Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5697/

All tests passed

Build Log:
[...truncated 1309 lines...]
#   ERROR: IOException occurred when talking to server at: 
https://localhost:33475/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: 
/tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-18 02:39:13.230; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 02:39:13.235; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# WARN  - 2023-10-18 02:39:14.482; org.apache.solr.common.cloud.SolrZkClient; 
Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it 
creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to 
Zookeeper nodes
# WARN  - 2023-10-18 02:39:14.525; org.apache.solr.common.cloud.SolrZkClient; 
Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 
'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23427ms
ok 61 start solr with client truststore and security manager in 25115ms
not ok 62 start solr with mTLS needed in 56773ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-5K7b62/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: 
bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is 
listening on port 33475.
#
# Started Solr server on port 33475 (pid=200206). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: 
bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is 
listening on port 33476.
#
# Started Solr server on port 33476 (pid=200659). Happy searching!
#
# INFO  - 2023-10-18 02:40:37.997; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 02:40:38.003; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 02:40:38.382; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for 
Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 02:40:38.385; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for 
Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 02:40:38.386; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for 
Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 02:40:38.421 
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2F 6F 9F A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:14.000 UTC",
#     "not  after"         : "2024-01-16 02:40:14.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  
..P....'a...eW..
#         0010: 7A 68 92 5C                                        zh.\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AF 0B 68 E1 AE B1 53 B1   C1 AD A3 12 E9 71 B1 6E  
..h...S......q.n
#         0010: 70 35 5A 5D                                        p5Z]
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 21 02 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:07.000 UTC",
#     "not  after"         : "2024-01-16 02:40:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  
r<"`..]rI.w?..ck
#         0010: B8 48 86 50                                        .H.P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  
..P....'a...eW..
#         0010: 7A 68 92 5C                                        zh.\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 02:40:38.426 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 21 02 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:07.000 UTC",
#     "not  after"         : "2024-01-16 02:40:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  
r<"`..]rI.w?..ck
#         0010: B8 48 86 50                                        .H.P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  
..P....'a...eW..
#         0010: 7A 68 92 5C                                        zh.\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "44 B4 6A 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:06.000 UTC",
#     "not  after"         : "2024-01-16 02:40:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  
r<"`..]rI.w?..ck
#         0010: B8 48 86 50                                        .H.P
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 02:40:38.442 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:38.775 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:38.776 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:38.777 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:38.777 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:38.939 
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:38.939 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:38.941 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:38.941 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:38.947 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:38.960 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:38.960 
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:38.960 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:38.963 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "B7 61 85 CF 55 C7 48 41 44 24 D9 8D F4 60 C2 97 91 
22 BF 14 13 33 72 13 64 2F 58 0C D1 6D 75 BD",
#   "session id"          : "0B 72 C9 AE E7 B3 ED B2 BD 9D 86 79 7D C9 72 38 C9 
76 A1 8A 6E FD B1 AF E9 26 43 D9 1D 0F B3 CC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EB C8 C6 86 0C 7E B1 AF   84 13 4D 4F 5C C2 FE 52  
..........MO\..R
#             0010: 7B 29 4D 68 37 A4 E4 7C   63 0D 6C FE A9 92 B9 4E  
.)Mh7...c.l....N
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.070 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "12 F9 46 92 2F 66 26 D3 3F EF DC 46 92 AF C9 00 3D 
79 85 3D AB C9 73 7A 0F A1 DF 35 33 4B B4 C8",
#   "session id"          : "0B 72 C9 AE E7 B3 ED B2 BD 9D 86 79 7D C9 72 38 C9 
76 A1 8A 6E FD B1 AF E9 26 43 D9 1D 0F B3 CC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: CF 72 5E 7A FF C9 44 49   79 91 BD A4 41 E6 80 53  
.r^z..DIy...A..S
#           0010: E9 FA AA E6 4A 41 9E 99   40 10 08 89 C3 1B 19 75  
[email protected]
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.070 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.070 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.072 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.072 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.072 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.072 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.072 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.073 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.073 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.073 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.075 
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.076 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.076 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.076 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.076 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.077 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.077 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.077 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.077 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.077 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:39.077 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:39.077 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.078 
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.078 
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.085 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.087 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.088 
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.092 
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake 
message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.092 
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.093 
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.093 
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.093 
UTC|SSLExtensions.java:192|Consumed extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.093 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.093 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:39.093 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:39.094 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.095 
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.096 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.096 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.096 
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.098 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.099 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:39.099 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.103 
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message 
(
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 23 68 1F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 02:40:10.000 UTC",
#       "not  after"         : "2024-01-16 02:40:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  
..P....'a...eW..
