Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8270/

All tests passed

Build Log:
[...truncated 1165 lines...]
#   ERROR: IOException occurred when talking to server at: 
https://localhost:42183/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: 
/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-29 18:37:56.711; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 18:37:56.715; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. 
"/solr"). Such URLs are deprecated and support for them will be removed in a 
future release. Correcting from [https://127.0.0.1:42183/solr] to 
[https://127.0.0.1:42183].
# WARN  - 2023-10-29 18:37:57.595; org.apache.solr.common.cloud.SolrZkClient; 
Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it 
creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to 
Zookeeper nodes
# WARN  - 2023-10-29 18:37:57.648; org.apache.solr.common.cloud.SolrZkClient; 
Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 
'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16835ms
ok 74 start solr with client truststore and security manager in 19440ms
not ok 75 start solr with mTLS needed in 53166ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-oBkT0n/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 42183 [|]   [/]  
 [-]   [\]   [|]
# Started Solr server on port 42183 (pid=1004208). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 42184 [|] 
  [/]   [-]   [\]   [|]   [/]   [-]   
[\]
# Started Solr server on port 42184 (pid=1004316). Happy searching!
#
#     INFO  - 2023-10-29 18:38:58.939; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 18:38:59.111; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# INFO  - 2023-10-29 18:38:59.939; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@4fad94a7(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for 
Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-oBkT0n/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oBkT0n/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 18:38:59.942; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@3d08f3f5(root,h=[localhost],a=[/127.0.0.1],w=[]) for 
Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-oBkT0n/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oBkT0n/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 18:38:59.943; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@119f1f2a(ca,h=[localhost],a=[],w=[]) for 
Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-oBkT0n/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oBkT0n/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-29 18:39:00.006 
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 0A 10 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 18:38:45.000 UTC",
#     "not  after"         : "2024-01-27 18:38:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 C3 64 CB 4F E4 2D 4F   55 C5 F8 5D D7 5D CD E1  
1.d.O.-OU..].]..
#         0010: 89 DB 21 F0                                        ..!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 65 B9 FF 84 08 FC 3F   23 44 78 6D B9 3C F6 97  
ee.....?#Dxm.<..
#         0010: 82 90 28 CE                                        ..(.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "40 64 6C C7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 18:38:38.000 UTC",
#     "not  after"         : "2024-01-27 18:38:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 33 62 F2 FA 49 40 0A   A2 8C 29 EF F4 ED 8D 2D  
.3b..I@...)....-
#         0010: 98 91 A0 FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 C3 64 CB 4F E4 2D 4F   55 C5 F8 5D D7 5D CD E1  
1.d.O.-OU..].]..
#         0010: 89 DB 21 F0                                        ..!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 18:39:00.010 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B A3 20 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 18:38:36.000 UTC",
#     "not  after"         : "2024-01-27 18:38:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 33 62 F2 FA 49 40 0A   A2 8C 29 EF F4 ED 8D 2D  
.3b..I@...)....-
#         0010: 98 91 A0 FC                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "40 64 6C C7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 18:38:38.000 UTC",
#     "not  after"         : "2024-01-27 18:38:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 33 62 F2 FA 49 40 0A   A2 8C 29 EF F4 ED 8D 2D  
.3b..I@...)....-
#         0010: 98 91 A0 FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 C3 64 CB 4F E4 2D 4F   55 C5 F8 5D D7 5D CD E1  
1.d.O.-OU..].]..
#         0010: 89 DB 21 F0                                        ..!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 18:39:00.023 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 18:39:00.490 
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:00.490 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 18:39:00.492 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 18:39:00.492 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:00.496 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:00.509 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:00.509 
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:00.510 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:00.516 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E5 AA 59 E5 CF D1 48 3F A7 51 0B 59 83 85 69 29 76 
8C 28 01 5D 74 16 02 CA DC D8 46 10 A3 2F 78",
#   "session id"          : "4D C9 DC 89 89 14 C3 93 3B 29 50 0F 36 2F 83 88 2C 
27 F1 20 18 96 B4 27 DE 17 89 DC A8 45 F9 F3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E8 5F 0E E6 34 DC E5 6A   68 2C 91 5F 3E 35 ED 21  
._..4..jh,._>5.!
