Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/907/

All tests passed

Build Log:
[...truncated 1227 lines...]
#   ERROR: IOException occurred when talking to server at: 
https://localhost:40073/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: 
/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-29 12:15:28.114; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 12:15:28.119; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# WARN  - 2023-10-29 12:15:29.077; org.apache.solr.common.cloud.SolrZkClient; 
Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it 
creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to 
Zookeeper nodes
# WARN  - 2023-10-29 12:15:29.114; org.apache.solr.common.cloud.SolrZkClient; 
Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 
'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 16932ms
ok 61 start solr with client truststore and security manager in 19492ms
not ok 62 start solr with mTLS needed in 53402ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-IqlTGh/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 40073 [|]   [/]  
 [-]   [\]   [|]
# Started Solr server on port 40073 (pid=4181296). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 40074 [|] 
  [/]   [-]   [\]   [|]   [/]   [-]   
[\]   [|]
# Started Solr server on port 40074 (pid=4181423). Happy searching!
#
#     INFO  - 2023-10-29 12:16:31.519; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 12:16:31.525; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# INFO  - 2023-10-29 12:16:32.169; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@44c79f32(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for 
Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 12:16:32.171; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@475835b1(root,h=[localhost],a=[/127.0.0.1],w=[]) for 
Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 12:16:32.171; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@6326d182(ca,h=[localhost],a=[],w=[]) for 
Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-29 12:16:32.236 
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C EC E8 DD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 12:16:17.000 UTC",
#     "not  after"         : "2024-01-27 12:16:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 07 F7 91 EA E0 8E 66   28 27 AB 02 91 CC 87 1E  
.......f('......
#         0010: 8A 91 A7 AA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F1 8F 1A 61 83 D9 80 A6   4B 3A 46 8A E4 A1 35 46  
...a....K:F...5F
#         0010: 78 77 D1 17                                        xw..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0E E5 06 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 12:16:11.000 UTC",
#     "not  after"         : "2024-01-27 12:16:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 55 94 1B DF 36 15 F3   CD F7 7B 7B D2 EB 2E 98  
.U...6..........
#         0010: 68 EC 8F F5                                        h...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 07 F7 91 EA E0 8E 66   28 27 AB 02 91 CC 87 1E  
.......f('......
#         0010: 8A 91 A7 AA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 12:16:32.244 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0E E5 06 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 12:16:11.000 UTC",
#     "not  after"         : "2024-01-27 12:16:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 55 94 1B DF 36 15 F3   CD F7 7B 7B D2 EB 2E 98  
.U...6..........
#         0010: 68 EC 8F F5                                        h...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 07 F7 91 EA E0 8E 66   28 27 AB 02 91 CC 87 1E  
.......f('......
#         0010: 8A 91 A7 AA                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 1B FE 9C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 12:16:09.000 UTC",
#     "not  after"         : "2024-01-27 12:16:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 55 94 1B DF 36 15 F3   CD F7 7B 7B D2 EB 2E 98  
.U...6..........
#         0010: 68 EC 8F F5                                        h...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 12:16:32.265 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:32.850 
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:32.851 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:32.853 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:32.854 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:32.864 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:32.900 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:32.901 
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:32.901 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:32.903 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "2E 93 EA C5 C1 D1 D7 47 D2 11 96 AA F6 BD A1 C1 CC 
09 8B A7 E3 B8 1F 96 80 FE F2 6E DD 0E 21 48",
#   "session id"          : "8D 02 FA 75 E7 B2 3A A0 92 D3 5E 66 0B 2B 75 92 32 
B4 AC B2 55 11 A8 72 19 8E 10 B2 82 CF E4 3C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B2 09 77 C4 EB DD A1 A2   17 4C 47 B6 FA A9 66 F0  
..w......LG...f.