#           0010: 7A 68 92 5C                                        zh.\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3C 4C 0E B0 E0 ED 73 68   6E 6A 68 01 F3 FF 35 89  
<L....shnjh...5.
#           0010: 29 0D 4D 60                                        ).M`
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.103 
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.193 
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 21 02 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:07.000 UTC",
#     "not  after"         : "2024-01-16 02:40:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  
r<"`..]rI.w?..ck
#         0010: B8 48 86 50                                        .H.P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  
..P....'a...eW..
#         0010: 7A 68 92 5C                                        zh.\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.196 
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A2 C2 8A F9 AD 75 15 C7   FE 7F 46 A1 53 D9 AD 2B  .....u....F.S..+
#     0010: F1 FA 64 FA DD 82 DF D0   07 AB 64 F5 F4 4A 11 28  ..d.......d..J.(
#     0020: 2C 08 E2 3C 14 6B 22 DC   C2 19 A2 99 BB 1E FD 92  ,..<.k".........
#     0030: BC C5 0A D2 45 49 64 30   64 D5 46 B0 FE 5F 03 91  ....EId0d.F.._..
#     0040: CB 6E 90 52 A0 EE 48 80   72 67 2E EA 8B 81 6E 59  .n.R..H.rg....nY
#     0050: A8 3B 4C 69 FB 18 2A E7   60 64 02 45 2F 5B A2 36  .;Li..*.`d.E/[.6
#     0060: A9 77 D3 1A 7E B4 2B 8D   43 CC CD 86 13 F8 AB 36  .w....+.C......6
#     0070: 3B 48 E9 55 1A 5D FB B9   75 05 92 18 CB A5 62 C8  ;H.U.]..u.....b.
#     0080: 62 06 8C EC 75 02 8A 8A   C9 DF 69 94 99 76 09 C1  b...u.....i..v..
#     0090: 3A 95 A5 9D 3B 5E 09 0B   B9 A1 03 36 6D F0 A7 37  :...;^.....6m..7
#     00A0: 6A 22 73 70 4D D7 56 CE   BA 35 27 32 51 11 70 4F  j"spM.V..5'2Q.pO
#     00B0: 11 E7 4B BA C0 73 E3 9F   94 36 E3 F4 7D DD 5B 66  ..K..s...6....[f
#     00C0: DB C4 47 EE 69 79 7C C1   F5 52 12 30 0A CB 65 06  ..G.iy...R.0..e.
#     00D0: 90 C2 F3 A2 5F 9C 73 B7   AD EB A4 40 40 10 B0 EF  ...._.s....@@...
#     00E0: 76 0D D2 A5 16 CD 19 C5   0A 07 2E 4D E2 F5 A4 73  v..........M...s
#     00F0: F1 F3 85 D4 F2 91 9E 13   C7 90 87 5C 04 56 7C CF  ...........\.V..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.199 
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F2 BB 28 36 9B 01 88 85   02 1E 54 67 5C BF 2D C9  ..(6......Tg\.-.
