7 61 5E 66 79 F5 34 54 06 DA 85 6A 5E F9 ...a^fy.4T...j^.
# 0010: 21 0C F1 D2 CB 48 52 D8 DC 0D ED 11 A6 FF 57 1D !....HR.......W.
# 0020: 99 C2 C5 89 36 A8 E6 CE 58 FB 41 75 C3 22 4A 89 ....6...X.Au."J.
# 0030: F8 46 36 4F AC A9 59 E8 DA 70 9D 55 37 35 93 C7 .F6O..Y..p.U75..
# 0040: 70 50 89 80 C2 EA 4F 15 EB 19 0F FC B6 EE 09 1D pP....O.........
# 0050: A4 26 B2 50 62 2D AD 28 3B 83 A6 51 73 C1 70 6D .&.Pb-.(;..Qs.pm
# 0060: EE EC 77 9D 36 91 07 AB 27 06 CC 82 CC 03 14 71 ..w.6...'......q
# 0070: B5 39 26 83 B7 EB 2B E5 09 FE 55 D2 6C 6E F1 CE .9&...+...U.ln..
# 0080: 02 5C FF 0C F6 D6 9B 79 10 2F 47 F1 40 DF 69 AF .\.....y./[email protected].
# 0090: C4 B7 C3 8D C5 C6 E2 C6 43 88 ED 10 1B 33 CC B4 ........C....3..
# 00A0: 35 BF 6B 35 0D 75 C8 AF 77 F4 E2 85 3C 62 57 D0 5.k5.u..w...<bW.
# 00B0: F8 1D C0 10 F1 23 41 9B AB B8 16 09 B1 8E 7C DD .....#A.........
# 00C0: F3 62 3D C4 DE B1 BA 65 91 8D 96 13 62 12 6D 18 .b=....e....b.m.
# 00D0: C6 74 F5 BC C2 25 EE 0D F5 BC 8F 6C BC AF 15 26 .t...%.....l...&
# 00E0: 9F 4A 6B 36 52 40 46 EC 78 2A 71 6F 50 DB E6 33 [email protected]*qoP..3
# 00F0: B5 0B 8B DE CE 84 27 B4 D6 5D 91 E1 97 F7 C7 A9 ......'..]......
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.961
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: 80 00 A4 09 CC C6 BA 89 26 B5 C4 CE 9B B6 AA FD ........&.......
# 0010: 5A C6 B3 50 D9 58 4B 19 87 37 C1 3B 2E 0A 2A FD Z..P.XK..7.;..*.
# 0020: DA 9E B8 8A DC 45 AE 51 3A 62 22 7C BD C9 F4 E1 .....E.Q:b".....
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.964
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 11:39:45.965
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:45.965
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 11:39:45.965
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:45.965
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 11:39:45.965
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:45.966
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.966
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.969
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "4D 67 81 F6",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:18.000 UTC",
# "not after" : "2023-12-31 11:39:18.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational
Unit, O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 45 72 CD EA 2C 3E 62 0F 52 15 95 39 21 EC 9E 34
Er..,>b.R..9!..4
# 0010: 67 3E D5 AB g>..
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: D8 0C 6A C4 70 62 90 32 99 8D 4C 38 8D C6 64 4F
..j.pb.2..L8..dO
# 0010: 8D 81 61 0E ..a.
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "60 DA 4B 43",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:12.000 UTC",
# "not after" : "2023-12-31 11:39:12.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: C6 D7 FE 11 43 65 D0 5D 97 86 8D FE 8C 71 72 FB
....Ce.].....qr.
# 0010: D1 9C 07 CC ....
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 45 72 CD EA 2C 3E 62 0F 52 15 95 39 21 EC 9E 34
Er..,>b.R..9!..4
# 0010: 67 3E D5 AB g>..
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.994
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake
message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 60 0B 94 06 A6 FD 3B 11 7F 8D 3B C9 19 B9 FA E2 `.....;...;.....