#             0010: 43 D7 F1 EE 0B 76 D0 0F   3A 93 05 6C C7 AB 1B 7D  
C....v..:..l....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.828 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "58 67 A4 54 D1 63 2A 95 6E 5F C8 F6 DF 1D 42 50 42 
04 06 33 55 53 5B 8D 89 2C 28 1B BF FB DA 89",
#   "session id"          : "4D C9 DC 89 89 14 C3 93 3B 29 50 0F 36 2F 83 88 2C 
27 F1 20 18 96 B4 27 DE 17 89 DC A8 45 F9 F3",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 32 58 D3 D7 8A 39 81 45   ED 8B B5 78 F7 7D CF 3E  
2X...9.E...x...>
#           0010: 7E 63 8E F9 9B 2A B6 0D   BD 66 52 75 61 E3 90 23  
.c...*...fRua..#
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.832 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.832 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.833 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.834 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.834 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.834 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.834 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.834 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.835 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.835 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.838 
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.841 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.841 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.841 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.841 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.841 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.841 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.841 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.842 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.842 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:00.842 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:00.842 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.842 
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.842 
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.862 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.863 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.869 
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.875 
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake 
message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.879 
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.879 
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.882 
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.882 
UTC|SSLExtensions.java:192|Consumed extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.882 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.883 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:00.883 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:00.884 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.886 
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.886 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.886 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.887 
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.898 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.898 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:00.898 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.901 
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message 
(
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C D5 DB 29",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 18:38:41.000 UTC",
#       "not  after"         : "2024-01-27 18:38:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 C3 64 CB 4F E4 2D 4F   55 C5 F8 5D D7 5D CD E1  
1.d.O.-OU..].]..
#           0010: 89 DB 21 F0                                        ..!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4A 37 CC 1E 9F 8F 56 C2   D0 7A 49 32 1F E1 64 34  
J7....V..zI2..d4
#           0010: C9 5B 0D 2D                                        .[.-
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:00.902 
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 18:39:00.979 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 18:39:00.979 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 18:39:00.980 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 18:39:00.980 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:01.025 
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "40 64 6C C7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 18:38:38.000 UTC",
#     "not  after"         : "2024-01-27 18:38:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 33 62 F2 FA 49 40 0A   A2 8C 29 EF F4 ED 8D 2D  
.3b..I@...)....-
#         0010: 98 91 A0 FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 C3 64 CB 4F E4 2D 4F   55 C5 F8 5D D7 5D CD E1  
1.d.O.-OU..].]..
#         0010: 89 DB 21 F0                                        ..!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:01.129 
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 16 56 52 BE 30 84 2B 51   B8 87 62 70 EE 34 E6 F6  .VR.0.+Q..bp.4..