#             0010: 38 77 3F 35 5A 21 36 C6   E4 06 E5 A5 BA 03 73 73  
8w?5Z!6.......ss
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.549 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FA 0F 0D 70 C0 AD 1D CD 76 8E 62 61 B9 B0 BC 9A E5 
5A 76 30 FE 28 1E E0 36 31 8D 0D E7 E6 32 5A",
#   "session id"          : "8D 02 FA 75 E7 B2 3A A0 92 D3 5E 66 0B 2B 75 92 32 
B4 AC B2 55 11 A8 72 19 8E 10 B2 82 CF E4 3C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 43 43 1E 13 20 46 00 E0   70 9F E3 31 A4 98 C7 7B  CC.. 
F..p..1....
#           0010: C6 3E 33 F0 7D 2F 46 4D   A4 DF C9 84 58 C1 2C 61  
.>3../FM....X.,a
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.549 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.549 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.551 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.551 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.555 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.556 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.556 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.556 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.557 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.557 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.562 
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.567 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.567 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.567 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.568 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.568 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.568 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.568 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.568 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.568 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:33.568 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:33.569 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.569 
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.569 
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.582 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.588 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.589 
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.592 
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake 
message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.592 
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.592 
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.592 
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.593 
UTC|SSLExtensions.java:192|Consumed extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.593 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.593 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:33.593 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:33.593 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.594 
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.594 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.594 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.594 
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.595 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.595 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:33.595 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.610 
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message 
(
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D 73 06 4C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 12:16:13.000 UTC",
#       "not  after"         : "2024-01-27 12:16:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 07 F7 91 EA E0 8E 66   28 27 AB 02 91 CC 87 1E  
.......f('......
#           0010: 8A 91 A7 AA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E5 58 B4 33 BA 9A 98 64   D2 9C FA A4 BB 51 14 BB  
.X.3...d.....Q..
#           0010: 50 DA FF 15                                        P...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.610 
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.725 
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0E E5 06 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 12:16:11.000 UTC",
#     "not  after"         : "2024-01-27 12:16:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 55 94 1B DF 36 15 F3   CD F7 7B 7B D2 EB 2E 98  
.U...6..........
#         0010: 68 EC 8F F5                                        h...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 07 F7 91 EA E0 8E 66   28 27 AB 02 91 CC 87 1E  
.......f('......
#         0010: 8A 91 A7 AA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.733 
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 68 F8 AC B9 CE 6F 39 D3   32 06 8E EB B8 53 C7 DC  h....o9.2....S..
