Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5674/
1 tests failed.
FAILED: org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod
Error Message:
com.carrotsearch.randomizedtesting.ThreadLeakError: 1 thread leaked from SUITE
scope at org.apache.solr.cloud.TestLeaderElectionZkExpiry:
1) Thread[id=321, name=zkConnectionManagerCallback-172-thread-1-EventThread,
state=BLOCKED, group=TGRP-TestLeaderElectionZkExpiry]
at
app//org.apache.solr.common.cloud.ZkStateReader.createClusterStateWatchersAndUpdate(ZkStateReader.java:560)
at
app//org.apache.solr.cloud.ZkController.onReconnect(ZkController.java:435)
at
app//org.apache.solr.cloud.ZkController.lambda$new$0(ZkController.java:381)
at
app//org.apache.solr.cloud.ZkController$$Lambda$545/0x00000008403abc40.command(Unknown
Source)
at
app//org.apache.solr.common.cloud.ConnectionManager$1.update(ConnectionManager.java:199)
at
app//org.apache.solr.common.cloud.DefaultConnectionStrategy.reconnect(DefaultConnectionStrategy.java:59)
at
app//org.apache.solr.common.cloud.ConnectionManager.process(ConnectionManager.java:179)
at
app//org.apache.zookeeper.ClientCnxn$EventThread.processEvent(ClientCnxn.java:563)
at
app//org.apache.zookeeper.ClientCnxn$EventThread.run(ClientCnxn.java:538)
Stack Trace:
com.carrotsearch.randomizedtesting.ThreadLeakError: 1 thread leaked from SUITE
scope at org.apache.solr.cloud.TestLeaderElectionZkExpiry:
1) Thread[id=321, name=zkConnectionManagerCallback-172-thread-1-EventThread,
state=BLOCKED, group=TGRP-TestLeaderElectionZkExpiry]
at
app//org.apache.solr.common.cloud.ZkStateReader.createClusterStateWatchersAndUpdate(ZkStateReader.java:560)
at
app//org.apache.solr.cloud.ZkController.onReconnect(ZkController.java:435)
at
app//org.apache.solr.cloud.ZkController.lambda$new$0(ZkController.java:381)
at
app//org.apache.solr.cloud.ZkController$$Lambda$545/0x00000008403abc40.command(Unknown
Source)
at
app//org.apache.solr.common.cloud.ConnectionManager$1.update(ConnectionManager.java:199)
at
app//org.apache.solr.common.cloud.DefaultConnectionStrategy.reconnect(DefaultConnectionStrategy.java:59)
at
app//org.apache.solr.common.cloud.ConnectionManager.process(ConnectionManager.java:179)
at
app//org.apache.zookeeper.ClientCnxn$EventThread.processEvent(ClientCnxn.java:563)
at
app//org.apache.zookeeper.ClientCnxn$EventThread.run(ClientCnxn.java:538)
at __randomizedtesting.SeedInfo.seed([ABA1E5A73DEA291C]:0)
Build Log:
[...truncated 2292 lines...]
# ERROR: IOException occurred when talking to server at:
https://localhost:44835/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at:
/tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO - 2023-10-15 10:20:59.566;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-10-15 10:20:59.571;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# WARN - 2023-10-15 10:21:00.477; org.apache.solr.common.cloud.SolrZkClient;
Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it
creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to
Zookeeper nodes
# WARN - 2023-10-15 10:21:00.513; org.apache.solr.common.cloud.SolrZkClient;
Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates
'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22943ms
ok 61 start solr with client truststore and security manager in 25326ms
not ok 62 start solr with mTLS needed in 61368ms
# (in test file test/test_ssl.bats, line 325)
# `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-vh6VtP/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408:
bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is
listening on port 44835.
#
# Started Solr server on port 44835 (pid=199893). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408:
bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is
listening on port 44836.
#
# Started Solr server on port 44836 (pid=200324). Happy searching!
#
# INFO - 2023-10-15 10:22:23.686;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-10-15 10:22:23.692;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# INFO - 2023-10-15 10:22:24.077;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for
Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-10-15 10:22:24.080;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for
Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-10-15 10:22:24.081;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for
Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:22:24.114
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
# "certificate" : {
# "version" : "v3",
# "serial number" : "12 37 C8 A7",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:59.000 UTC",
# "not after" : "2024-01-13 10:21:59.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: D0 D3 B2 BA 33 85 AA 03 39 43 93 A4 A3 0A 54 4C
....3...9C....TL
# 0010: 2B D7 A0 8C +...
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: E6 E6 66 19 85 14 7F 7C 8D 0C 53 8F DC 38 4B 22
..f.......S..8K"
# 0010: CE BA 52 DB ..R.
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "72 34 A9 0A",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:53.000 UTC",
# "not after" : "2024-01-13 10:21:53.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 54 DA 3B 29 6F B2 B6 9E A4 8E 69 6D 60 70 C5 67
T.;)o.....im`p.g
# 0010: 5B 3E 2A 89 [>*.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: D0 D3 B2 BA 33 85 AA 03 39 43 93 A4 A3 0A 54 4C
