Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5659/

All tests passed

Build Log:
[...truncated 1322 lines...]
#   ERROR: IOException occurred when talking to server at: 
https://localhost:34055/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: 
/tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-13 13:39:10.740; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 13:39:10.746; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# WARN  - 2023-10-13 13:39:11.646; org.apache.solr.common.cloud.SolrZkClient; 
Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it 
creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to 
Zookeeper nodes
# WARN  - 2023-10-13 13:39:11.692; org.apache.solr.common.cloud.SolrZkClient; 
Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 
'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22339ms
ok 61 start solr with client truststore and security manager in 25371ms
not ok 62 start solr with mTLS needed in 60717ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-UIpnTO/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: 
bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is 
listening on port 34055.
#
# Started Solr server on port 34055 (pid=196104). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: 
bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is 
listening on port 34056.
#
# Started Solr server on port 34056 (pid=196532). Happy searching!
#
# INFO  - 2023-10-13 13:40:34.339; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 13:40:34.345; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 13:40:34.727; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for 
Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 13:40:34.731; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for 
Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 13:40:34.731; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for 
Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:34.765 
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 9D 5D 3F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:10.000 UTC",
#     "not  after"         : "2024-01-11 13:40:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  
#*.#.........(:j
#         0010: 47 74 35 E4                                        Gt5.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 09 7E 09 C1 2C B6 C9 46   17 D2 79 CD 52 9E 5D D1  
....,..F..y.R.].
#         0010: F2 1D 17 0C                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 29 EF 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:04.000 UTC",
#     "not  after"         : "2024-01-11 13:40:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  
.....E........3$
#         0010: AD BE 87 5A                                        ...Z
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  
#*.#.........(:j
#         0010: 47 74 35 E4                                        Gt5.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:34.769 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2D FD 23 30",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:02.000 UTC",
#     "not  after"         : "2024-01-11 13:40:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  
.....E........3$
#         0010: AD BE 87 5A                                        ...Z
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 29 EF 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:04.000 UTC",
#     "not  after"         : "2024-01-11 13:40:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  
.....E........3$
#         0010: AD BE 87 5A                                        ...Z
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  
#*.#.........(:j
#         0010: 47 74 35 E4                                        Gt5.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:34.785 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:35.162 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:35.162 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:35.163 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:35.163 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:35.300 
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.300 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:35.302 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:35.303 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.309 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.320 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.321 
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.321 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.323 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EB 1A 70 6D 64 72 3C 5B 76 81 2C 56 0F 20 6C 19 86 
FE 26 2E C4 77 D3 1F 27 ED 1B B0 70 FF 4D 88",
#   "session id"          : "B0 EC BB 40 A3 E1 9F 49 C4 D2 5D 18 E0 56 C2 B9 DE 
3D 17 BE A4 E1 9D 89 B1 C7 1A C5 99 7F 35 D3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 62 A3 57 E0 5E D2 DF 69   38 D1 12 02 75 A0 83 1F  
b.W.^..i8...u...
#             0010: 1B 3D 0C 36 CF FA 4A AE   F3 21 1F 91 85 C8 9B 61  
.=.6..J..!.....a
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.420 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E6 40 FE 3A 58 75 E5 8A 3F 39 9F 60 96 B4 34 45 62 
D2 37 63 59 63 09 C4 C0 5D EE C9 33 5E B2 ED",
#   "session id"          : "B0 EC BB 40 A3 E1 9F 49 C4 D2 5D 18 E0 56 C2 B9 DE 
3D 17 BE A4 E1 9D 89 B1 C7 1A C5 99 7F 35 D3",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 89 BE C7 02 E5 CF B7 51   6D 50 C4 E6 6F 66 05 EA  
.......QmP..of..
#           0010: BB 91 9A 67 51 8D 88 D9   75 84 FC 12 51 84 67 2E  
...gQ...u...Q.g.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.420 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.420 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.421 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.423 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.425 
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.425 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.436 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.437 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.438 
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.442 
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake 
message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.442 
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.442 
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 
UTC|SSLExtensions.java:192|Consumed extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.445 
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.446 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.446 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.446 
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.447 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.449 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.449 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.453 
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message 
(
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C 05 DB D8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 13:40:06.000 UTC",
#       "not  after"         : "2024-01-11 13:40:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  
#*.#.........(:j
#           0010: 47 74 35 E4                                        Gt5.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 E5 07 73 76 B3 00 E7   9C 0E 76 91 7B 20 EE E5  
...sv.....v.. ..