#     0010: 60 56 DA 6E A2 B4 A3 4E   54 B5 FC 77 FF 0D 74 21  `V.n...NT..w..t!
#     0020: 5B 41 41 2C C2 0C F4 74   6E D1 2E 04 04 34 70 2D  [AA,...tn....4p-
#     0030: 9E 4D 49 D2 0E A5 85 36   F2 70 DD D0 5A FE 6D AD  .MI....6.p..Z.m.
#     0040: E6 16 0B B9 9F 4A 34 EB   F6 E5 CF 1E E0 E5 6E C8  .....J4.......n.
#     0050: 3B FB 04 5E 27 B9 54 5F   A5 27 F8 70 44 F1 B4 F7  ;..^'.T_.'.pD...
#     0060: 29 BD 5F 7C 60 69 FC 16   73 57 CD EB F3 D3 4E 40  )._.`i..sW....N@
#     0070: 3B D7 B0 6D 72 49 6D 51   17 5E E2 CA 41 44 DD B5  ;..mrImQ.^..AD..
#     0080: 8B 23 A5 DB 1A E6 8F F0   32 E1 ED F7 C6 74 7F 2B  .#......2....t.+
#     0090: F9 33 43 76 8D 87 E3 9E   D3 C4 3A 30 60 82 65 43  .3Cv......:0`.eC
#     00A0: C3 6D DA 2A 30 43 36 01   6F F9 40 20 A3 50 78 58  .m.*0C6.o.@ .PxX
#     00B0: 2B D6 0F B7 CA 47 24 16   FC DF 43 CE B9 52 96 BE  +....G$...C..R..
#     00C0: 88 58 AA 40 17 F0 04 13   2A AF 99 24 27 EB 6D 84  .X.@....*..$'.m.
#     00D0: AF 4D 9C 69 DE 9D 63 47   EB F8 12 AB 59 A0 76 13  .M.i..cG....Y.v.
#     00E0: BE 3F 21 24 83 7F 32 4A   E6 0C 6B 1B 60 B0 5D 26  .?!$..2J..k.`.]&
#     00F0: A6 CF DB 0A 19 16 EA E7   A2 71 8E EE EA FB CC 67  .........q.....g
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.735 
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F4 83 29 7C 35 9E BF CD   4E 8E 65 1B 8D 7A 5E 22  ..).5...N.e..z^"
#     0010: 33 04 26 0E 68 1C 5F 06   0E 89 1D DF 20 32 0A 1C  3.&.h._..... 2..
#     0020: 80 80 55 08 3E 09 0D 24   D3 66 69 B1 34 09 22 70  ..U.>..$.fi.4."p
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.736 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 12:16:33.737 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:33.737 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 12:16:33.737 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:33.737 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 12:16:33.737 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:33.737 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.738 
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.753 
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C EC E8 DD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 12:16:17.000 UTC",
#       "not  after"         : "2024-01-27 12:16:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational 
Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 07 F7 91 EA E0 8E 66   28 27 AB 02 91 CC 87 1E  
.......f('......
#           0010: 8A 91 A7 AA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F1 8F 1A 61 83 D9 80 A6   4B 3A 46 8A E4 A1 35 46  
...a....K:F...5F
#           0010: 78 77 D1 17                                        xw..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0E E5 06 9D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 12:16:11.000 UTC",
#       "not  after"         : "2024-01-27 12:16:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F5 55 94 1B DF 36 15 F3   CD F7 7B 7B D2 EB 2E 98  
.U...6..........
#           0010: 68 EC 8F F5                                        h...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 07 F7 91 EA E0 8E 66   28 27 AB 02 91 CC 87 1E  
.......f('......
#           0010: 8A 91 A7 AA                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.810 
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake 
message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8F CE B4 15 1A 3B E1 AD   B1 94 FA 91 59 9C 3A 4E  .....;......Y.:N