....3...9C....TL
# 0010: 2B D7 A0 8C +...
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:22:24.118
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "31 FB 4D 59",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:51.000 UTC",
# "not after" : "2024-01-13 10:21:51.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 54 DA 3B 29 6F B2 B6 9E A4 8E 69 6D 60 70 C5 67
T.;)o.....im`p.g
# 0010: 5B 3E 2A 89 [>*.
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "72 34 A9 0A",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:53.000 UTC",
# "not after" : "2024-01-13 10:21:53.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 54 DA 3B 29 6F B2 B6 9E A4 8E 69 6D 60 70 C5 67
T.;)o.....im`p.g
# 0010: 5B 3E 2A 89 [>*.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: D0 D3 B2 BA 33 85 AA 03 39 43 93 A4 A3 0A 54 4C
....3...9C....TL
# 0010: 2B D7 A0 8C +...
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:22:24.132
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:24.610
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:24.611
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:24.613
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:24.613
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:24.619
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:24.631
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:24.632
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:24.632
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:24.635
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "43 03 E1 16 78 38 CA 1B 1A 34 00 AA 36 2C 61 FE 94
6E DE 48 E9 9A F4 88 53 59 9C 7A EA 0D FA D8",
# "session id" : "62 45 B9 80 A5 6A 57 79 FA 3D AE 41 C9 0A D9 EE FB
5D E1 D3 8B C7 D9 40 C1 9E FF CE C5 80 E4 FB",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A),
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025),
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029),
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
# "compression methods" : "00",
# "extensions" : [
# "status_request (5)": {
# "certificate status type": ocsp
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# },
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "ec_point_formats (11)": {
# "formats": [uncompressed]
# },
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# },
# "status_request_v2 (17)": {
# "cert status request": {
# "certificate status type": ocsp_multi
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# }
# },
# "extended_master_secret (23)": {
# <empty>
# },
# "supported_versions (43)": {
# "versions": [TLSv1.3, TLSv1.2]
# },
# "psk_key_exchange_modes (45)": {
# "ke_modes": [psk_dhe_ke]
# },
# "key_share (51)": {
# "client_shares": [
# {
# "named group": x25519
# "key_exchange": {
# 0000: 35 16 B4 EE CC 9F 95 CC 43 64 8E 17 25 D1 B0 E4
5.......Cd..%...
# 0010: C2 CC 30 D4 82 3B 39 AD 31 D1 DF AC 68 C1 A2 31
..0..;9.1...h..1
# }
# },
# ]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.737
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
# "server version" : "TLSv1.2",
# "random" : "61 A8 A8 90 9C 3E 2A DA 88 1C 8E 42 66 3C 87 E4 6B
3A 66 0A 8C 0B 16 EE FF 76 73 CA 33 BB E3 C2",
# "session id" : "62 45 B9 80 A5 6A 57 79 FA 3D AE 41 C9 0A D9 EE FB
5D E1 D3 8B C7 D9 40 C1 9E FF CE C5 80 E4 FB",
# "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)",
# "compression methods" : "00",
# "extensions" : [
# "supported_versions (43)": {
# "selected version": [TLSv1.3]
# },
# "key_share (51)": {
# "server_share": {
# "named group": x25519
# "key_exchange": {
# 0000: 62 FB 42 87 3A A7 0E A1 94 22 8A 2B 00 08 5B 91
b.B.:....".+..[.
# 0010: C7 B2 6D 06 34 2B 88 E8 C0 FE F4 28 49 8E F8 3E
..m.4+.....(I..>
# }
# },
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.737
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.737
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.738
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.739
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.739
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.739
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.739
UTC|SSLExtensions.java:163|Ignore unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.739
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.740
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.740
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.742
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.743
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.743
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.743
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.743
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.743
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.744
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.744
UTC|SSLExtensions.java:207|Ignore unavailable extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.744
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.744
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:24.744
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:24.744
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.745
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.745
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.752
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.754
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.755
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.759
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake
message (
# "EncryptedExtensions": [
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.759
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.759
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.759
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.759
UTC|SSLExtensions.java:192|Consumed extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.760
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.760
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:24.760
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:24.760
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.762
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
# "certificate_request_context": "",
# "extensions": [
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "certificate_authorities (47)": {
# "certificate authorities": [
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.762
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.762
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.763
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.764
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.765
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:24.765
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.769
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message
(
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "30 10 C4 A1",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:56.000 UTC",
# "not after" : "2024-01-13 10:21:56.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: D0 D3 B2 BA 33 85 AA 03 39 43 93 A4 A3 0A 54 4C
....3...9C....TL
# 0010: 2B D7 A0 8C +...
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# serverAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 7C 5E 3F 81 90 0C 26 62 A8 06 6B 41 BE 56 BA 1C
.^?...&b..kA.V..