#           0010: AF 96 CC BE                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.453 
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.536 
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 29 EF 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:04.000 UTC",
#     "not  after"         : "2024-01-11 13:40:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  
.....E........3$
#         0010: AD BE 87 5A                                        ...Z
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  
#*.#.........(:j
#         0010: 47 74 35 E4                                        Gt5.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.540 
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 64 6D 97 BD 09 11 DC 1F   59 D1 CE B4 EB 3A D9 EF  dm......Y....:..
#     0010: C0 B3 92 D7 38 91 31 6D   A8 DD 3F 6A 33 6A 49 C2  ....8.1m..?j3jI.
#     0020: 5D F2 74 EC E9 B4 D1 7E   56 A2 98 56 09 25 88 FA  ].t.....V..V.%..
#     0030: 40 6F 57 82 B5 64 15 2B   25 D4 E7 87 63 4D 3D 29  @oW..d.+%...cM=)
#     0040: 46 A7 54 E5 44 B4 92 E7   A4 6E 05 9F 16 E7 4D 89  F.T.D....n....M.
#     0050: 27 96 D4 17 AC 8E B4 D8   BE 21 3F C3 31 16 00 0C  '........!?.1...
#     0060: 13 07 1E 23 40 86 13 5B   E4 63 C8 64 80 CC 45 81  ...#@..[.c.d..E.
#     0070: EB 79 8D ED 39 CE F1 4C   91 76 0C 22 69 09 63 02  .y..9..L.v."i.c.
#     0080: BC 8A CA 01 BA BB 72 D1   DB 0F 20 97 AE D4 D2 80  ......r... .....
#     0090: 76 AF D2 10 5F 61 21 4B   C8 FC 22 C5 6A 60 74 18  v..._a!K..".j`t.
#     00A0: 11 16 94 9B A4 E4 B0 4A   B7 FB 01 DC BB 4F 17 F3  .......J.....O..
#     00B0: 7C B2 A9 14 BA 82 BD 03   88 65 39 D0 50 91 A9 4C  .........e9.P..L
#     00C0: AE 5C FE 07 BD AF EE 34   9D FB 0F 4A C2 6E 24 D0  .\.....4...J.n$.
#     00D0: 79 E7 CD 25 83 72 8F 49   37 96 41 43 ED 56 0A 32  y..%.r.I7.AC.V.2
#     00E0: 79 AA D0 13 20 99 D0 DC   7A D5 AD DD 56 1D 8E 5E  y... ...z...V..^
#     00F0: 66 1F 87 1D 2D F4 F5 21   6D AD D1 F5 F2 55 3F 10  f...-..!m....U?.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.543 
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 59 EB A9 C2 66 B5 F3 80   BA 8F A5 03 37 9D EB 1C  Y...f.......7...
#     0010: 8C 08 40 FB 8B 7A E1 57   FC AC 4A 4C CA A8 FF 29  [email protected]...)
#     0020: 91 AD 37 70 C9 AE DD 85   86 12 45 9B 78 91 BA 0E  ..7p......E.x...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.545 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:35.546 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.546 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:35.547 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.547 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:35.547 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.548 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.548 
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.552 
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 9D 5D 3F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 13:40:10.000 UTC",
#       "not  after"         : "2024-01-11 13:40:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational 
Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  
#*.#.........(:j
#           0010: 47 74 35 E4                                        Gt5.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 09 7E 09 C1 2C B6 C9 46   17 D2 79 CD 52 9E 5D D1  
....,..F..y.R.].
#           0010: F2 1D 17 0C                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 29 EF 89",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 13:40:04.000 UTC",
#       "not  after"         : "2024-01-11 13:40:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  
.....E........3$
#           0010: AD BE 87 5A                                        ...Z
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  
#*.#.........(:j
#           0010: 47 74 35 E4                                        Gt5.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.577 
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake 
message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: C5 83 AF 51 6F 31 76 39   DA 00 3E 46 23 BB 4A 4E  ...Qo1v9..>F#.JN