#     0010: 70 26 6D 2E 8C C8 F0 06   74 79 6B 58 88 29 96 E3  p&m.....tykX.)..
#     0020: E4 B5 AE A3 63 44 AB 37   1E 01 79 DE 9B 72 F0 FC  ....cD.7..y..r..
#     0030: 6E 04 B4 84 1E 6C 33 41   37 05 AD FD 6A 70 80 A2  n....l3A7...jp..
#     0040: C0 17 D0 2B C3 BE 52 90   90 EF 5C 09 E5 F9 F6 78  ...+..R...\....x
#     0050: 00 EA 37 8F EB ED DE 8D   95 2E CC B9 FB A3 99 08  ..7.............
#     0060: 52 93 87 A9 E3 EE A5 0F   6E 57 B5 68 09 5E 69 1F  R.......nW.h.^i.
#     0070: 9E 74 7A BD 55 DD 5F 61   01 EA FF C7 D1 60 05 CF  .tz.U._a.....`..
#     0080: E8 D1 C2 DB 16 25 7A 32   42 89 E5 BA 19 59 76 BD  .....%z2B....Yv.
#     0090: F6 BD 71 E3 0A 29 04 F2   74 97 98 9A 07 35 71 76  ..q..)..t....5qv
#     00A0: 22 3B 78 1D 81 B1 38 54   2A 20 19 6C 52 AA E6 DA  ";x...8T* .lR...
#     00B0: A3 17 C6 19 29 A6 CC E5   56 4D 82 C3 7C 83 6D FC  ....)...VM....m.
#     00C0: 38 18 52 89 93 08 90 15   47 3B 9C 67 6B 03 FE 8F  8.R.....G;.gk...
#     00D0: C9 CF A7 71 E0 29 E9 34   B7 B4 39 C8 C5 DE EF 70  ...q.).4..9....p
#     00E0: 12 6A A5 0B 1F 37 6E DC   81 DE 71 10 54 DD D6 10  .j...7n...q.T...
#     00F0: EF 0A C0 EB FD B3 E2 1B   10 97 E6 C5 5E A1 23 10  ............^.#.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:01.377 
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D1 1D 1A 7D A8 1D 23 74   79 6D 36 AF B3 B9 9E C5  ......#tym6.....
#     0010: 58 CF AA 9F 4C 1F FA B7   DB F4 99 32 A9 9D AA 81  X...L......2....
#     0020: 8D 39 7A 31 67 F8 04 1F   97 FE DB C6 DB 35 75 78  .9z1g........5ux
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:01.381 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 18:39:01.384 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:01.384 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 18:39:01.385 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:01.385 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 18:39:01.385 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:01.387 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:01.388 
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:01.389 
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 0A 10 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 18:38:45.000 UTC",
#       "not  after"         : "2024-01-27 18:38:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational 
Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 C3 64 CB 4F E4 2D 4F   55 C5 F8 5D D7 5D CD E1  
1.d.O.-OU..].]..
#           0010: 89 DB 21 F0                                        ..!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 65 B9 FF 84 08 FC 3F   23 44 78 6D B9 3C F6 97  
ee.....?#Dxm.<..
#           0010: 82 90 28 CE                                        ..(.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "40 64 6C C7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 18:38:38.000 UTC",
#       "not  after"         : "2024-01-27 18:38:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F5 33 62 F2 FA 49 40 0A   A2 8C 29 EF F4 ED 8D 2D  
.3b..I@...)....-
#           0010: 98 91 A0 FC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 C3 64 CB 4F E4 2D 4F   55 C5 F8 5D D7 5D CD E1  
1.d.O.-OU..].]..
#           0010: 89 DB 21 F0                                        ..!.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:01.456 
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake 
message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6F 18 75 69 05 CE 7F 04   F5 5C 70 68 01 6E 04 C4  o.ui.....\ph.n..