# 0010: B7 E8 92 26 ...&
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.769
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:24.809
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:24.811
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:24.812
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:24.812
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.856
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
# "certificate" : {
# "version" : "v3",
# "serial number" : "72 34 A9 0A",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:53.000 UTC",
# "not after" : "2024-01-13 10:21:53.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 54 DA 3B 29 6F B2 B6 9E A4 8E 69 6D 60 70 C5 67
T.;)o.....im`p.g
# 0010: 5B 3E 2A 89 [>*.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: D0 D3 B2 BA 33 85 AA 03 39 43 93 A4 A3 0A 54 4C
....3...9C....TL
# 0010: 2B D7 A0 8C +...
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.859
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 6B C2 87 BF 8D B7 A9 9F 87 0B 23 44 D3 74 88 72 k.........#D.t.r
# 0010: 03 4E A4 67 39 7D E1 E6 5E 2E E6 32 D3 F2 77 4F .N.g9...^..2..wO
# 0020: E1 7B 0F A9 46 BC B6 64 EA 8E 8D 82 EB E0 BC CF ....F..d........
# 0030: A1 8F 54 53 BD C3 41 73 21 F9 45 96 B2 D8 3E F3 ..TS..As!.E...>.
# 0040: 5B 2D 67 19 DE 4B 2F 96 6A 38 15 36 FF B2 DE B5 [-g..K/.j8.6....
# 0050: 8C D0 E6 AB FF A7 B4 74 05 5A 56 01 29 F6 3A 67 .......t.ZV.).:g
# 0060: 18 A8 D8 1F 3E 72 2E 8C DC 31 B7 63 18 A5 CE ED ....>r...1.c....
# 0070: 64 7B 2E 0E 06 7D 30 CA 6B 02 BB 81 DF 43 82 14 d.....0.k....C..
# 0080: 9A 50 6D 03 10 36 C1 E7 03 68 E1 E4 3A D2 3D 79 .Pm..6...h..:.=y
# 0090: DD E9 A5 C7 AA 72 68 9E 8A B8 09 05 03 B3 89 8B .....rh.........
# 00A0: D5 2B 57 D8 0B B4 8A DC FE 21 2A 87 92 C2 B1 CA .+W......!*.....
# 00B0: 95 E6 7B 45 B0 04 7D 97 35 E5 76 31 37 70 E1 E3 ...E....5.v17p..
# 00C0: C8 7F 74 6D 87 87 B7 63 96 EF E5 C6 EE 9C 54 E5 ..tm...c......T.
# 00D0: 53 74 FF 1C DE 32 67 CE 1A D6 6A AD 46 23 43 3B St...2g...j.F#C;
# 00E0: BD 55 F2 8E E0 1D DE AA 68 4E 28 30 0F F5 21 03 .U......hN(0..!.
# 00F0: 7A 8C 99 21 75 3C A0 BE F4 25 80 17 BF F6 04 86 z..!u<...%......
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.861
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: 3A DC 40 44 F9 26 51 D5 CD BB 2A C3 67 3C FA 4E :.@D.&Q...*.g<.N
# 0010: D2 16 50 8C 2A 0F 78 DB D6 89 8D 56 78 D4 2C 65 ..P.*.x....Vx.,e
# 0020: AF B9 E6 F2 9C E1 0C C2 3D B7 D2 B9 F7 8F 6C 36 ........=.....l6
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.864
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 10:22:24.865
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:24.865
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 10:22:24.865
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:24.865
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 10:22:24.865
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:24.866
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.866
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.869
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "12 37 C8 A7",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:59.000 UTC",
# "not after" : "2024-01-13 10:21:59.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational
Unit, O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: D0 D3 B2 BA 33 85 AA 03 39 43 93 A4 A3 0A 54 4C
....3...9C....TL
# 0010: 2B D7 A0 8C +...
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: E6 E6 66 19 85 14 7F 7C 8D 0C 53 8F DC 38 4B 22
..f.......S..8K"
# 0010: CE BA 52 DB ..R.
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "72 34 A9 0A",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:53.000 UTC",
# "not after" : "2024-01-13 10:21:53.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 54 DA 3B 29 6F B2 B6 9E A4 8E 69 6D 60 70 C5 67
T.;)o.....im`p.g
# 0010: 5B 3E 2A 89 [>*.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: D0 D3 B2 BA 33 85 AA 03 39 43 93 A4 A3 0A 54 4C
....3...9C....TL
# 0010: 2B D7 A0 8C +...
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.894
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake
message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 4E 54 18 2A 52 34 93 CE 2D E0 40 CE 54 D3 CC D7 NT.*[email protected]...