#     0010: C3 1F 5D 1A DA 07 9F 40   8E 37 AC 03 11 7B AD 4A  ..][email protected]
#     0020: FD 15 C2 F6 E2 F0 B3 E7   0F FF FA B3 3F F5 FD 74  ............?..t
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.201 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 02:40:39.202 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:39.202 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 02:40:39.203 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:39.203 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 02:40:39.203 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:39.203 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.204 
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.206 
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2F 6F 9F A9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 02:40:14.000 UTC",
#       "not  after"         : "2024-01-16 02:40:14.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational 
Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  
..P....'a...eW..
#           0010: 7A 68 92 5C                                        zh.\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AF 0B 68 E1 AE B1 53 B1   C1 AD A3 12 E9 71 B1 6E  
..h...S......q.n
#           0010: 70 35 5A 5D                                        p5Z]
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 21 02 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 02:40:07.000 UTC",
#       "not  after"         : "2024-01-16 02:40:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  
r<"`..]rI.w?..ck
#           0010: B8 48 86 50                                        .H.P
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  
..P....'a...eW..
#           0010: 7A 68 92 5C                                        zh.\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.232 
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake 
message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4B C1 F9 BD BD 14 DC 49   B1 78 80 8D 5E D5 A2 DB  K......I.x..^...
#     0010: 42 4D E3 CF 4B CF 7D 08   C3 E7 70 93 7F 97 75 93  BM..K.....p...u.
#     0020: 37 07 5E 40 FC 00 07 3E   D4 28 F5 C8 D0 07 48 76  7.^@...>.(....Hv
#     0030: E3 30 F9 EE D3 C6 95 4F   00 B4 4B C9 5D 96 EB E2  .0.....O..K.]...
#     0040: CA 3C AD 48 25 50 6D B0   59 45 08 0F C8 1E 56 6B  .<.H%Pm.YE....Vk
#     0050: 55 70 A1 29 CB 1C 07 5C   E8 F8 F7 60 48 93 CE 09  Up.)...\...`H...
#     0060: 0E 48 95 17 38 6D 7B 3B   2E 0A 6E 85 EC 0A F6 FF  .H..8m.;..n.....
#     0070: F4 AE F4 77 55 74 66 52   9F 26 04 DA EF 77 1C 70  ...wUtfR.&...w.p
#     0080: CA 83 A3 70 7B 30 E5 79   F2 1B 62 43 31 D9 50 AA  ...p.0.y..bC1.P.
#     0090: 9A FF C5 F4 49 34 71 BE   FE EE B7 2A 11 7B 76 03  ....I4q....*..v.
#     00A0: 38 DB C0 F7 B5 B9 16 85   15 59 89 34 F2 0A CC 26  8........Y.4...&
#     00B0: 47 2F 53 45 02 79 27 AB   30 47 AA 51 D8 8D 21 0A  G/SE.y'.0G.Q..!.
#     00C0: 57 9C 71 1E F7 19 01 04   FC E7 10 49 68 B1 48 D7  W.q........Ih.H.
#     00D0: 07 08 01 94 77 0C 32 A1   B8 95 4D 45 ED D6 F3 09  ....w.2...ME....
#     00E0: 3C 5C C0 1C 11 FE 48 E2   F6 8F BD 36 B1 49 00 7E  <\....H....6.I..
#     00F0: 84 D0 EC 56 54 8D DC B6   70 C1 79 6A 2F C6 E0 E9  ...VT...p.yj/...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.233 
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1C E6 3C 58 A8 3B 92 47   EF 8C 25 67 52 7C EA BD  ..<X.;.G..%gR...