#     0010: E6 18 8B A8 3D E6 E0 7A   23 AB E8 A5 31 48 60 86  ....=..z#...1H`.
#     0020: ED C0 E3 2F 94 1B 71 4B   07 7A D5 3F 7D C8 C3 A8  .../..qK.z.?....
#     0030: FE 66 6E F3 49 43 11 E3   A9 56 AC E1 CA 69 A4 30  .fn.IC...V...i.0
#     0040: BD FD 97 16 93 E4 8F E3   46 47 50 D1 3C 38 9C 94  ........FGP.<8..
#     0050: 96 6F 60 41 D6 37 E9 CE   17 7B 21 52 0B 85 A3 A0  .o`A.7....!R....
#     0060: 62 81 85 A0 2D B3 42 2B   53 DB 4D B8 65 8D 5B E0  b...-.B+S.M.e.[.
#     0070: 35 6F 8F 23 EF A2 C9 F6   8E A8 74 81 33 6E 7B 7F  5o.#......t.3n..
#     0080: 20 F4 4D 4F 44 6C 1A BD   A5 BF DD BF 53 5F 37 6D   .MODl......S_7m
#     0090: 2F DA 41 D9 FC 93 F6 2C   FF AD 42 C6 8F 7D 8B F4  /.A....,..B.....
#     00A0: 78 AE 6B 76 C7 CD 7E D7   BB FB F1 5E 51 EF 01 DB  x.kv.......^Q...
#     00B0: 2E C3 EC 1E A7 48 28 57   C1 31 A8 1F F4 BE D7 8D  .....H(W.1......
#     00C0: 89 0B 9B 2C 3D 0B E3 AA   BD A7 22 0D 84 83 F6 89  ...,=.....".....
#     00D0: B0 CF 5B 89 41 A6 F5 75   BF F3 72 60 2A 6E C2 49  ..[.A..u..r`*n.I
#     00E0: A8 C0 C6 D5 2D 3C 27 F9   32 5E 4F 70 CF 0A 8B 0B  ....-<'.2^Op....
#     00F0: 69 3A D1 59 79 DC F4 79   64 01 FA 93 1D 24 E5 B0  i:.Yy..yd....$..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.821 
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A1 FC BB BF B8 9A 8F B1   EA 44 D8 EF FA B1 46 24  .........D....F$
#     0010: F3 36 C4 C4 5C 9D D7 C8   72 6E 2E 22 D3 4B 1D C7  .6..\...rn.".K..
#     0020: A5 00 DB F5 CF 78 F8 74   42 C4 10 0A D5 AC 66 8B  .....x.tB.....f.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.821 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:34.252 
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D7 EB 67 9F 0F D7 20 BA 40 25 2E 02 15 8C 0F 57 
2A E9 B2 08 FD 7B 49 39 04 A9 1A 82 59 19 2E 6C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 12:16:34.283 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 12:16:34.284 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 12:16:34.284 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 12:16:34.284 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-29 12:16:34.552 
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-29 12:16:34.553 
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound 
application data
# INFO  - 2023-10-29 12:16:35.472; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 12:16:35.476; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# INFO  - 2023-10-29 12:16:35.827; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for 
Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 12:16:35.829; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for 
Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 12:16:35.829; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for 
Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-29 12:16:35.860 
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C EC E8 DD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 12:16:17.000 UTC",
#     "not  after"         : "2024-01-27 12:16:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 07 F7 91 EA E0 8E 66   28 27 AB 02 91 CC 87 1E  
.......f('......
#         0010: 8A 91 A7 AA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F1 8F 1A 61 83 D9 80 A6   4B 3A 46 8A E4 A1 35 46  
...a....K:F...5F
#         0010: 78 77 D1 17                                        xw..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0E E5 06 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 12:16:11.000 UTC",
#     "not  after"         : "2024-01-27 12:16:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 55 94 1B DF 36 15 F3   CD F7 7B 7B D2 EB 2E 98  
.U...6..........
#         0010: 68 EC 8F F5                                        h...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 07 F7 91 EA E0 8E 66   28 27 AB 02 91 CC 87 1E  
.......f('......
#         0010: 8A 91 A7 AA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 12:16:35.863 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0E E5 06 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 12:16:11.000 UTC",
#     "not  after"         : "2024-01-27 12:16:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 55 94 1B DF 36 15 F3   CD F7 7B 7B D2 EB 2E 98  
.U...6..........
#         0010: 68 EC 8F F5                                        h...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 07 F7 91 EA E0 8E 66   28 27 AB 02 91 CC 87 1E  
.......f('......
#         0010: 8A 91 A7 AA                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 1B FE 9C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 12:16:09.000 UTC",
#     "not  after"         : "2024-01-27 12:16:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 55 94 1B DF 36 15 F3   CD F7 7B 7B D2 EB 2E 98  
.U...6..........