# 0010: 4C 41 7F 6E 52 12 79 AA 12 00 87 4F 41 5B BF 23 LA.nR.y....OA[.#
# 0020: 0C 2D C5 6B B3 E8 7D F0 E1 CA 7D 78 97 A7 CC E4 .-.k.......x....
# 0030: 1D 5E 12 8C 80 66 6E CF 9C 58 C8 3C BD 13 A1 E2 .^...fn..X.<....
# 0040: 15 8C 06 FE 90 9A 5B 3E 1E FF A9 26 7F 17 B2 2B ......[>...&...+
# 0050: 8E 82 41 47 92 AC 9C 1F 31 93 37 39 9C 9A 18 DF ..AG....1.79....
# 0060: 56 A5 48 84 DD FB D9 F5 9F D6 7E CC C0 62 8C DF V.H..........b..
# 0070: DF C7 A0 25 25 85 4B DC 30 BA D9 62 BC DA EB DB ...%%.K.0..b....
# 0080: FE 76 77 C0 78 FF 09 E2 66 D8 2A 8F D7 CA 74 A7 .vw.x...f.*...t.
# 0090: E3 3B 8B A4 EB BD FB 9E 9C 01 C3 12 3C 9B EC D4 .;..........<...
# 00A0: F8 DE 03 7B 1B 5B 7F 9E B4 92 1E 11 2B 84 DB DF .....[......+...
# 00B0: 01 B8 95 82 08 AC B7 C2 BC 23 61 87 AA 13 80 08 .........#a.....
# 00C0: CD BD 86 10 9E 27 FE EE C8 4E BD C1 47 B5 3A 39 .....'...N..G.:9
# 00D0: FE B2 B2 61 75 35 E9 C5 98 38 4A C2 E7 7F E2 1E ...au5...8J.....
# 00E0: 3F 23 F1 C8 68 C2 9B C6 CA 47 67 F0 E3 33 78 5F ?#..h....Gg..3x_
# 00F0: B3 C9 43 6E 5F F9 B0 7C 53 46 F2 73 DC 0F 91 99 ..Cn_...SF.s....
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.895
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: 4F 2A AB 80 ED 2D 54 10 15 BF C0 FA E8 9A CE F7 O*...-T.........
# 0010: 8C 8D 56 31 8D 84 C3 36 1B 90 97 34 D4 78 19 1C ..V1...6...4.x..
# 0020: 30 D1 96 AB D4 E1 A6 D4 59 A6 F2 A8 51 45 F1 F6 0.......Y...QE..
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.896
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.954
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
# "ticket_lifetime" : "86,400",
# "ticket_age_add" : "<omitted>",
# "ticket_nonce" : "01",
# "ticket" : "13 49 2A 5B 02 EF 44 60 09 20 38 8A B2 E8 50 E6
74 A3 3A AA F0 52 D5 9F A9 E5 98 DF D0 D5 38 7A",
# "extensions" : [
# <no extension>
# ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 10:22:25.221
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 10:22:25.222
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound
application data
# INFO - 2023-10-15 10:22:26.160;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.keyStorePassword
# INFO - 2023-10-15 10:22:26.166;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# INFO - 2023-10-15 10:22:26.540;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for
Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-10-15 10:22:26.543;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for
Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.truststore.p12]
# INFO - 2023-10-15 10:22:26.543;
org.eclipse.jetty.util.ssl.SslContextFactory;
x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for
Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:22:26.576
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
# "certificate" : {
# "version" : "v3",
# "serial number" : "12 37 C8 A7",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:59.000 UTC",
# "not after" : "2024-01-13 10:21:59.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: D0 D3 B2 BA 33 85 AA 03 39 43 93 A4 A3 0A 54 4C
....3...9C....TL
# 0010: 2B D7 A0 8C +...
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: E6 E6 66 19 85 14 7F 7C 8D 0C 53 8F DC 38 4B 22
..f.......S..8K"
# 0010: CE BA 52 DB ..R.
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "72 34 A9 0A",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:53.000 UTC",
# "not after" : "2024-01-13 10:21:53.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 54 DA 3B 29 6F B2 B6 9E A4 8E 69 6D 60 70 C5 67
T.;)o.....im`p.g
# 0010: 5B 3E 2A 89 [>*.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: D0 D3 B2 BA 33 85 AA 03 39 43 93 A4 A3 0A 54 4C
....3...9C....TL
# 0010: 2B D7 A0 8C +...
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:22:26.580
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "31 FB 4D 59",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:51.000 UTC",
# "not after" : "2024-01-13 10:21:51.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 54 DA 3B 29 6F B2 B6 9E A4 8E 69 6D 60 70 C5 67
T.;)o.....im`p.g
# 0010: 5B 3E 2A 89 [>*.
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "72 34 A9 0A",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:53.000 UTC",
# "not after" : "2024-01-13 10:21:53.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 54 DA 3B 29 6F B2 B6 9E A4 8E 69 6D 60 70 C5 67
T.;)o.....im`p.g
# 0010: 5B 3E 2A 89 [>*.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: D0 D3 B2 BA 33 85 AA 03 39 43 93 A4 A3 0A 54 4C
....3...9C....TL
# 0010: 2B D7 A0 8C +...
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:22:26.594
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:26.689
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:26.689
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:26.689
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:26.690
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:26.831
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:26.831
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:26.833
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:26.833
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:26.839
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:26.850
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:26.851
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:26.851
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:26.853
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "EE 81 F6 FF F1 7E BB B4 87 41 1C DC 57 0E 5A E4 E3
FD B3 A7 B2 D6 41 88 4B B5 12 13 4D 50 C7 56",
# "session id" : "3E 8C 6C 26 7B 77 F1 3E 13 3F C6 3E D4 49 70 2C 0C
E6 DA 54 87 13 E6 55 E3 8C C3 EB CB C1 84 3B",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A),
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025),
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029),
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
# "compression methods" : "00",
# "extensions" : [
# "status_request (5)": {
# "certificate status type": ocsp
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# },
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "ec_point_formats (11)": {
# "formats": [uncompressed]
# },
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# },
# "status_request_v2 (17)": {
# "cert status request": {
# "certificate status type": ocsp_multi
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# }
# },
# "extended_master_secret (23)": {
# <empty>
# },
# "supported_versions (43)": {
# "versions": [TLSv1.3, TLSv1.2]
# },
# "psk_key_exchange_modes (45)": {
# "ke_modes": [psk_dhe_ke]
# },
# "key_share (51)": {
# "client_shares": [
# {
# "named group": x25519
# "key_exchange": {
# 0000: 9F 61 3D 06 C4 5C 69 B4 89 58 59 E2 AC 28 CC 62
.a=..\i..XY..(.b
# 0010: 04 55 3C 69 58 D0 0B 26 09 50 0E 72 C0 CD C2 7C
.U<iX..&.P.r....