#     0010: 26 F7 6B 24 DB 87 C5 67   E8 AA 2E 90 15 58 D3 FA  &.k$...g.....X..
#     0020: 7C 8E EF 0B 70 1E 1B AF   41 42 75 F9 24 9E 29 56  ....p...ABu.$.)V
#     0030: BC A9 F9 04 B2 4A FD B9   FA 73 C6 FC 5C 51 D6 41  .....J...s..\Q.A
#     0040: 88 E0 5B CD CF 9A A8 39   BA 0E 8C A2 E6 4B 06 54  ..[....9.....K.T
#     0050: BF C1 47 9C B1 F1 08 05   CD 7C 52 68 A7 E3 76 6B  ..G.......Rh..vk
#     0060: EE 5A EE 29 C9 D3 31 84   B4 E2 62 1C 22 AE B2 4E  .Z.)..1...b."..N
#     0070: 7A A3 69 FC 34 CA 22 50   F0 33 7F 7E FE 69 7A 76  z.i.4."P.3...izv
#     0080: FE 2D 78 B5 1D FA 8B 47   6C 02 BD B1 04 CE C3 18  .-x....Gl.......
#     0090: AC AE A8 03 5A 9A 10 DC   CC 8D B7 83 C8 71 2D B1  ....Z........q-.
#     00A0: F8 69 DE 96 C4 FC F3 17   B5 67 A1 C3 22 4A 43 75  .i.......g.."JCu
#     00B0: 24 8C F8 3D 76 95 59 89   2F C1 34 BD 97 E5 C1 09  $..=v.Y./.4.....
#     00C0: 5E BD 4D 14 91 99 8B 72   3B 45 AA 9B 8D 46 E5 A5  ^.M....r;E...F..
#     00D0: 20 A6 80 EE 0F 25 4B 3D   60 A3 6E C2 B7 92 CB D6   ....%K=`.n.....
#     00E0: D2 A3 88 A1 6E C3 15 2A   0C E7 BE C0 3E A7 06 2A  ....n..*....>..*
#     00F0: 73 84 93 2E D8 D2 38 51   FB FB 0A 96 74 EC 08 08  s.....8Q....t...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:01.457 
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 22 1A 5D EB 8F 43 57 00   B6 0D CE A8 04 88 25 27  ".]..CW.......%'
#     0010: DA 9B D2 51 B0 11 19 17   B7 96 CD 7D 20 D1 59 C8  ...Q........ .Y.
#     0020: BC 52 3A D2 01 53 F7 C2   F4 E3 82 ED 4E 8C A5 B1  .R:..S......N...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:01.458 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:01.568 
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E5 D1 26 99 9D 7C 82 D6 EB CF D1 DA B0 71 03 C1 
40 C9 61 4F 28 11 09 7C B2 7D 1D B5 DB CE CA EB",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-29 18:39:02.311 
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-29 18:39:02.312 
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound 
application data
# INFO  - 2023-10-29 18:39:03.529; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 18:39:03.532; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# INFO  - 2023-10-29 18:39:03.850; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@fd0e5b6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for 
Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-oBkT0n/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oBkT0n/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 18:39:03.852; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for 
Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-oBkT0n/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oBkT0n/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 18:39:03.853; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for 
Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-oBkT0n/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oBkT0n/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-29 18:39:03.887 
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 0A 10 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 18:38:45.000 UTC",
#     "not  after"         : "2024-01-27 18:38:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 C3 64 CB 4F E4 2D 4F   55 C5 F8 5D D7 5D CD E1  
1.d.O.-OU..].]..
#         0010: 89 DB 21 F0                                        ..!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 65 B9 FF 84 08 FC 3F   23 44 78 6D B9 3C F6 97  
ee.....?#Dxm.<..
#         0010: 82 90 28 CE                                        ..(.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "40 64 6C C7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 18:38:38.000 UTC",
#     "not  after"         : "2024-01-27 18:38:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 33 62 F2 FA 49 40 0A   A2 8C 29 EF F4 ED 8D 2D  
.3b..I@...)....-
#         0010: 98 91 A0 FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 C3 64 CB 4F E4 2D 4F   55 C5 F8 5D D7 5D CD E1  
1.d.O.-OU..].]..
#         0010: 89 DB 21 F0                                        ..!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 18:39:03.893 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B A3 20 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 18:38:36.000 UTC",
#     "not  after"         : "2024-01-27 18:38:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 33 62 F2 FA 49 40 0A   A2 8C 29 EF F4 ED 8D 2D  
.3b..I@...)....-
#         0010: 98 91 A0 FC                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "40 64 6C C7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 18:38:38.000 UTC",
#     "not  after"         : "2024-01-27 18:38:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 33 62 F2 FA 49 40 0A   A2 8C 29 EF F4 ED 8D 2D  
.3b..I@...)....-
#         0010: 98 91 A0 FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 C3 64 CB 4F E4 2D 4F   55 C5 F8 5D D7 5D CD E1  
1.d.O.-OU..].]..