#     0010: 55 90 48 AB F2 C0 81 DE   A8 09 FE E8 13 8C 9E 27  U.H............'
#     0020: 5D 84 31 2B 29 30 0B DB   1F 9F 15 4B A5 2D 2D 7C  ].1+)0.....K.--.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.234 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.297 
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "6C AB A0 80 CE 93 43 0D 25 52 BB 0A 69 A4 4F CF 
C4 06 24 D5 77 32 31 B2 2D 27 06 11 78 0C 92 AA",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 02:40:39.573 
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 02:40:39.575 
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound 
application data
# INFO  - 2023-10-18 02:40:40.526; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 02:40:40.531; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 02:40:40.918; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for 
Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 02:40:40.921; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for 
Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 02:40:40.921; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for 
Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 02:40:40.952 
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2F 6F 9F A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:14.000 UTC",
#     "not  after"         : "2024-01-16 02:40:14.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  
..P....'a...eW..
#         0010: 7A 68 92 5C                                        zh.\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AF 0B 68 E1 AE B1 53 B1   C1 AD A3 12 E9 71 B1 6E  
..h...S......q.n
#         0010: 70 35 5A 5D                                        p5Z]
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 21 02 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:07.000 UTC",
#     "not  after"         : "2024-01-16 02:40:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  
r<"`..]rI.w?..ck
#         0010: B8 48 86 50                                        .H.P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  
..P....'a...eW..
#         0010: 7A 68 92 5C                                        zh.\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 02:40:40.957 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 21 02 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:07.000 UTC",
#     "not  after"         : "2024-01-16 02:40:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  
r<"`..]rI.w?..ck
#         0010: B8 48 86 50                                        .H.P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  
..P....'a...eW..
#         0010: 7A 68 92 5C                                        zh.\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "44 B4 6A 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:06.000 UTC",
#     "not  after"         : "2024-01-16 02:40:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  
r<"`..]rI.w?..ck
#         0010: B8 48 86 50                                        .H.P
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 02:40:40.971 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:41.054 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:41.056 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:41.057 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:41.057 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:41.199 
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:41.199 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:41.201 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:41.201 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:41.207 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:41.218 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:41.218 
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:41.219 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:41.221 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C4 31 A6 F1 E8 BF AE BF 6B 05 08 F5 67 33 54 92 2A 
71 07 A5 51 D3 2F 6D C9 0F 6F 29 3C A1 B8 5E",
#   "session id"          : "60 01 E6 E0 7D 62 B0 C9 4D B9 16 44 58 A6 57 66 77 
DB AA C6 48 FB 31 44 2B D9 96 06 DE 80 53 8E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 53 00 BE 5F 90 1A 3B 34   AE E8 7C 51 F4 A2 40 81  
S.._..;4...Q..@.
#             0010: 5B C2 CB DC 85 E4 62 D0   BA 7B AB 77 4C 92 4C 39  
[.....b....wL.L9
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.315 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "30 F3 E0 C7 D5 5F D4 EC F9 F1 DF 9C B4 BA 73 EB 83 
6D 42 B1 C4 3F F4 E8 88 50 50 C1 F3 94 82 F9",
#   "session id"          : "60 01 E6 E0 7D 62 B0 C9 4D B9 16 44 58 A6 57 66 77 
DB AA C6 48 FB 31 44 2B D9 96 06 DE 80 53 8E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F3 DF FB AC AC 78 6B 2C   C8 8B 79 BE B2 38 7B E0  
.....xk,..y..8..
#           0010: F2 CF 7E 05 63 27 4D 62   D7 87 FC 41 0D 1B F7 6C  
....c'Mb...A...l
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.316 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.316 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.317 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.317 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.317 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.317 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.318 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.318 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.318 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.318 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.321 
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.321 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.321 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.322 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.322 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.322 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.322 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.322 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.322 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.322 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:41.323 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:41.323 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.323 
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.323 
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.330 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.331 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.332 
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.336 
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake 
message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.336 
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.336 
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.337 
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.337 
UTC|SSLExtensions.java:192|Consumed extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.337 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.337 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:41.337 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:41.337 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.339 
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.339 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.339 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.340 
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.341 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.341 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:41.342 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.345 
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message 
(
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 23 68 1F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 02:40:10.000 UTC",
#       "not  after"         : "2024-01-16 02:40:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  
..P....'a...eW..