# }
# },
# ]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.957
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
# "server version" : "TLSv1.2",
# "random" : "C4 A9 68 00 C9 73 EB F4 0D 39 54 DD C4 2D F2 B2 00
29 D0 34 F4 84 AF B1 01 37 3A 20 32 5F A1 06",
# "session id" : "3E 8C 6C 26 7B 77 F1 3E 13 3F C6 3E D4 49 70 2C 0C
E6 DA 54 87 13 E6 55 E3 8C C3 EB CB C1 84 3B",
# "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)",
# "compression methods" : "00",
# "extensions" : [
# "supported_versions (43)": {
# "selected version": [TLSv1.3]
# },
# "key_share (51)": {
# "server_share": {
# "named group": x25519
# "key_exchange": {
# 0000: 0A 8C CA 1F 5E 2E 84 06 38 1C 53 13 E2 E4 EA 30
....^...8.S....0
# 0010: DA F8 01 5B 39 29 49 7E 7E 85 A0 7B 80 02 0A 7C
...[9)I.........
# }
# },
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.957
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.957
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.958
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.959
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.959
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.959
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.959
UTC|SSLExtensions.java:163|Ignore unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.960
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.960
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.960
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.963
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.963
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.964
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.964
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.964
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.964
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.965
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.965
UTC|SSLExtensions.java:207|Ignore unavailable extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.965
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.965
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:26.965
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:26.966
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.966
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.966
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.975
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.976
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.977
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.981
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake
message (
# "EncryptedExtensions": [
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048,
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.981
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.981
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.982
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.982
UTC|SSLExtensions.java:192|Consumed extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.982
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.982
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:26.982
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:26.982
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.984
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
# "certificate_request_context": "",
# "extensions": [
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
ecdsa_sha1, rsa_pkcs1_sha1]
# },
# "certificate_authorities (47)": {
# "certificate authorities": [
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country
# CN=localhost, OU=Organizational Unit, O=Organization, L=Location,
ST=State, C=Country]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.984
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.985
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.985
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.986
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.987
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:26.987
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.990
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message
(
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "30 10 C4 A1",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:56.000 UTC",
# "not after" : "2024-01-13 10:21:56.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: D0 D3 B2 BA 33 85 AA 03 39 43 93 A4 A3 0A 54 4C
....3...9C....TL
# 0010: 2B D7 A0 8C +...
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# serverAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 7C 5E 3F 81 90 0C 26 62 A8 06 6B 41 BE 56 BA 1C
.^?...&b..kA.V..
# 0010: B7 E8 92 26 ...&
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.991
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.078
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
# "certificate" : {
# "version" : "v3",
# "serial number" : "72 34 A9 0A",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:53.000 UTC",
# "not after" : "2024-01-13 10:21:53.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 54 DA 3B 29 6F B2 B6 9E A4 8E 69 6D 60 70 C5 67
T.;)o.....im`p.g
# 0010: 5B 3E 2A 89 [>*.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: D0 D3 B2 BA 33 85 AA 03 39 43 93 A4 A3 0A 54 4C
....3...9C....TL
# 0010: 2B D7 A0 8C +...
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.081
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 33 86 C6 2D EA 12 09 02 99 B3 C2 AA A4 ED 8D F4 3..-............