#         0010: 89 DB 21 F0                                        ..!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 18:39:03.904 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 18:39:04.062 
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:04.062 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 18:39:04.064 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 18:39:04.064 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:04.068 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:04.078 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:04.078 
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:04.078 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:04.080 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "62 6E 5C 26 E5 40 4E E4 33 4E C5 F8 3C 2C BC C4 75 
3C AF 2C 33 37 3E B1 6E D7 F8 FB 6A 73 6D 32",
#   "session id"          : "00 9F DA 12 A8 CD EC 36 C0 BC A2 83 EB AB CD 29 FE 
30 A1 D1 BB 7A B1 E5 10 85 3A 78 91 79 28 4C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 89 AB 78 76 02 E6 B4 B8   1F 2B 8C 88 F3 4D DD AF  
..xv.....+...M..
#             0010: EB 62 89 F7 97 73 58 53   C8 4D 44 AB EE 4B 32 54  
.b...sXS.MD..K2T
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.161 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E9 13 EB 43 70 9D 8E A8 95 70 95 FB 00 93 13 4C 76 
C6 14 84 30 AB 48 37 0E D3 E0 68 29 18 3E A7",
#   "session id"          : "00 9F DA 12 A8 CD EC 36 C0 BC A2 83 EB AB CD 29 FE 
30 A1 D1 BB 7A B1 E5 10 85 3A 78 91 79 28 4C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: EC 3D 7D D6 5A 99 79 FD   4C 20 F0 0E BA 16 59 43  .=..Z.y.L 
....YC
#           0010: FA EF 5A 6D C9 72 3B 79   42 66 9F 05 AE D4 A3 65  
..Zm.r;yBf.....e
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.162 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.162 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.163 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.164 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.164 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.164 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.164 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.164 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.165 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.165 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.168 
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.174 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.175 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.175 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.175 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.175 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.176 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.176 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.176 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.176 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:04.176 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:04.176 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.177 
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.177 
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.191 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.192 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.197 
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.203 
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake 
message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.203 
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.203 
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.205 
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.205 
UTC|SSLExtensions.java:192|Consumed extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.206 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.206 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:04.206 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:04.206 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.208 
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.209 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.209 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.210 
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.211 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.211 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:04.212 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.221 
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message 
(
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C D5 DB 29",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 18:38:41.000 UTC",
#       "not  after"         : "2024-01-27 18:38:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 C3 64 CB 4F E4 2D 4F   55 C5 F8 5D D7 5D CD E1  
1.d.O.-OU..].]..
#           0010: 89 DB 21 F0                                        ..!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4A 37 CC 1E 9F 8F 56 C2   D0 7A 49 32 1F E1 64 34  
J7....V..zI2..d4
#           0010: C9 5B 0D 2D                                        .[.-
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.221 
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.275 
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "40 64 6C C7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 18:38:38.000 UTC",
#     "not  after"         : "2024-01-27 18:38:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 33 62 F2 FA 49 40 0A   A2 8C 29 EF F4 ED 8D 2D  
.3b..I@...)....-
#         0010: 98 91 A0 FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 C3 64 CB 4F E4 2D 4F   55 C5 F8 5D D7 5D CD E1  
1.d.O.-OU..].]..
#         0010: 89 DB 21 F0                                        ..!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.278 
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7E A7 7D D8 FC 25 77 F0   3B 60 06 50 20 54 1A A3  .....%w.;`.P T..