#     0010: BA 77 A5 F3 3B 78 78 CD   34 9B 0D 8B DE 5D 9C 17  .w..;xx.4....]..
#     0020: 7D 94 1E D1 2E 3A 08 F2   6B 8D E0 CE EA B4 FD 36  .....:..k......6
#     0030: 62 BC 4C 22 AD B3 A3 A7   51 8F 11 9E 75 C6 17 D8  b.L"....Q...u...
#     0040: 68 EF 3D FE 39 CD 4F A0   BF 31 5E 3A 02 6C 67 D5  h.=.9.O..1^:.lg.
#     0050: 15 6D 15 8A D2 95 37 BF   18 F4 51 7E 0F D7 B5 0C  .m....7...Q.....
#     0060: 35 EF 59 6D 5C D8 55 8E   34 51 2B 5A A3 B5 A7 A0  5.Ym\.U.4Q+Z....
#     0070: BE 93 39 DE 1D 5F 25 D2   16 21 3B 16 97 65 1A 77  ..9.._%..!;..e.w
#     0080: 27 CC D2 AC C0 32 D1 1C   BC 0C 2B 73 1E B7 B6 DB  '....2....+s....
#     0090: DC B8 43 38 2F 78 BE 2E   E4 FC 1F C6 34 D6 34 35  ..C8/x......4.45
#     00A0: C1 ED F7 15 58 F6 E5 02   79 8A 3B 68 A9 73 90 20  ....X...y.;h.s.
#     00B0: 90 4E D6 89 8D D6 B6 28   F1 A1 C7 34 5E 67 F4 54  .N.....(...4^g.T
#     00C0: 59 FE E0 BE 12 01 8D D6   0B AB 15 8C A1 F0 19 89  Y...............
#     00D0: 1A 9B 74 09 D5 9A 55 38   60 C4 5E 04 4C 65 77 DA  ..t...U8`.^.Lew.
#     00E0: 77 2C D0 5C D6 7D CF FD   F2 23 26 D4 ED D1 5E CA  w,.\.....#&...^.
#     00F0: 41 51 F7 3B AF 66 67 A1   63 E2 FA 51 03 A8 67 BA  AQ.;.fg.c..Q..g.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.579 
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7F FE AC CA 53 63 6D 77   ED 6D AA B0 2A 61 E5 98  ....Scmw.m..*a..
#     0010: 50 17 69 11 5D 4D 4F 66   BB 69 CF C3 61 CE 8B 51  P.i.]MOf.i..a..Q
#     0020: DF CE E8 CF B0 A7 F8 16   E0 4F 7F 25 76 3B 78 D1  .........O.%v;x.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.580 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.642 
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "42 B8 4D BB 73 47 36 49 98 CC 0D 54 E3 52 0A FA 
BC B4 F3 21 61 31 D5 27 02 E8 E5 F9 D3 A5 D9 7C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 13:40:35.937 
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 13:40:35.938 
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound 
application data
# INFO  - 2023-10-13 13:40:36.899; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 13:40:36.905; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 13:40:37.281; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for 
Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 13:40:37.284; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for 
Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 13:40:37.285; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for 
Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:37.316 
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 9D 5D 3F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:10.000 UTC",
#     "not  after"         : "2024-01-11 13:40:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  
#*.#.........(:j
#         0010: 47 74 35 E4                                        Gt5.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 09 7E 09 C1 2C B6 C9 46   17 D2 79 CD 52 9E 5D D1  
....,..F..y.R.].
#         0010: F2 1D 17 0C                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 29 EF 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:04.000 UTC",
#     "not  after"         : "2024-01-11 13:40:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  
.....E........3$
#         0010: AD BE 87 5A                                        ...Z
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  
#*.#.........(:j
#         0010: 47 74 35 E4                                        Gt5.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:37.321 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2D FD 23 30",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:02.000 UTC",
#     "not  after"         : "2024-01-11 13:40:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  
.....E........3$
#         0010: AD BE 87 5A                                        ...Z
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 29 EF 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:04.000 UTC",
#     "not  after"         : "2024-01-11 13:40:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  
.....E........3$
#         0010: AD BE 87 5A                                        ...Z
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  
#*.#.........(:j
#         0010: 47 74 35 E4                                        Gt5.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:37.335 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:37.674 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:37.676 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:37.677 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:37.677 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:37.835 
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.835 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:37.837 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:37.838 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.844 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.856 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.856 
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.856 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.860 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "67 2D 3D E3 92 95 1A 58 C6 ED 7D 28 04 58 C4 BE 21 
32 25 98 A8 7E 7E 1F 40 CD B7 EA 0F 0A 71 19",
#   "session id"          : "D1 90 BA 2F A8 C1 80 80 7D A2 F9 30 71 32 95 92 BA 
22 5E BB 60 2F 3C B7 EC 74 74 BF F3 DF F8 C4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B4 54 6B 7A 41 7F 8E 61   91 FF 39 F5 C6 3E C6 14  
.TkzA..a..9..>..