#         0010: 68 EC 8F F5                                        h...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 12:16:35.874 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 12:16:36.150 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 12:16:36.151 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 12:16:36.151 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 12:16:36.151 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:36.186 
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:36.186 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:36.187 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:36.188 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:36.191 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:36.201 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:36.201 
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:36.201 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:36.203 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F3 58 DA 79 77 0B C8 F3 D3 4D F3 76 DE 27 B8 25 3D 
2B 8A 0E 03 BE AC 58 C0 C7 32 81 AF 7B C0 27",
#   "session id"          : "EB F2 03 70 CA C9 1F E7 21 3D 91 90 AD C4 0A 5E 38 
76 D1 0E B4 7A 2B D9 77 3C 76 94 E5 7D 86 5D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 26 78 66 28 A0 4F 9C 42   3F 1E 8F 60 C8 C9 80 3E  
&xf(.O.B?..`...>
#             0010: 33 11 25 10 8B 13 11 B5   B5 DA 02 12 40 AC BA 76  
3.%[email protected]
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.288 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D1 7D 56 C9 15 16 75 12 36 B8 A2 FE D7 1B E0 10 6C 
0C 35 29 2A 10 9A B2 35 3E AC C6 11 30 70 64",
#   "session id"          : "EB F2 03 70 CA C9 1F E7 21 3D 91 90 AD C4 0A 5E 38 
76 D1 0E B4 7A 2B D9 77 3C 76 94 E5 7D 86 5D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C2 17 8B 6E 2B 41 04 BE   87 9C 57 DC 20 CF 55 A5  
...n+A....W. .U.
#           0010: DA 1E F0 46 36 E8 4E 74   4A C3 56 CA 9D AF C6 45  
...F6.NtJ.V....E
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.288 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.289 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.291 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.291 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.291 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.291 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.291 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.291 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.292 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.295 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.302 
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.303 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.303 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.305 
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.316 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.317 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.318 
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake 
message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 
UTC|SSLExtensions.java:192|Consumed extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.331 
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.331 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.436 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.436 
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.437 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.437 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:36.437 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.441 
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message 
(
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D 73 06 4C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 12:16:13.000 UTC",
#       "not  after"         : "2024-01-27 12:16:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 07 F7 91 EA E0 8E 66   28 27 AB 02 91 CC 87 1E  
.......f('......
#           0010: 8A 91 A7 AA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E5 58 B4 33 BA 9A 98 64   D2 9C FA A4 BB 51 14 BB  
.X.3...d.....Q..
#           0010: 50 DA FF 15                                        P...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.441 
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.502 
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0E E5 06 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 12:16:11.000 UTC",
#     "not  after"         : "2024-01-27 12:16:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 55 94 1B DF 36 15 F3   CD F7 7B 7B D2 EB 2E 98  
.U...6..........
#         0010: 68 EC 8F F5                                        h...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 07 F7 91 EA E0 8E 66   28 27 AB 02 91 CC 87 1E  
.......f('......
#         0010: 8A 91 A7 AA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.507 
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7D C6 20 1E 7A 6E A4 8A   18 5A 56 D6 65 1A 4D F6  .. .zn...ZV.e.M.