#     0010: DD 7A 9B 6B 24 96 0F EE   CE B5 8B 03 13 FE BF 9B  .z.k$...........
#     0020: E2 37 3A 90 FF 59 DC EA   45 C0 DB AA 05 6A 25 45  .7:..Y..E....j%E
#     0030: 72 C6 49 BD 0F 58 B3 15   F6 9F 5A 5E F7 34 AF 20  r.I..X....Z^.4.
#     0040: 82 F5 A9 59 CC 40 A5 37   02 27 A8 27 31 83 59 C4  [email protected].'.'1.Y.
#     0050: 0C 1C 4F 4A FC 2F 07 92   B9 2A A4 CF C0 5E BE 78  ..OJ./...*...^.x
#     0060: 0A 16 75 60 34 92 E1 AC   9A A4 9A 46 F4 12 7B F6  ..u`4......F....
#     0070: 3A BF 1E 09 38 E8 CD 84   E6 71 23 95 9D 58 55 43  :...8....q#..XUC
#     0080: 86 05 61 C7 8A 35 FD 75   9C 83 E8 2E D5 32 FB 70  ..a..5.u.....2.p
#     0090: EB DF BF 3A D1 B3 D7 05   8E C7 5A 71 CA 7B 7F 00  ...:......Zq....
#     00A0: 59 49 91 38 A8 08 49 9A   71 3B 40 9C 54 ED C0 E2  YI.8..I.q;@.T...
#     00B0: 23 A0 89 AA BF BB AE 11   54 81 3D FD F9 CD B6 01  #.......T.=.....
#     00C0: 0A 0A E5 3D EA 68 B7 1F   1D E6 D3 6F 31 EE 2B FD  ...=.h.....o1.+.
#     00D0: A6 B1 21 0B D0 E5 4B B5   BE DE 72 C0 45 72 F3 19  ..!...K...r.Er..
#     00E0: 05 89 CE 75 40 CB 33 41   6D 8A 11 C0 52 4A AA A8  
[email protected]..
#     00F0: 16 39 63 34 F3 66 57 39   57 5B C8 55 BA 38 5E CE  .9c4.fW9W[.U.8^.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.281 
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0E A5 A7 55 56 2E D6 11   6E BD 3D 9F 3B D9 0C 4D  ...UV...n.=.;..M
#     0010: 79 BD 74 F8 F4 D4 F1 DD   F2 61 F3 6E 39 77 06 38  y.t......a.n9w.8
#     0020: FD 30 A2 FC 40 7A 19 FE   EC 90 51 BE 9F 9B CF 37  [email protected]
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.282 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 18:39:04.283 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:04.283 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 18:39:04.283 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:04.283 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 18:39:04.283 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:04.283 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.284 
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.285 
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 0A 10 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 18:38:45.000 UTC",
#       "not  after"         : "2024-01-27 18:38:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational 
Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 C3 64 CB 4F E4 2D 4F   55 C5 F8 5D D7 5D CD E1  
1.d.O.-OU..].]..
#           0010: 89 DB 21 F0                                        ..!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 65 B9 FF 84 08 FC 3F   23 44 78 6D B9 3C F6 97  
ee.....?#Dxm.<..
#           0010: 82 90 28 CE                                        ..(.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "40 64 6C C7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 18:38:38.000 UTC",
#       "not  after"         : "2024-01-27 18:38:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F5 33 62 F2 FA 49 40 0A   A2 8C 29 EF F4 ED 8D 2D  
.3b..I@...)....-
#           0010: 98 91 A0 FC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 C3 64 CB 4F E4 2D 4F   55 C5 F8 5D D7 5D CD E1  
1.d.O.-OU..].]..
#           0010: 89 DB 21 F0                                        ..!.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.310 
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake 
message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 62 DF 6F CC 8A 54 3C 00   B6 F8 63 3E C6 4B 1A A7  b.o..T<...c>.K..