#             0010: 95 38 6F CF 97 45 0B 80   5F 01 4C 7D CE F3 5A 04  
.8o..E.._.L...Z.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.955 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "5C C8 41 B3 29 ED 6B 0B 0A 8A 67 DF F5 9D 73 19 40 
1A 75 34 83 87 02 9F C2 0C 97 7B 45 C2 AF 96",
#   "session id"          : "D1 90 BA 2F A8 C1 80 80 7D A2 F9 30 71 32 95 92 BA 
22 5E BB 60 2F 3C B7 EC 74 74 BF F3 DF F8 C4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C2 EB 42 77 03 1C 14 F0   98 0C F0 79 16 48 57 7C  
..Bw.......y.HW.
#           0010: 17 10 9E AE 48 44 C9 01   F7 51 D0 DF CC 4A B6 6C  
....HD...Q...J.l
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.956 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.956 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.957 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.957 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.957 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.958 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.958 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.958 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.958 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.958 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.961 
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.961 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.970 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.972 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.973 
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.976 
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake 
message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.977 
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.977 
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.977 
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.978 
UTC|SSLExtensions.java:192|Consumed extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.978 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.978 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:37.978 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:37.978 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.980 
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.980 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.980 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.980 
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.982 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.983 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:37.983 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.987 
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message 
(
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C 05 DB D8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 13:40:06.000 UTC",
#       "not  after"         : "2024-01-11 13:40:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  
#*.#.........(:j
#           0010: 47 74 35 E4                                        Gt5.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 E5 07 73 76 B3 00 E7   9C 0E 76 91 7B 20 EE E5  
...sv.....v.. ..
#           0010: AF 96 CC BE                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.987 
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.084 
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 29 EF 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:04.000 UTC",
#     "not  after"         : "2024-01-11 13:40:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  
.....E........3$
#         0010: AD BE 87 5A                                        ...Z
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  
#*.#.........(:j
#         0010: 47 74 35 E4                                        Gt5.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.087 
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2D 09 1D 75 51 F3 F2 D5   98 14 DA DD B0 2C 79 09  -..uQ........,y.
#     0010: AB DD 0E EE 78 5C 09 1A   FA 1B BD C7 B7 94 08 5E  ....x\.........^
#     0020: 8C C0 79 68 D1 CE 07 C0   70 EC 4F 9E 2F F2 4F 7F  ..yh....p.O./.O.
#     0030: C2 7A 38 E2 5E 8B 04 B1   D3 1C 49 DE 54 C1 D9 B5  .z8.^.....I.T...
#     0040: E1 FF 5E 58 CD 76 9B 92   33 82 1C 5E A4 06 D6 E2  ..^X.v..3..^....
#     0050: 1A CA B6 F6 74 4E 0A DD   C1 00 C9 41 54 5B 59 D8  ....tN.....AT[Y.
#     0060: A0 58 51 0D 9B 71 E9 C5   7F 28 6A D3 6C 53 2F 35  .XQ..q...(j.lS/5
#     0070: 8D 90 01 8F B7 5B B3 25   D8 EC 03 BD E2 DC 49 A2  .....[.%......I.
#     0080: E3 68 0B 8B E9 88 FC 5B   CA 46 D7 75 CE B2 1D 69  .h.....[.F.u...i
#     0090: 03 7E 17 25 C0 4E 5F 2A   DA 0E 4A E4 46 EF 71 D0  ...%.N_*..J.F.q.
#     00A0: AE 94 6B AB 07 45 C6 3D   68 61 0E C2 8C 6B 78 05  ..k..E.=ha...kx.
#     00B0: 6D 2C EF CF 13 1B F5 EC   E5 16 49 FD B3 46 AC 2D  m,........I..F.-
#     00C0: D1 77 4A EF E9 86 05 01   B2 75 11 6F 0D 7B 35 EA  .wJ......u.o..5.
#     00D0: 58 7D F7 3F 69 9A 22 79   79 AA B7 D7 4C 3B 3E 45  X..?i."yy...L;>E
#     00E0: 87 B1 6D F5 2A 40 84 86   95 6B 14 33 79 35 D6 24  ..m.*@...k.3y5.$
#     00F0: 68 37 B9 09 9B 0A 05 41   CD F1 8F E1 A1 81 6A B0  h7.....A......j.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.089 
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 28 72 69 EA FE 2A BF E4   3D 3F CD 21 1F 32 87 C6  (ri..*..=?.!.2..