#           0010: 7A 68 92 5C                                        zh.\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3C 4C 0E B0 E0 ED 73 68   6E 6A 68 01 F3 FF 35 89  
<L....shnjh...5.
#           0010: 29 0D 4D 60                                        ).M`
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.345 
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.424 
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 21 02 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:07.000 UTC",
#     "not  after"         : "2024-01-16 02:40:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  
r<"`..]rI.w?..ck
#         0010: B8 48 86 50                                        .H.P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  
..P....'a...eW..
#         0010: 7A 68 92 5C                                        zh.\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.428 
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 45 82 7B 66 C1 3F 91 C5   48 1C 13 D9 C0 4A 91 8B  E..f.?..H....J..
#     0010: 8D C2 4B 58 5B BB 6C 74   10 C9 BE ED 3C 1C 30 53  ..KX[.lt....<.0S
#     0020: 40 F1 37 D5 21 1A 52 CB   93 62 55 22 79 1E 77 41  @.7.!.R..bU"y.wA
#     0030: 65 65 80 AC 8F AA 0F 26   CC B9 D6 E7 C8 A0 21 B1  ee.....&......!.
#     0040: B2 7F 8D 13 74 DB 3A 0D   09 34 85 16 F8 F9 BE ED  ....t.:..4......
#     0050: FE 74 00 86 EE 5E EB 4D   30 05 C9 C2 63 63 78 E8  .t...^.M0...ccx.
#     0060: 2A E9 F7 6D D2 B3 85 00   CC 9C 5B 16 AD F9 A8 D8  *..m......[.....
#     0070: 6A 0F 26 A9 B8 F3 3A 09   50 89 55 7A 03 EC 61 94  j.&...:.P.Uz..a.
#     0080: 44 4F 81 4F 89 31 33 FE   32 0B 96 93 BD 23 B4 55  DO.O.13.2....#.U
#     0090: E8 7F 22 4A A3 F4 6D CE   93 2F FD F2 99 7B C9 24  .."J..m../.....$
#     00A0: 79 95 32 7E 5A E3 61 B9   33 56 5D 0C CF DB 1D 95  y.2.Z.a.3V].....
#     00B0: B6 77 81 CD 72 1F A6 2F   62 B7 7E 64 13 8A EC BE  .w..r../b..d....
#     00C0: 28 88 FC 13 1D 47 B2 81   F1 6F 85 FB 1F C6 CC D1  (....G...o......
#     00D0: BA 06 1B C5 60 B5 13 12   1A 72 06 BB C2 DB 57 39  ....`....r....W9
#     00E0: 39 E3 E7 C9 48 40 68 11   C7 34 C7 82 EE 79 E0 CD  [email protected]..
#     00F0: 67 32 2F B6 84 A8 54 26   69 C5 06 08 87 85 6F 69  g2/...T&i.....oi
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.430 
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A2 26 81 ED 8E 90 46 44   25 22 12 07 A8 36 E4 81  .&....FD%"...6..
#     0010: C3 6A FE AD C1 E6 9D DF   83 6A CC 42 6A AB 6B D3  .j.......j.Bj.k.
#     0020: DA B7 BB 26 4F 71 B5 C6   B7 F6 AD 99 8B 48 C4 EE  ...&Oq.......H..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.433 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 02:40:41.434 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:41.434 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 02:40:41.434 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:41.434 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 02:40:41.435 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:41.435 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.435 
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.438 
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2F 6F 9F A9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 02:40:14.000 UTC",
#       "not  after"         : "2024-01-16 02:40:14.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational 
Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  
..P....'a...eW..
#           0010: 7A 68 92 5C                                        zh.\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AF 0B 68 E1 AE B1 53 B1   C1 AD A3 12 E9 71 B1 6E  
..h...S......q.n
#           0010: 70 35 5A 5D                                        p5Z]
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 21 02 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 02:40:07.000 UTC",
#       "not  after"         : "2024-01-16 02:40:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  
r<"`..]rI.w?..ck
#           0010: B8 48 86 50                                        .H.P
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  
..P....'a...eW..