# 0010: D1 1A EA 5E 8D 7E 1D 01 4A A6 86 B9 9E FD 83 DF ...^....J.......
# 0020: 51 89 65 25 A2 62 A6 47 0D 65 8A 9A C5 1D AD 6D Q.e%.b.G.e.....m
# 0030: D5 43 68 49 70 9B 17 8F 8C 13 7E 94 12 32 05 E2 .ChIp........2..
# 0040: 13 6E 32 66 EA 7E 21 5B 1C 59 1C 29 B1 FE FF AF .n2f..![.Y.)....
# 0050: 37 2D 5E 62 6C C7 30 6B E9 07 76 F0 BA 9E BB 60 7-^bl.0k..v....`
# 0060: EE 98 2A 5A B4 A4 9A 71 01 5F 43 BF A1 E3 7C 7F ..*Z...q._C.....
# 0070: BD DD DD A3 9F A5 A6 36 7F 16 26 EF 0A 88 2F FE .......6..&.../.
# 0080: C6 86 1B 83 F9 6B C1 6B D7 EE D5 15 02 97 D8 5D .....k.k.......]
# 0090: 40 BC 39 06 24 8F E2 3A A6 40 46 6E 0A 47 60 C4 @.9.$..:[email protected]`.
# 00A0: 66 EB 7B 02 FF B7 F2 0A 2B 07 35 99 8F 44 D0 4B f.......+.5..D.K
# 00B0: 86 AA D9 5A 0D 72 C8 16 9B 50 B1 01 46 3E 7C 64 ...Z.r...P..F>.d
# 00C0: 9B 01 02 77 B7 53 A6 F5 26 28 90 A9 AD A8 7C C9 ...w.S..&(......
# 00D0: 6D 9F 2E E4 49 A0 C5 B5 08 42 33 79 6A E0 FD 41 m...I....B3yj..A
# 00E0: 1E 74 05 76 5E 2C B8 9A 01 7B 82 F1 23 2F FC 7D .t.v^,......#/..
# 00F0: 85 49 57 FA 7A F1 70 6C 01 D8 4F FB EC 85 98 6A .IW.z.pl..O....j
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.084
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: 92 D0 E6 44 DB 20 D7 9E 36 C4 AD F0 C1 2D ED B5 ...D. ..6....-..
# 0010: AE 7A D1 86 2B 02 60 35 06 55 2B 8D F3 65 5B A8 .z..+.`5.U+..e[.
# 0020: 13 42 20 FB CC 0E B4 7B 64 58 73 26 7B 6B 3C 98 .B .....dXs&.k<.
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.086
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 10:22:27.087
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:27.087
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 10:22:27.088
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:27.088
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 10:22:27.088
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:27.088
UTC|CertificateMessage.java:1084|Unavailable authentication scheme:
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.089
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.091
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
# "certificate_request_context": "",
# "certificate_list": [
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "12 37 C8 A7",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:59.000 UTC",
# "not after" : "2024-01-13 10:21:59.000 UTC",
# "subject" : "CN=test.solr.apache.org, OU=Organizational
Unit, O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: D0 D3 B2 BA 33 85 AA 03 39 43 93 A4 A3 0A 54 4C
....3...9C....TL
# 0010: 2B D7 A0 8C +...
# ]
# ]
# },
# {
# ObjectId: 2.5.29.37 Criticality=true
# ExtendedKeyUsages [
# clientAuth
# ]
# },
# {
# ObjectId: 2.5.29.15 Criticality=true
# KeyUsage [
# DigitalSignature
# Non_repudiation
# Key_Encipherment
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: test.solr.apache.org
# IPAddress: 127.0.0.2
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: E6 E6 66 19 85 14 7F 7C 8D 0C 53 8F DC 38 4B 22
..f.......S..8K"
# 0010: CE BA 52 DB ..R.
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# {
# "certificate" : {
# "version" : "v3",
# "serial number" : "72 34 A9 0A",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:53.000 UTC",
# "not after" : "2024-01-13 10:21:53.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 54 DA 3B 29 6F B2 B6 9E A4 8E 69 6D 60 70 C5 67
T.;)o.....im`p.g
# 0010: 5B 3E 2A 89 [>*.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: D0 D3 B2 BA 33 85 AA 03 39 43 93 A4 A3 0A 54 4C