#     0010: A3 32 03 CC 1D 04 06 57   CF A1 07 C3 FE C5 5E 08  .2.....W......^.
#     0020: 1F 52 19 6E D2 56 48 C6   C3 19 12 C5 4E 53 FB 9F  .R.n.VH.....NS..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.091 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:38.092 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:38.092 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:38.093 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:38.093 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:38.093 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:38.093 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.094 
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.096 
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 9D 5D 3F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 13:40:10.000 UTC",
#       "not  after"         : "2024-01-11 13:40:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational 
Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  
#*.#.........(:j
#           0010: 47 74 35 E4                                        Gt5.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 09 7E 09 C1 2C B6 C9 46   17 D2 79 CD 52 9E 5D D1  
....,..F..y.R.].
#           0010: F2 1D 17 0C                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 29 EF 89",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 13:40:04.000 UTC",
#       "not  after"         : "2024-01-11 13:40:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  
.....E........3$
#           0010: AD BE 87 5A                                        ...Z
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  
#*.#.........(:j
#           0010: 47 74 35 E4                                        Gt5.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.122 
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake 
message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 43 31 B8 2D 44 AD DA 23   E0 EE E2 E4 CA 51 C0 69  C1.-D..#.....Q.i
#     0010: 0A E7 AE DA 6F D3 07 AF   B7 E6 28 41 1F A5 59 E1  ....o.....(A..Y.
#     0020: 64 73 ED E5 A8 E1 AF 28   CD E2 A3 0F 87 4D 31 F7  ds.....(.....M1.
#     0030: 62 84 05 C3 2D 2A AF 25   C5 21 06 53 EC 98 07 3E  b...-*.%.!.S...>
#     0040: 55 66 C8 BA 30 A1 76 B7   BD AB B3 80 53 3A 6E ED  Uf..0.v.....S:n.
#     0050: 8E 8F 70 A8 C8 21 16 D4   09 69 89 D5 AC 94 8B 9E  ..p..!...i......
#     0060: 85 FB 7F CE 49 7C 32 25   B0 1E BD 11 B9 35 07 CC  ....I.2%.....5..
#     0070: 96 52 1E D1 A4 09 77 0C   BB 05 36 C2 1E 6C 46 A7  .R....w...6..lF.
#     0080: 8F 94 29 57 2F F2 C1 3C   FA 47 0F DD 51 E9 84 20  ..)W/..<.G..Q..
#     0090: A7 49 A2 73 65 9E ED F4   06 92 A1 E8 09 3E 9B 86  .I.se........>..
#     00A0: 3A F8 80 FA 4E ED 66 33   5F 08 F2 9C E9 F4 B2 43  :...N.f3_......C
#     00B0: 54 2F D6 82 13 99 B7 40   92 BA 8E 6E 4D 5C 67 AD  T/[email protected]\g.
#     00C0: 83 3F 2A 84 4E EB A2 10   02 18 D3 85 8C 97 83 37  .?*.N..........7
#     00D0: FA 59 46 F8 17 91 4E D6   F4 47 BB B2 74 8B A2 78  .YF...N..G..t..x
#     00E0: 99 26 42 5D 1A E8 9D 44   79 B7 C8 E1 8E 5E 91 C1  .&B]...Dy....^..
#     00F0: 32 09 2D 70 05 A7 34 7A   97 85 EA 48 0C 81 6C 4A  2.-p..4z...H..lJ
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.123 
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 62 6C FA 1B 6B B7 64 80   43 8A 02 96 A0 04 70 B0  bl..k.d.C.....p.
