You need to remove the references from bin/solr or bin/solr.cmd to
SOLR_SSL_CLIENT_KEY_STORE and "-Djavax.net.ssl.keyStore". This is different
from solr.in.sh.

The way the bin/solr script is written it is falling back to whatever is
provided as SOLR_SSL_KEY_STORE for the client keystore which is causing
issues.

Kevin Risden



On Wed, Jul 15, 2020 at 3:45 AM Natarajan, Rajeswari <
rajeswari.natara...@sap.com> wrote:

> Thank you for your reply. I looked at solr.in.sh I see that
> SOLR_SSL_CLIENT_KEY_STORE  is already commented out by default. But you are
> right I looked at the running solr,  I see the option
> -Djavax.net.ssl.keyStore pointing to solr-ssl.keystore.p12 , not sure how
> it is getting that value. Let me dig more. Thanks for the pointer. Also if
> you have a pointer how it get's populated  other than
> SOLR_SSL_CLIENT_KEY_STORE config in solr.in.sh , please let me know
>
> #SOLR_SSL_CLIENT_KEY_STORE=
> #SOLR_SSL_CLIENT_KEY_STORE_PASSWORD=
> #SOLR_SSL_CLIENT_KEY_STORE_TYPE=
> #SOLR_SSL_CLIENT_TRUST_STORE=
> #SOLR_SSL_CLIENT_TRUST_STORE_PASSWORD=
> #SOLR_SSL_CLIENT_TRUST_STORE_TYPE=
>
> Yes we are not using Solr client auth.
>
> Thanks,
> Rajeswari
>
> On 7/14/20, 5:55 PM, "Kevin Risden" <kris...@apache.org> wrote:
>
>     Hmmm so I looked closer - it looks like a side effect of the default
>     passthrough of the keystore being passed to the client keystore.
>
>     https://github.com/apache/lucene-solr/blob/master/solr/bin/solr#L229
>
>     Can you remove or commout the entire SOLR_SSL_CLIENT_KEY_STORE section
> from
>     bin/solr or bin/solr.cmd depending on which version you are using? The
> key
>     being to make sure to not set "-Djavax.net.ssl.keyStore".
>
>     This assumes that you aren't using Solr client auth (which based on
> your
>     config you aren't) and you aren't trying to use Solr to connect to
> anything
>     that is secured via clientAuth (most likely you aren't).
>
>     If you can try this and report back that would be awesome. I think this
>     will fix the issue and it would be possible to make client auth opt in
>     instead of default fall back.
>     Kevin Risden
>
>
>
>     On Tue, Jul 14, 2020 at 1:46 AM Natarajan, Rajeswari <
>     rajeswari.natara...@sap.com> wrote:
>
>     > Thank you so much for the response.  Below are the configs I have in
>     > solr.in.sh and I followed
>     > https://lucene.apache.org/solr/guide/8_5/enabling-ssl.html
> documentation
>     >
>     > # Enables HTTPS. It is implicitly true if you set
> SOLR_SSL_KEY_STORE. Use
>     > this config
>     > # to enable https module with custom jetty configuration.
>     > SOLR_SSL_ENABLED=true
>     > # Uncomment to set SSL-related system properties
>     > # Be sure to update the paths to the correct keystore for your
> environment
>     > SOLR_SSL_KEY_STORE=etc/solr-ssl.keystore.p12
>     > SOLR_SSL_KEY_STORE_PASSWORD=secret
>     > SOLR_SSL_TRUST_STORE=etc/solr-ssl.keystore.p12
>     > SOLR_SSL_TRUST_STORE_PASSWORD=secret
>     > # Require clients to authenticate
>     > SOLR_SSL_NEED_CLIENT_AUTH=false
>     > # Enable clients to authenticate (but not require)
>     > SOLR_SSL_WANT_CLIENT_AUTH=false
>     > # SSL Certificates contain host/ip "peer name" information that is
>     > validated by default. Setting
>     > # this to false can be useful to disable these checks when re-using a
>     > certificate on many hosts
>     > SOLR_SSL_CHECK_PEER_NAME=true
>     >
>     > In local , with the below certificate it works
>     > ---------------------------------------
>     >
>     > keytool -list -keystore solr-ssl.keystore.p12
>     > Enter keystore password:
>     > Keystore type: PKCS12
>     > Keystore provider: SUN
>     >
>     > Your keystore contains 1 entry
>     >
>     > solr-18, Jun 26, 2020, PrivateKeyEntry,
>     > Certificate fingerprint (SHA1):
>     > AB:F2:C8:84:E8:E7:A2:BF:2D:0D:2F:D3:95:4A:98:5B:2A:88:81:50