# 0010: 1D 95 4F 98 26 AD A4 7D 21 00 2C 85 07 1B B8 AF ..O.&...!.,.....
# 0020: 29 56 9A F3 D7 CF C0 99 C4 19 51 D7 7A CA 69 B7 )V........Q.z.i.
# 0030: C5 90 03 E0 52 71 AE 07 EA 5A 2E E3 E6 BC EC 51 ....Rq...Z.....Q
# 0040: 12 6A AF 59 F1 70 81 92 E9 AC B7 CA 11 E9 38 7F .j.Y.p........8.
# 0050: 10 9F 39 13 46 6B 42 AA 3D EB 8B 83 6B 8C FE 0D ..9.FkB.=...k...
# 0060: 2B 66 90 ED 3B 96 B5 FC EF B4 23 3B 47 1E 01 1E +f..;.....#;G...
# 0070: 80 BF CE 7B AF 0F 74 C0 49 16 24 BA 68 7C D2 1D ......t.I.$.h...
# 0080: F3 97 E7 33 C4 B4 CB 79 E3 68 9B AD CC 45 C6 54 ...3...y.h...E.T
# 0090: 38 4F 82 DD F3 80 4C A7 7F 91 72 20 27 67 7C 0A 8O....L...r 'g..
# 00A0: B3 2E F1 41 18 50 0C 29 CF 7C BE 5D D3 F1 B8 90 ...A.P.)...]....
# 00B0: 4B 24 BF 71 60 20 48 69 37 A2 A1 5C D1 21 7C 00 K$.q` Hi7..\.!..
# 00C0: 83 17 90 18 F5 94 AE 81 75 8D 47 B2 DF 7D FB CB ........u.G.....
# 00D0: E1 86 20 CD 7C 50 EE 2C 88 08 B9 D6 15 E6 34 D6 .. ..P.,......4.
# 00E0: 85 EF CF F8 89 16 A6 6A 17 CD 9B 0C 65 3F 74 81 .......j....e?t.
# 00F0: D8 A4 30 EF 49 7E 59 98 5B BC 9E 5D 0B CD 83 A2 ..0.I.Y.[..]....
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.995
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: 20 FA BF AD EF 2B B0 13 13 90 D6 AF 16 D5 05 CB ....+..........
# 0010: 58 0F 7C 43 0D EF C1 26 33 79 34 A3 84 D9 E6 A1 X..C...&3y4.....
# 0020: A5 95 F3 4B 75 5C 11 BA 11 71 1C 44 E1 16 12 94 ...Ku\...q.D....
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.996
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:46.045
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
# "ticket_lifetime" : "86,400",
# "ticket_age_add" : "<omitted>",
# "ticket_nonce" : "01",
# "ticket" : "7E A8 36 75 3D F2 0A 98 4F 61 EF ED BB 17 3C F1
F4 DE 33 A2 29 F3 F5 86 DB F9 3B DC FF 2F 0A 16",
# "extensions" : [
# <no extension>
# ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 11:39:46.328
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 11:39:46.329
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound
application data
#
# -- output does not contain substring --
# substring (1 lines):
# Server refused connection
# output (491 lines):
# INFO - 2023-10-02 11:39:57.777;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# javax.net.ssl|DEBUG|01|main|2023-10-02 11:39:58.117
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "74 FB 56 D9",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:10.000 UTC",
# "not after" : "2023-12-31 11:39:10.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: C6 D7 FE 11 43 65 D0 5D 97 86 8D FE 8C 71 72 FB
....Ce.].....qr.
# 0010: D1 9C 07 CC ....
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "60 DA 4B 43",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-02 11:39:12.000 UTC",
# "not after" : "2023-12-31 11:39:12.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: C6 D7 FE 11 43 65 D0 5D 97 86 8D FE 8C 71 72 FB
....Ce.].....qr.
# 0010: D1 9C 07 CC ....
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 45 72 CD EA 2C 3E 62 0F 52 15 95 39 21 EC 9E 34