#     0010: C5 2A 2B 5A 9F EE FD 00   00 0C C6 61 01 A4 AB 43  .*+Z.......a...C
#     0020: E7 C1 FA A2 19 D6 72 F4   E3 D8 B1 DE 3E 6D 77 EA  ......r.....>mw.
#     0030: 83 84 EB 19 A0 6A C4 5D   93 FE E0 10 F3 AF 9B 37  .....j.].......7
#     0040: 40 48 66 CC 90 6F 32 7E   D3 D1 B0 3C 6C 0C D8 18  @Hf..o2....<l...
#     0050: BA 39 AE 78 7B 0B 7D 7E   9D 54 57 55 53 83 D0 76  .9.x.....TWUS..v
#     0060: E0 48 25 DA 2D BE F3 52   15 42 1D 71 17 A4 95 39  .H%.-..R.B.q...9
#     0070: F8 ED 8C 0E 8A BF 7B 97   08 88 F2 56 45 00 7E 82  ...........VE...
#     0080: 93 45 D3 B4 38 E3 88 DE   5E 27 1D 67 D3 DB 96 1F  .E..8...^'.g....
#     0090: 61 BB 86 E8 D6 81 49 A0   AD D0 20 79 CF 50 62 BD  a.....I... y.Pb.
#     00A0: 95 EC D0 FD 65 37 39 4C   79 80 31 B8 AB 0B E8 B8  ....e79Ly.1.....
#     00B0: 53 A6 5D 60 4D 74 35 FB   7D 42 8D 98 1B EF 34 A6  S.]`Mt5..B....4.
#     00C0: 78 5C D5 15 87 9C E7 39   B7 73 84 F6 A2 77 0D B7  x\.....9.s...w..
#     00D0: 36 FF B4 94 4F BD 2E A1   F1 D9 1A AB 2F 41 92 8E  6...O......./A..
#     00E0: B2 A8 BE A8 80 62 9C 48   C1 F7 57 CC C1 53 F3 48  .....b.H..W..S.H
#     00F0: 5F 48 7F 22 E1 AF 1B C0   98 A2 63 08 E7 52 1A CB  _H."......c..R..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.311 
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C3 D3 6C 60 AC 2F 31 66   17 B8 22 A3 E7 E3 33 48  ..l`./1f.."...3H
#     0010: EC DD 0E D7 5E 80 8E 07   F9 0E 71 96 24 58 1C D5  ....^.....q.$X..
#     0020: 2C 2A 4B A8 5D B5 BA F2   4E D3 0B 67 A1 04 93 59  ,*K.]...N..g...Y
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.312 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:04.600 
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "7D AC 34 8A 89 95 71 D9 03 E0 C7 4D 84 2B 75 C9 
84 BD 80 A2 A5 DB A2 46 D7 CE 47 90 0C C7 71 88",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-29 18:39:04.829 
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-29 18:39:04.829 
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound 
application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 18:39:04.885 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 18:39:04.886 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 18:39:04.886 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 18:39:04.886 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (463 lines):
#   INFO  - 2023-10-29 18:39:18.321; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-29 18:39:18.643 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B A3 20 23",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 18:38:36.000 UTC",
#       "not  after"         : "2024-01-27 18:38:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F5 33 62 F2 FA 49 40 0A   A2 8C 29 EF F4 ED 8D 2D  
.3b..I@...)....-
#           0010: 98 91 A0 FC                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "40 64 6C C7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 18:38:38.000 UTC",
#       "not  after"         : "2024-01-27 18:38:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F5 33 62 F2 FA 49 40 0A   A2 8C 29 EF F4 ED 8D 2D  
.3b..I@...)....-
#           0010: 98 91 A0 FC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 C3 64 CB 4F E4 2D 4F   55 C5 F8 5D D7 5D CD E1  
1.d.O.-OU..].]..
#           0010: 89 DB 21 F0                                        ..!.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-29 18:39:18.654 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 18:39:18.813 
UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:18.813 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 18:39:18.814 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 18:39:18.815 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:18.819 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:18.829 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:18.829 
UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:18.829 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 18:39:18.831 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "1C 2F 51 62 1C AD 90 69 AD 11 1C 1E D6 D6 D6 2A 
13 53 3E 6F FE F7 36 99 F0 AD 3C F8 51 48 25 4D",
#     "session id"          : "A6 A2 3F DC CA 5F D1 42 02 65 06 B5 96 8B A4 81 
F1 DC CA F3 C0 6E CD 54 1F A7 C5 CA 91 69 5E 53",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, 
ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 90 C3 7B 16 B3 75 2C 8C   BD D6 2C CE CB 74 DD 3F  
.....u,...,..t.?