....3...9C....TL
# 0010: 2B D7 A0 8C +...
# ]
# ]
# }
# ]}
# "extensions": {
# <no extension>
# }
# },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.118
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake
message (
# "CertificateVerify": {
# "signature algorithm": rsa_pss_rsae_sha256
# "signature": {
# 0000: 92 49 BC D0 3B 08 7E E0 4E 0E BC 30 42 07 42 68 .I..;...N..0B.Bh
# 0010: 35 54 B4 4F 2D 22 EE 0E 40 F6 67 EF B5 FE 2D AB 5T.O-"[email protected].
# 0020: 72 5F F3 7B C6 4D 2C 74 82 98 81 89 DA 72 ED D3 r_...M,t.....r..
# 0030: B1 CF 5C 2B 4F 9B 95 95 D0 37 42 78 17 25 A4 7A ..\+O....7Bx.%.z
# 0040: 5C 81 03 5C CE 9B 54 5B A8 2B A1 00 86 BF 5C 1E \..\..T[.+....\.
# 0050: 9D F5 8B F8 29 2C 5C 81 66 32 52 66 7B FF 5B 36 ....),\.f2Rf..[6
# 0060: 02 61 FF 01 C3 5C 4B 0D ED 2D 50 8B 51 AD 1F 93 .a...\K..-P.Q...
# 0070: FF 4E B3 71 86 42 C8 AD 67 AE B2 29 7E 6F C8 A0 .N.q.B..g..).o..
# 0080: 8F ED A6 CE 49 FA 3F 55 D3 70 ED 6F 20 B9 21 4E ....I.?U.p.o .!N
# 0090: 48 C3 B8 4F 9B DF 64 41 2D 86 CC 6C 5F 33 AA BA H..O..dA-..l_3..
# 00A0: 16 82 42 F7 88 D1 EB 4A BA 49 E0 FD AE 3E 64 71 ..B....J.I...>dq
# 00B0: 06 F4 86 BD 95 2F 65 A5 20 3D B6 5B E2 09 EC F3 ...../e. =.[....
# 00C0: EC 69 6E 9B E3 CF B7 FB 3F 39 D0 7C A3 C2 B5 A5 .in.....?9......
# 00D0: 47 0A FE 55 CA 48 E2 5B D4 7B 82 DC E0 94 FD AB G..U.H.[........
# 00E0: B2 03 81 0D 0C C9 7B 2B 10 1B 06 79 16 93 C5 7B .......+...y....
# 00F0: 20 60 59 B7 98 E4 36 AE 7F 5F C3 3E 40 6E 03 36 `Y...6.._.>@n.6
# }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.119
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
# "verify data": {
# 0000: 2D 19 8B 0F 15 E6 CB EA 25 E9 9F B8 EF 9D 83 84 -.......%.......
# 0010: 2A 08 E2 1C 42 28 8C 5B 20 74 7C 86 33 9C A4 45 *...B(.[ t..3..E
# 0020: B8 02 23 87 72 4C 36 FA 89 92 F2 97 C3 F0 97 09 ..#.rL6.........
# }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.120
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm =
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.176
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
# "ticket_lifetime" : "86,400",
# "ticket_age_add" : "<omitted>",
# "ticket_nonce" : "01",
# "ticket" : "46 75 4D 20 99 66 1D 28 92 B1 44 ED D2 A3 F2 AE
E5 DD D0 C0 13 6B 40 AA 84 A7 B8 75 32 C9 71 10",
# "extensions" : [
# <no extension>
# ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 10:22:27.450
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 10:22:27.451
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound
application data
#
# -- output does not contain substring --
# substring (1 lines):
# Server refused connection
# output (491 lines):
# INFO - 2023-10-15 10:22:39.104;
org.apache.solr.util.configuration.SSLConfigurations; Setting
javax.net.ssl.trustStorePassword
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:22:39.436
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
# "certificate" : {
# "version" : "v3",
# "serial number" : "31 FB 4D 59",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:51.000 UTC",
# "not after" : "2024-01-13 10:21:51.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.19 Criticality=true
# BasicConstraints:[
# CA:true
# PathLen:2147483647
# ]
# },
# {
# ObjectId: 2.5.29.17 Criticality=false
# SubjectAlternativeName [
# DNSName: localhost
# IPAddress: 127.0.0.1
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: 54 DA 3B 29 6F B2 B6 9E A4 8E 69 6D 60 70 C5 67
T.;)o.....im`p.g
# 0010: 5B 3E 2A 89 [>*.
# ]
# ]
# }
# ]},
# "certificate" : {
# "version" : "v3",
# "serial number" : "72 34 A9 0A",
# "signature algorithm": "SHA256withRSA",
# "issuer" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "not before" : "2023-10-15 10:21:53.000 UTC",
# "not after" : "2024-01-13 10:21:53.000 UTC",
# "subject" : "CN=localhost, OU=Organizational Unit,
O=Organization, L=Location, ST=State, C=Country",
# "subject public key" : "RSA",
# "extensions" : [
# {
# ObjectId: 2.5.29.35 Criticality=false
# AuthorityKeyIdentifier [
# KeyIdentifier [
# 0000: 54 DA 3B 29 6F B2 B6 9E A4 8E 69 6D 60 70 C5 67
T.;)o.....im`p.g
# 0010: 5B 3E 2A 89 [>*.
# ]
# ]
# },
# {
# ObjectId: 2.5.29.19 Criticality=false
# BasicConstraints:[
# CA:true
# PathLen:0
# ]
# },
# {
# ObjectId: 2.5.29.14 Criticality=false
# SubjectKeyIdentifier [
# KeyIdentifier [
# 0000: D0 D3 B2 BA 33 85 AA 03 39 43 93 A4 A3 0A 54 4C
....3...9C....TL
# 0010: 2B D7 A0 8C +...
# ]
# ]
# }
# ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:22:39.451
UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:39.564
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:39.565
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:39.565
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:39.565
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:39.704
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:39.704
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:39.706
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:39.706
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:39.711
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:39.723
UTC|SSLExtensions.java:260|Ignore, context unavailable extension:
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:39.723
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:39.723
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:39.726
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
# "client version" : "TLSv1.2",
# "random" : "B5 0A BA 42 4F EB E9 97 08 A0 20 B4 89 24 0C 72
CF E5 C0 30 89 BD 8B 29 88 1A EE 85 02 1A AD 82",
# "session id" : "77 9B 93 F3 BA 88 3E 79 FA 34 8A 9D 7D 18 A7 4E
6C 40 36 F7 96 18 68 68 BC 4E 53 75 9D 19 8B 2C",
# "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302),
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303),
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C),
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B),
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9),
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030),
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8),
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F),
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F),
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA),
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3),
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E),
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2),
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024),
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028),
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023),
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027),
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B),
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A),
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067),
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040),
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E),
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032),
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D),
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031),
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026),
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A),
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025),
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029),
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
# "compression methods" : "00",
# "extensions" : [
# "status_request (5)": {
# "certificate status type": ocsp
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# },
# "supported_groups (10)": {
# "versions": [x25519, secp256r1, secp384r1, secp521r1, x448,
ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
# },
# "ec_point_formats (11)": {
# "formats": [uncompressed]
# },
# "signature_algorithms (13)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "signature_algorithms_cert (50)": {
# "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384,
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384,
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384,
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512,
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1,
dsa_sha1]
# },
# "application_layer_protocol_negotiation (16)": {
# [h2]
# },
# "status_request_v2 (17)": {
# "cert status request": {
# "certificate status type": ocsp_multi
# "OCSP status request": {
# "responder_id": <empty>
# "request extensions": {
# <empty>
# }
# }
# }
# },
# "extended_master_secret (23)": {
# <empty>
# },
# "supported_versions (43)": {
# "versions": [TLSv1.3, TLSv1.2]
# },
# "psk_key_exchange_modes (45)": {
# "ke_modes": [psk_dhe_ke]
# },
# "key_share (51)": {
# "client_shares": [
# {
# "named group": x25519
# "key_exchange": {
# 0000: 6D 70 17 75 B3 8B F4 3A 2A E7 B7 AE 2F 15 BA B6
mp.u...:*.../...