#           0010: 7A 68 92 5C                                        zh.\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.463 
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake 
message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 92 81 33 33 71 47 94 7F   75 6D E3 66 9A 79 FA 32  ..33qG..um.f.y.2
#     0010: B6 A4 F3 09 5F 35 A4 8A   24 13 A4 28 0E 3D B9 FD  ...._5..$..(.=..
#     0020: DC 0D 36 41 FA C2 14 A4   40 E9 7B 3E 02 7C 8F 30  ..6A....@..>...0
#     0030: EA BC C3 9A 11 EC 43 4B   51 58 AF 89 D9 69 5E 52  ......CKQX...i^R
#     0040: 3C BA F3 AC 10 06 EA A2   C2 28 A8 C3 73 CD DB FD  <........(..s...
#     0050: AC 33 98 3D DC 4C F1 C9   F5 54 52 52 C2 08 97 F4  .3.=.L...TRR....
#     0060: 22 68 D3 95 EC 08 47 2E   D8 7D D6 17 7F D5 D0 F3  "h....G.........
#     0070: E5 4C 23 A5 33 DD 3B D1   D5 61 97 C1 C0 CD E6 FA  .L#.3.;..a......
#     0080: BD DC FE 5B 4C 86 F8 F1   F7 4E 9C 06 29 2D DD FD  ...[L....N..)-..
#     0090: 22 EB B9 EF 63 64 84 79   77 A0 AF C9 4D A1 EF 98  "...cd.yw...M...
#     00A0: 84 33 29 52 E3 D6 A0 D2   81 BF 48 DE 56 AB B9 2C  .3)R......H.V..,
#     00B0: 55 97 A5 B4 CB 51 4B 2B   6A 2F C8 28 76 61 87 17  U....QK+j/.(va..
#     00C0: 2A 62 8E AB 4E 64 66 4E   8F 16 F3 34 69 39 F7 82  *b..NdfN...4i9..
#     00D0: B9 C0 4E E3 D6 E9 BF 28   6A 36 AD 12 1C 14 1A 2B  ..N....(j6.....+
#     00E0: 33 8B 1E 29 18 73 3A 79   0B 2F DF 9B 04 6B C1 14  3..).s:y./...k..
#     00F0: B0 4A 1E 2C 73 E7 31 D4   4D 2B 11 20 BE 03 A0 54  .J.,s.1.M+. ...T
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.464 
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D0 A7 B4 DF E8 8F 0F A0   27 2F 9E 57 D0 91 01 64  ........'/.W...d
#     0010: 1E 55 65 C5 C5 25 4E 3F   2A 0A E3 7A DA 75 84 12  .Ue..%N?*..z.u..
#     0020: FD C9 59 7D 16 BF 75 64   66 F7 EB 1B 2B 9B 20 E2  ..Y...udf...+. .
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.464 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.519 
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "0C 40 36 97 E5 0F EE 6D 9C AD 33 E4 5E DA 34 39 
C4 98 48 D0 AE A5 62 F3 3C 1E BA E6 A8 39 CA 84",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 02:40:41.789 
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 02:40:41.790 
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound 
application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-18 02:40:52.794; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 02:40:53.146 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 21 02 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 02:40:07.000 UTC",
#       "not  after"         : "2024-01-16 02:40:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  
r<"`..]rI.w?..ck
#           0010: B8 48 86 50                                        .H.P
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  
..P....'a...eW..