#               0010: 68 A0 20 03 E7 F6 A8 43   5C 22 8F C9 C8 63 BB 3C  h. 
....C\"...c.<
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.851 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "17 F7 0C 56 5A 21 46 92 37 D7 BA EA 7E 05 4E F4 
8A EB C9 32 CE 7C 40 32 00 E7 C8 1E E4 EC FE 12",
#     "session id"          : "A6 A2 3F DC CA 5F D1 42 02 65 06 B5 96 8B A4 81 
F1 DC CA F3 C0 6E CD 54 1F A7 C5 CA 91 69 5E 53",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8F D5 E5 FB D6 87 77 9C   09 FB 64 30 29 EB CB F2  
......w...d0)...
#             0010: 42 8C 84 EE F6 AB C9 C1   DE DE 57 E1 35 6A D5 6E  
B.........W.5j.n
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.851 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.851 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.851 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.852 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.852 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.852 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.852 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.852 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.852 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.852 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.854 
UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.854 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.854 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.854 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.854 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.854 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.855 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.855 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.855 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.855 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:18.855 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:18.855 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.855 
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.855 
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.862 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.863 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.865 
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.867 
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake 
message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.868 
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.868 
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.868 
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.868 
UTC|SSLExtensions.java:192|Consumed extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.868 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.868 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:18.868 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:18.868 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.869 
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.869 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.870 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.870 
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.870 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 18:39:18.871 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:39:18.871 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
certificate_au

[...truncated too long message...]

e.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#       at 
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#       at 
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#       at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: 
unable to find valid certification path to requested target
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#       at 
java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#       at 
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#       ... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 18:40:30.335 
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound 
application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 18:40:30.361 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 18:40:30.362 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 18:40:30.362 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 18:40:30.362 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: 
IOException occurred when talking to server at: 
https://localhost:42184/solr/admin/info/system
#       at 
org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
#       at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
#       at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
#       at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
#       at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
#       at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
#       at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: 
sun.security.provider.certpath.SunCertPathBuilderException: unable to find 
valid certification path to requested target
#       at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
#       at 
java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
#       at 
java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
#       at java.base/java.security.AccessController.doPrivileged(Native Method)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#       at 
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#       at 
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#       at 
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#       at java.base/java.lang.Thread.run(Thread.java:829)
#       Suppressed: java.io.IOException: Broken pipe
#               at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
#               at 
org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
#               at 
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
#               at 
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
#               at 
org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
#               at 
org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
#               at 
org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
#               at 
org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
#               at 
org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
#               at 
org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
#               at 
org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
#               at 
org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
#               at 
org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
#               at 
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
#               ... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building 
failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to 
find valid certification path to requested target
#       at 
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
#       at 
java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
#       at 
java.base/sun.security.validator.Validator.validate(Validator.java:264)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
#       ... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable 
to find valid certification path to requested target
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#       at 
java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#       at 
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#       ... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14099ms
ok 78 stop command for single port in 17248ms
ok 79 status detects locally running solr in 8925ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 
7273ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 996ms
ok 82 listing out files in 3125ms
ok 83 copying files around in 6344ms
ok 84 upconfig in 2528ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1220ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1234ms
ok 87 Cleanup in 2041ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file 
'/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle'
 line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command 
> '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats''
>  finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with 
Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings 
and determine if they come from your own scripts or plugins.

For more on this, please refer to 
https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings
 in the Gradle documentation.

BUILD FAILED in 1h 3m 10s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/b6wl7l4ejrrwe

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to