#     0010: 98 A8 CC 49 3E AB 17 9E   A5 2D 3E 49 D9 4E 46 7D  ...I>....->I.NF.
#     0020: E3 C9 C3 1C 9A 17 CE 0D   7D EB B7 B1 3F 23 3A 92  ............?#:.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.124 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.189 
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "48 8A 18 F4 61 1D 5D D4 73 79 41 56 02 06 00 21 
AE 35 41 0C 1E 60 FE EA 04 90 2F C4 37 19 DA 21",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 13:40:38.514 
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 13:40:38.515 
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound 
application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-13 13:40:49.442; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:49.766 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2D FD 23 30",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 13:40:02.000 UTC",
#       "not  after"         : "2024-01-11 13:40:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  
.....E........3$
#           0010: AD BE 87 5A                                        ...Z
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 29 EF 89",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 13:40:04.000 UTC",
#       "not  after"         : "2024-01-11 13:40:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  
.....E........3$
#           0010: AD BE 87 5A                                        ...Z
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  
#*.#.........(:j
#           0010: 47 74 35 E4                                        Gt5.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:49.782 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:49.934 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:49.935 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:49.935 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:49.935 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:50.014 
UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.014 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:50.016 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:50.016 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.021 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.032 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.032 
UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.032 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.035 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "6B F1 FB 7E E5 EE 21 18 E2 AF 44 7B F0 E3 23 CA 
92 4F A9 F4 F1 4E 06 20 A5 BA 89 65 1C 39 92 FE",
#     "session id"          : "DC DA 51 0B 7F 9C 5B 13 E9 B6 29 21 B9 BD A8 4C 
FF 36 66 F8 C1 6D B8 39 B1 5C 3C 71 EC 07 1C 24",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, 
ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: CE D1 A8 38 E2 85 69 35   DC 16 B3 D2 44 63 1A 15  
...8..i5....Dc..
#               0010: D9 65 95 F2 43 ED DB 16   13 83 38 C6 BA CB 0E 48  
.e..C.....8....H
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.053 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "0C A8 E6 7D 06 A8 AA 8F 09 44 5C 7D 53 8E 2A 31 
A9 ED 55 25 21 FC 51 C6 5B 24 16 7A FD 12 DB 12",
#     "session id"          : "DC DA 51 0B 7F 9C 5B 13 E9 B6 29 21 B9 BD A8 4C 
FF 36 66 F8 C1 6D B8 39 B1 5C 3C 71 EC 07 1C 24",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: E4 CC C8 B5 84 48 A6 5B   60 2A BE C6 6D CB 3A 46  
.....H.[`*..m.:F
#             0010: 05 B9 93 CC F5 88 1D 43   3F 52 91 23 0C E1 BE 2B  
.......C?R.#...+
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.053 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.053 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.054 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.054 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.055 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.055 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.055 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.055 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.055 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.056 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 
UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.066 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.068 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.069 
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.072 
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake 
message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.072 
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.072 
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 
UTC|SSLExtensions.java:192|Consumed extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.074 
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature sc

[...truncated too long message...]

ection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#       at 
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#       at 
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#       at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: 
unable to find valid certification path to requested target
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#       at 
java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#       at 
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#       ... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:42:12.575 
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound 
application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:42:12.624 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:42:12.625 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:42:12.625 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:42:12.625 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: 
IOException occurred when talking to server at: 
https://localhost:34056/solr/admin/info/system
#       at 
org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
#       at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
#       at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
#       at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
#       at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
#       at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
#       at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: 
sun.security.provider.certpath.SunCertPathBuilderException: unable to find 
valid certification path to requested target
#       at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
#       at 
java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
#       at 
java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
#       at java.base/java.security.AccessController.doPrivileged(Native Method)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#       at 
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#       at 
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#       at 
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#       at java.base/java.lang.Thread.run(Thread.java:829)
#       Suppressed: java.io.IOException: Broken pipe
#               at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
#               at 
org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
#               at 
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
#               at 
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
#               at 
org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
#               at 
org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
#               at 
org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
#               at 
org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
#               at 
org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
#               at 
org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
#               at 
org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
#               at 
org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
#               at 
org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
#               at 
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
#               ... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building 
failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to 
find valid certification path to requested target
#       at 
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
#       at 
java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
#       at 
java.base/sun.security.validator.Validator.validate(Validator.java:264)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
#       ... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable 
to find valid certification path to requested target
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#       at 
java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#       at 
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#       ... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28584ms
ok 65 stop command for single port in 30661ms
ok 66 status detects locally running solr in 14337ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2176ms
ok 69 copying files around in 6510ms
ok 70 upconfig in 2596ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1222ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1214ms
ok 73 Cleanup in 1218ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command 
> '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished 
> with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 24m 4s
673 actionable tasks: 673 executed
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 24m33.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' 
'**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such 
file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 
23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to