# 0010: 59 A7 B7 E6 16 61 59 80 3A D0 CB 8A D3 38 C2 42
Y....aY.:....8.B
# }
# },
# ]
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.743
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
# "server version" : "TLSv1.2",
# "random" : "5B 3B 66 60 CD 4C 57 15 4D 53 0F B2 68 6F A4 2A
FB F5 50 46 BB 75 6E 32 C8 CF 61 F3 25 B9 8E 61",
# "session id" : "77 9B 93 F3 BA 88 3E 79 FA 34 8A 9D 7D 18 A7 4E
6C 40 36 F7 96 18 68 68 BC 4E 53 75 9D 19 8B 2C",
# "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)",
# "compression methods" : "00",
# "extensions" : [
# "supported_versions (43)": {
# "selected version": [TLSv1.3]
# },
# "key_share (51)": {
# "server_share": {
# "named group": x25519
# "key_exchange": {
# 0000: 5C CC 94 34 DB 49 57 2F 44 22 D9 40 C2 3C D6 16
\..4.IW/D".@.<..
# 0010: 2F 84 D3 E3 B9 FF 6D B3 60 B9 2F 64 65 F6 74 7E
/.....m.`./de.t.
# }
# },
# }
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.743
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.744
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.744
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.745
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.745
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.745
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.745
UTC|SSLExtensions.java:163|Ignore unsupported extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.745
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.745
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.745
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.747
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.747
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.748
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.748
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.748
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.748
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.748
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.748
UTC|SSLExtensions.java:207|Ignore unavailable extension:
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.749
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.749
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:39.749
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension:
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:39.749
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.749
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.749
UTC|SSLExtensions
[...truncated too long message...]
athBuilder.engineBuild(SunCertPathBuilder.java:126)
# at
java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# at
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# ... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:24:03.082
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound
application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:24:03.133
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:24:03.133
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:24:03.133
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:24:03.133
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException:
IOException occurred when talking to server at:
https://localhost:44836/solr/admin/info/system
# at
org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed:
sun.security.provider.certpath.SunCertPathBuilderException: unable to find
valid certification path to requested target
# at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# at
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# at
java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# at
java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# at java.base/java.security.AccessController.doPrivileged(Native Method)
# at
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# at
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# at
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# at
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# at
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# at
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# at
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# at
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# at java.base/java.lang.Thread.run(Thread.java:829)
# Suppressed: java.io.IOException: Broken pipe
# at
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# at
org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# at
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# at
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# at
org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# at
org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# at
org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# at
org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# at
org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# at
org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# at
org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# at
org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# at
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# ... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building
failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to
find valid certification path to requested target
# at
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# at
java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# at
java.base/sun.security.validator.Validator.validate(Validator.java:264)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# at
java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# at
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# ... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable
to find valid certification path to requested target
# at
java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# at
java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# at
java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# at
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# ... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28104ms
ok 65 stop command for single port in 31234ms
ok 66 status detects locally running solr in 14356ms
ok 67 status does not expose cli parameters to end user in 208ms
ok 68 listing out files in 2161ms
ok 69 copying files around in 6562ms
ok 70 upconfig in 2639ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1226ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1226ms
ok 73 Cleanup in 1220ms
> Task :solr:packaging:integrationTests FAILED
ERROR: The following test(s) have failed:
- org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod (:solr:core)
Test output:
/tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.TestLeaderElectionZkExpiry.txt
Reproduce with: gradlew :solr:core:test --tests
"org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod" -Ptests.jvms=96
"-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC
-XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m"
-Ptests.seed=ABA1E5A73DEA291C -Ptests.file.encoding=ISO-8859-1
FAILURE: Build completed with 2 failures.
1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at:
> file:///tmp/src/solr/solr/core/build/test-results/test/
* Try:
> Run with --scan to get full insights.
==============================================================================
2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301
* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command
> '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished
> with non-zero exit value 1
* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.
==============================================================================
BUILD FAILED in 24m 12s
654 actionable tasks: 637 executed, 17 up-to-date
[0m[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1
Total time: 24m39s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**'
'**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such
file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code
23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)
+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]