#     0010: D8 04 44 CF FA F8 BA 8D   50 1B 39 BD FC C4 77 B9  ..D.....P.9...w.
#     0020: 28 26 04 36 44 C2 86 28   96 B2 E4 27 34 43 CC A8  (&.6D..(...'4C..
#     0030: E4 CF 90 E7 2F 23 C5 8A   A4 77 9F FF BA 36 85 FD  ..../#...w...6..
#     0040: E4 76 27 47 6F D0 DC 0B   FE D4 BA E8 53 89 DD E0  .v'Go.......S...
#     0050: 2F 68 18 25 DA CF 14 ED   76 6E FE 33 F2 68 A6 2A  /h.%....vn.3.h.*
#     0060: 39 97 E6 DF C2 35 82 D8   A7 7D 05 44 9C 0C C0 D2  9....5.....D....
#     0070: 7B 70 32 A3 22 39 D0 B8   FA 2B 6D 7E 81 87 2E 27  .p2."9...+m....'
#     0080: 14 0E BD D4 28 84 17 D7   99 3E A8 D2 42 89 8A 7A  ....(....>..B..z
#     0090: 3A 43 9F 1D 83 DB 0B 63   D2 E8 87 F2 7E 9E 6F CF  :C.....c......o.
#     00A0: 70 3A F1 79 69 39 6C 02   89 45 03 14 3D 54 93 C6  p:.yi9l..E..=T..
#     00B0: EB D8 4C 1F E8 83 24 89   2A B1 47 26 A2 66 C7 FA  ..L...$.*.G&.f..
#     00C0: 9C 78 93 4A 2B 4F 11 4E   D8 92 8A 46 A8 FA D4 F2  .x.J+O.N...F....
#     00D0: 0D AC 12 D0 43 BE 09 4D   91 A6 27 10 06 D0 3C 97  ....C..M..'...<.
#     00E0: A3 5A 1F 24 5A 4F D9 66   0B CD 7A A7 AE F6 47 33  .Z.$ZO.f..z...G3
#     00F0: 8F 0E FE 44 40 8A D0 5A   17 B5 5C 1F 26 CE AC F8  [email protected]..\.&...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.509 
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C8 D1 51 8F 17 12 1A E6   5C 73 3E D0 35 1A 52 DD  ..Q.....\s>.5.R.
#     0010: 5D F7 48 5A A5 1A 20 24   20 B7 BA 2C FE BC 8E 9A  ].HZ.. $ ..,....
#     0020: DB B1 6E 9A 7B 4F 02 57   99 76 D0 99 92 62 7F D5  ..n..O.W.v...b..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.511 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 12:16:36.512 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:36.512 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 12:16:36.512 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:36.512 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 12:16:36.512 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:36.512 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.513 
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.516 
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C EC E8 DD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 12:16:17.000 UTC",
#       "not  after"         : "2024-01-27 12:16:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational 
Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 07 F7 91 EA E0 8E 66   28 27 AB 02 91 CC 87 1E  
.......f('......
#           0010: 8A 91 A7 AA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F1 8F 1A 61 83 D9 80 A6   4B 3A 46 8A E4 A1 35 46  
...a....K:F...5F
#           0010: 78 77 D1 17                                        xw..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0E E5 06 9D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 12:16:11.000 UTC",
#       "not  after"         : "2024-01-27 12:16:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F5 55 94 1B DF 36 15 F3   CD F7 7B 7B D2 EB 2E 98  
.U...6..........
#           0010: 68 EC 8F F5                                        h...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 07 F7 91 EA E0 8E 66   28 27 AB 02 91 CC 87 1E  
.......f('......
#           0010: 8A 91 A7 AA                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.546 
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake 
message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 28 EC D2 B6 EC 36 35 74   27 EC BC 80 50 71 06 BC  (....65t'...Pq..