#           0010: 7A 68 92 5C                                        zh.\
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "44 B4 6A 1D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 02:40:06.000 UTC",
#       "not  after"         : "2024-01-16 02:40:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  
r<"`..]rI.w?..ck
#           0010: B8 48 86 50                                        .H.P
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 02:40:53.163 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:53.560 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:53.561 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:53.562 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:53.562 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:53.699 
UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:53.700 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:53.702 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:53.702 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:53.708 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:53.721 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:53.721 
UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:53.721 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:53.724 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "AA 64 FA 89 0C 5B 00 B5 57 DA 08 59 B0 41 FF 39 
9E EC E6 3C 2F 04 34 AA 54 8F 68 DB F7 C4 41 6E",
#     "session id"          : "FD 39 2A D8 03 CB 75 9D 05 56 04 23 AC 25 18 36 
0F B5 60 A4 39 41 06 3A 68 99 0E 47 49 11 7C F5",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, 
ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 68 D9 3C A4 D5 FF 8F AC   BF CA B6 45 FB 36 10 2E  
h.<........E.6..
#               0010: 03 EB 16 69 2E 93 DC 6A   00 A6 CB 68 8E 2E 62 3F  
...i...j...h..b?
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.744 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "DE 65 1C 08 D6 21 13 31 17 61 65 96 2B 20 7E A7 
20 F6 70 86 49 46 F8 FA 60 43 9C 7E 07 05 B8 ED",
#     "session id"          : "FD 39 2A D8 03 CB 75 9D 05 56 04 23 AC 25 18 36 
0F B5 60 A4 39 41 06 3A 68 99 0E 47 49 11 7C F5",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2D 76 D0 28 2D 21 23 F4   E1 7B 4A 56 89 B0 A4 69  
-v.(-!#...JV...i
#             0010: 8E 46 B9 32 5A 38 40 72   E8 78 40 25 29 BA EA 1E  
[email protected]@%)...
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.744 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.744 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.745 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.746 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.746 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.746 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.746 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.746 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.746 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.746 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.749 
UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.749 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.749 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.750 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.750 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.750 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.750 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.750 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.750 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.750 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:53.751 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:53.751 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.751 
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.751 
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.758 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.759 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.761 
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.764 
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake 
message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.764 
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.764 
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.764 
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.765 
UTC|SSLExtensions.java:192|Consumed extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.765 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.765 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:53.765 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:53.765 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.767 
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature 

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#       at 
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#       at 
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#       at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: 
unable to find valid certification path to requested target
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#       at 
java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#       at 
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#       ... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:42:12.251 
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound 
application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:42:12.301 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:42:12.301 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:42:12.302 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:42:12.302 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: 
IOException occurred when talking to server at: 
https://localhost:33476/solr/admin/info/system
#       at 
org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
#       at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
#       at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
#       at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
#       at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
#       at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
#       at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: 
sun.security.provider.certpath.SunCertPathBuilderException: unable to find 
valid certification path to requested target
#       at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
#       at 
java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
#       at 
java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
#       at java.base/java.security.AccessController.doPrivileged(Native Method)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#       at 
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#       at 
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#       at 
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#       at java.base/java.lang.Thread.run(Thread.java:829)
#       Suppressed: java.io.IOException: Broken pipe
#               at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
#               at 
org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
#               at 
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
#               at 
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
#               at 
org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
#               at 
org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
#               at 
org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
#               at 
org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
#               at 
org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
#               at 
org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
#               at 
org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
#               at 
org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
#               at 
org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
#               at 
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
#               ... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building 
failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to 
find valid certification path to requested target
#       at 
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
#       at 
java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
#       at 
java.base/sun.security.validator.Validator.validate(Validator.java:264)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
#       ... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable 
to find valid certification path to requested target
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#       at 
java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#       at 
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#       ... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28209ms
ok 65 stop command for single port in 31824ms
ok 66 status detects locally running solr in 14726ms
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 2222ms
ok 69 copying files around in 6666ms
ok 70 upconfig in 2700ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1217ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1216ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command 
> '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished 
> with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 38s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m3.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' 
'**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such 
file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 
23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to