Er..,>b.R..9!..4
# 0010: 67 3E D5 AB g>..
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 11:39:58.134
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:58.494
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:58.495
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:58.496
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:58.496
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:58.641
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:58.641
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:58.643
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:58.644
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:58.651
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:58.663
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:58.663
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:58.663
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:58.666
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "E9 3E F3 41 A8 8E 7E 72 79 0F 4C 2B 63 07 14 C2
B2 2A C6 7F FF A4 9C 75 9E 3D 7F 84 F1 0D 5F 6C",
# "session id" : "74 A9 87 FA F3 89 A3 95 79 7C 78 C4 DD F3 CA 59
01 E2 67 CA CB AC 59 38 BD 04 4B 87 70 C8 D8 FC",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A),
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025),
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029),
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
# "compression methods" : "00",
# "extensions" : [
# "status_request (5)": {
# "certificate status type": ocsp
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# },
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448,
ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "ec_point_formats (11)": {
# "formats": [uncompressed]
# },
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# },
# "status_request_v2 (17)": {
# "cert status request": {
# "certificate status type": ocsp_multi
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# }
# },
# "extended_master_secret (23)": {
# <empty>
# },
# "supported_versions (43)": {
# "versions": [TLSv1.3, TLSv1.2]
# },
# "psk_key_exchange_modes (45)": {
# "ke_modes": [psk_dhe_ke]
# },
# "key_share (51)": {
# "client_shares": [
# {
# "named group": x25519
# "key_exchange": {
# 0000: E1 C5 26 A4 04 EA 72 93 0B 40 E3 43 C9 50 9A 34
..&[email protected]
# 0010: E5 D1 25 D6 D6 0A 48 88 30 32 46 A4 A4 0C 5C 78
..%...H.02F...\x
# }
# },
# ]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.691
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
# "server version" : "TLSv1.2",
# "random" : "81 67 BD 17 C0 F6 1A 7B AD F7 80 63 76 0E 38 AA
10 A2 CA 70 AB AB B2 67 47 20 0E ED 21 65 91 A1",
# "session id" : "74 A9 87 FA F3 89 A3 95 79 7C 78 C4 DD F3 CA 59
01 E2 67 CA CB AC 59 38 BD 04 4B 87 70 C8 D8 FC",
# "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)",
# "compression methods" : "00",
# "extensions" : [
# "supported_versions (43)": {
# "selected version": [TLSv1.3]
# },
# "key_share (51)": {
# "server_share": {
# "named group": x25519
# "key_exchange": {
# 0000: DF 5D 4E BC 02 2F 06 2D 3B D5 FF C9 65 68 82 9E
.]N../.-;...eh..
# 0010: 9E 7B 90 00 B1 AF 45 B1 9D BF 1E B6 00 7F 72 0B
......E.......r.
# }
# },
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.691
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.691
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.692
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.693
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.693
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.693
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.693
UTC|SSLExtensions.java:163|Ignore unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.693
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.693
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.694
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.696
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.696
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.697
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.697
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.697
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.697
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.697
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.697
UTC|SSLExtensions.java:207|Ignore unavailable extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.698
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.698
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:58.698
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:58.698
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.698
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.698
UTC|SSLExtensions.j
[...truncated too long message...]
rtPathBuilder.java:297)
# at
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# ... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:41:21.067
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound
application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:41:21.123
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:41:21.123
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:41:21.123
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:41:21.123
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException:
IOException occurred when talking to server at:
https://localhost:39532/solr/admin/info/system
# at
org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed:
sun.security.provider.certpath.SunCertPathBuilderException: unable to find
valid certification path to requested target
# at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# at
java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# at
java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# at java.base/java.security.AccessController.doPrivileged(Native Method)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# at
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# at
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# at
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# at
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# at
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# at
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# at
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# at java.base/java.lang.Thread.run(Thread.java:829)
# Suppressed: java.io.IOException: Broken pipe
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# at
org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# at
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# at
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# at
org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# at
org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# at
org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# at
org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# at
org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# at
org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# at
org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# at
org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# ... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building
failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to
find valid certification path to requested target
# at
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# at
java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# at
java.base/sun.security.validator.Validator.validate(Validator.java:264)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# ... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable
to find valid certification path to requested target
# at
java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# at
java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# at
java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# at
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# ... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28204ms
ok 65 stop command for single port in 31472ms
ok 66 status detects locally running solr in 14393ms
ok 67 status does not expose cli parameters to end user in 214ms
ok 68 listing out files in 2201ms
ok 69 copying files around in 6699ms
ok 70 upconfig in 2665ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1204ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1205ms
ok 73 Cleanup in 1226ms
> Task :solr:packaging:integrationTests FAILED
ERROR: The following test(s) have failed:
- org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod (:solr:core)
Test output:
/tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.TestLeaderElectionZkExpiry.txt
Reproduce with: gradlew :solr:core:test --tests
"org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod" -Ptests.jvms=96
"-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC
-XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m"
-Ptests.seed=77B27CFAA45B8786 -Ptests.file.encoding=UTF-8
FAILURE: Build completed with 2 failures.
1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at:
> file:///tmp/src/solr/solr/core/build/test-results/test/
* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================
2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301
* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command
> '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished
> with non-zero exit value 1
* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================
* Get more help at https://help.gradle.org
BUILD FAILED in 21m 9s
654 actionable tasks: 637 executed, 17 up-to-date
[0m[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1
Total time: 21m34.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**'
'**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such
file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code
23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)
+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]