#     0010: E9 95 24 7D E6 2C 80 86   16 6B AD D1 21 36 0C 7C  ..$..,...k..!6..
#     0020: F0 9B 65 B0 CB AF B2 F0   25 91 4A 55 A0 FC 16 26  ..e.....%.JU...&
#     0030: 4D B8 1C 58 B3 02 3C 3B   17 49 F9 12 0C 5E 62 3A  M..X..<;.I...^b:
#     0040: 94 F2 DE 9A 06 B4 9C D7   3E E2 7A 7E 6D E4 64 B0  ........>.z.m.d.
#     0050: 65 23 85 78 4E EA 6E 39   9F 29 DB 7C 71 FC F1 BF  e#.xN.n9.)..q...
#     0060: 4A 65 A8 88 9F 27 C0 A7   8B 25 85 35 BD 1D E1 88  Je...'...%.5....
#     0070: D9 1A EE EE 6E D1 FF 68   22 4D 99 4B C7 D7 4B 00  ....n..h"M.K..K.
#     0080: E8 97 36 07 D8 73 AC 45   AF 0F B9 E3 C9 02 F7 05  ..6..s.E........
#     0090: 08 00 41 D8 5D 41 2A 30   68 96 84 31 75 9C 80 AC  ..A.]A*0h..1u...
#     00A0: 51 33 1A F0 0C 1D E6 82   8D 71 78 34 75 0C D0 D2  Q3.......qx4u...
#     00B0: BE 94 5B C0 0E 55 EB 9D   C8 5C 02 F5 91 7F FC 7E  ..[..U...\......
#     00C0: 73 F1 68 AA 09 23 5F 3F   4E 92 BD 76 9F 2B 28 CD  s.h..#_?N..v.+(.
#     00D0: 3E CC 31 C4 74 2F 01 3C   DA B1 43 B8 E4 52 32 9E  >.1.t/.<..C..R2.
#     00E0: 55 8E 8F 64 0B CA 1D 96   E1 02 8C 94 80 43 ED D1  U..d.........C..
#     00F0: 15 3C 20 35 0E 72 74 B2   F1 AD 46 07 9F 80 26 6C  .< 5.rt...F...&l
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.547 
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DE A6 38 5E BD 0E B1 94   DB 0E F2 9F EB 14 F2 6D  ..8^...........m
#     0010: DE 1F 8C 39 B8 7B 8E 26   11 2D 65 05 FC B9 5D 6C  ...9...&.-e...]l
#     0020: 75 6A CD DF BD DD BA 86   2F F8 CF D8 E0 19 BC D3  uj....../.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.547 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.669 
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "61 2E C9 2E C1 BD 37 1A E4 68 C8 82 23 EA 62 D4 
14 D6 11 8B 54 43 88 AF CD 12 FB 01 13 12 92 A6",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-29 12:16:36.941 
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-29 12:16:36.942 
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound 
application data
# javax.net.ssl|ALL|0E|h2sc-1-thread-2|2023-10-29 12:16:37.076 
UTC|SSLEngineImpl.java:724|Closing inbound of SSLEngine
# javax.net.ssl|ERROR|0E|h2sc-1-thread-2|2023-10-29 12:16:37.076 
UTC|TransportContext.java:345|Fatal (INTERNAL_ERROR): closing inbound before 
receiving peer's close_notify (
# "throwable" : {
#   javax.net.ssl.SSLException: closing inbound before receiving peer's 
close_notify
#       at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:133)
#       at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:340)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:287)
#       at 
java.base/sun.security.ssl.SSLEngineImpl.closeInbound(SSLEngineImpl.java:733)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.closeInbound(SslConnection.java:985)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:769)
#       at 
org.eclipse.jetty.http2.HTTP2Connection.fill(HTTP2Connection.java:164)
#       at 
org.eclipse.jetty.http2.HTTP2Connection$HTTP2Producer.produce(HTTP2Connection.java:368)
#       at 
org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
#       at 
org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
#       at 
org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#       at 
org.eclipse.jetty.http2.HTTP2Connection.produce(HTTP2Connection.java:208)
#       at 
org.eclipse.jetty.http2.HTTP2Connection.onFillable(HTTP2Connection.java:155)
#       at 
org.eclipse.jetty.http2.HTTP2Connection$FillableCallback.succeeded(HTTP2Connection.java:450)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#       at 
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#       at 
org.eclipse.jetty.util.thread.Invocable.invokeNonBlocking(Invocable.java:151)
#       at 
org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.invokeAsNonBlocking(AdaptiveExecutionStrategy.java:438)
#       at 
org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.consumeTask(AdaptiveExecutionStrategy.java:380)
#       at 
org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:277)
#       at 
org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#       at 
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#       at java.base/java.lang.Thread.run(Thread.java:829)}
#
# )
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (463 lines):
#   INFO  - 2023-10-29 12:16:50.346; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-29 12:16:50.648 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0E E5 06 9D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 12:16:11.000 UTC",
#       "not  after"         : "2024-01-27 12:16:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F5 55 94 1B DF 36 15 F3   CD F7 7B 7B D2 EB 2E 98  
.U...6..........
#           0010: 68 EC 8F F5                                        h...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 07 F7 91 EA E0 8E 66   28 27 AB 02 91 CC 87 1E  
.......f('......
#           0010: 8A 91 A7 AA                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "68 1B FE 9C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 12:16:09.000 UTC",
#       "not  after"         : "2024-01-27 12:16:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F5 55 94 1B DF 36 15 F3   CD F7 7B 7B D2 EB 2E 98  
.U...6..........
#           0010: 68 EC 8F F5                                        h...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-29 12:16:50.661 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:50.815 
UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:50.815 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:50.817 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:50.817 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:50.821 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:50.831 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:50.832 
UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:50.832 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:50.833 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "D6 61 A5 52 26 2A 94 0F 92 DE 98 3B 6D F2 ED C4 
1E ED 52 9F 60 78 AB FC 3D 87 24 32 5D 1F E3 B4",
#     "session id"          : "F4 61 68 02 13 16 2D E3 EE 28 E2 93 CA 5B 1F 0F 
33 F5 BC 99 E2 41 0C 4E 3B E6 2C B7 1F 8A 27 B0",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, 
ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 4D CC CC 50 5D 9A 9F 9D   B3 79 80 6E 45 2F D5 7E  
M..P]....y.nE/..
#               0010: 8C 18 A4 0F DA 9D 7C 60   20 69 B3 BD E7 52 9C 4E  
.......` i...R.N
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.857 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "FD 04 A0 1E 21 CE F9 5A A1 28 0C 1E 35 12 48 51 
21 A3 53 40 EA 5D 99 DA 56 79 5D 4C 14 C8 2A 88",
#     "session id"          : "F4 61 68 02 13 16 2D E3 EE 28 E2 93 CA 5B 1F 0F 
33 F5 BC 99 E2 41 0C 4E 3B E6 2C B7 1F 8A 27 B0",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1E 04 78 2C 7A AF E1 8B   16 81 BC 4B EC 6E 7C 86  
..x,z......K.n..
#             0010: AD 5B B1 EA C9 10 70 1E   E6 AC B5 3D EE 26 C3 4E  
.[....p....=.&.N
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.857 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.857 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.858 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.858 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.858 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.858 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.858 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.858 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.858 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.858 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.860 
UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.860 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.860 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.860 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.874 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.875 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.876 
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.880 
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake 
message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.880 
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-2

[...truncated too long message...]

ity.AccessController.doPrivileged(Native Method)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#       at 
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#       at 
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#       at 
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#       at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: 
unable to find valid certification path to requested target
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#       at 
java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#       at 
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#       ... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:18:03.217 
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound 
application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: 
IOException occurred when talking to server at: 
https://localhost:40074/solr/admin/info/system
#       at 
org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
#       at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
#       at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
#       at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
#       at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
#       at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
#       at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: 
sun.security.provider.certpath.SunCertPathBuilderException: unable to find 
valid certification path to requested target
#       at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
#       at 
java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
#       at 
java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
#       at java.base/java.security.AccessController.doPrivileged(Native Method)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#       at 
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#       at 
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#       at 
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#       at java.base/java.lang.Thread.run(Thread.java:829)
#       Suppressed: java.io.IOException: Broken pipe
#               at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
#               at 
org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
#               at 
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
#               at 
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
#               at 
org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
#               at 
org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
#               at 
org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
#               at 
org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
#               at 
org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
#               at 
org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
#               at 
org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
#               at 
org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
#               at 
org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
#               at 
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
#               ... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building 
failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to 
find valid certification path to requested target
#       at 
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
#       at 
java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
#       at 
java.base/sun.security.validator.Validator.validate(Validator.java:264)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
#       ... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable 
to find valid certification path to requested target
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#       at 
java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#       at 
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#       ... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 14487ms
ok 65 stop command for single port in 18506ms
ok 66 status detects locally running solr in 7738ms
ok 67 status does not expose cli parameters to end user in 257ms
ok 68 listing out files in 2815ms
ok 69 copying files around in 6522ms
ok 70 upconfig in 2617ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1229ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1245ms
ok 73 Cleanup in 1265ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file 
'/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle'
 line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command 
> '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats''
>  finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with 
Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings 
and determine if they come from your own scripts or plugins.

See 
https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 1m 24s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/uwkvs5cfmireu

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to