>     > C02W48C6HTD6:solr-8.5.1 i843100$ keytool -list -v -keystore
>     > solr-ssl.keystore.p12
>     > Enter keystore password:
>     > Keystore type: PKCS12
>     > Keystore provider: SUN
>     >
>     > Your keystore contains 1 entry
>     >
>     > Alias name: solr-18
>     > Creation date: Jun 26, 2020
>     > Entry type: PrivateKeyEntry
>     > Certificate chain length: 1
>     > Certificate[1]:
>     > Owner: CN=localhost, OU=Organizational Unit, O=Organization,
> L=Location,
>     > ST=State, C=Country
>     > Issuer: CN=localhost, OU=Organizational Unit, O=Organization,
> L=Location,
>     > ST=State, C=Country
>     > Serial number: 45a822c8
>     > Valid from: Fri Jun 26 00:13:03 PDT 2020 until: Sun Nov 10 23:13:03
> PST
>     > 2047
>     > Certificate fingerprints:
>     >          MD5:  0B:80:54:89:44:65:93:07:1F:81:88:8D:EC:BD:38:41
>     >          SHA1:
> AB:F2:C8:84:E8:E7:A2:BF:2D:0D:2F:D3:95:4A:98:5B:2A:88:81:50
>     >          SHA256:
>     >
> 9D:65:A6:55:D7:22:B2:72:C2:20:55:66:F8:0C:9C:48:B1:F6:48:40:A4:FB:CB:26:77:DE:C4:97:34:69:25:42
>     > Signature algorithm name: SHA256withRSA
>     > Subject Public Key Algorithm: 2048-bit RSA key
>     > Version: 3
>     >
>     > Extensions:
>     >
>     > #1: ObjectId: 2.5.29.17 Criticality=false
>     > SubjectAlternativeName [
>     >   DNSName: localhost
>     >   IPAddress: 172.20.10.4
>     >   IPAddress: 127.0.0.1
>     > ]
>     >
>     > #2: ObjectId: 2.5.29.14 Criticality=false
>     > SubjectKeyIdentifier [
>     > KeyIdentifier [
>     > 0000: 1B 6F BB 65 A4 3C 6A F4   C9 05 08 89 88 0E 9E 76
> .o.e.<j........v
>     > 0010: A1 B7 28 BE                                        ..(.
>     > ]
>     >
>     > /////////////////////////////////////////////////////////////////
>     > In a cluster env , where the deployment  , keystore everything is
>     > automated  (used by  multiple teams) keystore generated is as below.
> As you
>     > can see the  keystore has 2 certificates , in which case I get the
>     > exception  below.
>     >
>     > java.lang.UnsupportedOperationException: X509ExtendedKeyManager only
>     >     > supported on Server
>     >     >               at
>     >     >
>     >
> org.apache.solr.client.solrj.impl.Http2SolrClient.createHttpClient(Http2SolrClient.java:223)
>     >     >
>     >
>     > In both cases , the config is same except the keystore certificates
> . In
>     > the JIRA (https://issues.apache.org/jira/browse/SOLR-14105) , I see
> the
>     > fix says it supports multiple DNS and multiple certificates. So I
> thought
>     > it should be ok. Please let me know .
>     >
>     > keytool -list -keystore  /etc/nginx/certs/sidecar.p12
>     > Picked up JAVA_TOOL_OPTIONS: -Dfile.encoding=UTF8
>     > Enter keystore password:
>     > Keystore type: PKCS12
>     > Keystore provider: SUN
>     >
>     > Your keystore contains 1 entry
>     >
>     > 1, Jul 7, 2020, PrivateKeyEntry,
>     > Certificate fingerprint (SHA1):
>     > E2:3B:4B:4A:0E:05:CF:DA:59:09:55:8D:4E:6D:8A:1D:4E:DD:D4:62
>     > bash-5.0#
>     > ————————-
>     >
>     > bash-5.0#  keytool -list -v -keystore /etc/nginx/certs/sidecar.p12
>     > Picked up JAVA_TOOL_OPTIONS: -Dfile.encoding=UTF8
>     > Enter keystore password:
>     > Keystore type: PKCS12
>     > Keystore provider: SUN
>     >
>     > Your keystore contains 1 entry
>     >
>     > Alias name: 1
>     > Creation date: Jul 7, 2020
>     > Entry type: PrivateKeyEntry
>     > Certificate chain length: 2
>     > Certificate[1]:
>     > Owner: OU=Cobalt, O=SAP, L=Walldorf, ST=Walldorf, C=DE
>     > Issuer: CN=SAP Ariba Cobalt Sidecar Intermediate CA, OU=COBALT, O=SAP
>     > Ariba, ST=CA, C=US
>     > Serial number: 1000
>     > Valid from: Tue Jul 07 05:14:37 GMT 2020 until: Thu Jul 07 05:14:37
> GMT
>     > 2022
>     > Certificate fingerprints:
>     >          MD5:  C0:13:87:37:96:C2:E2:DD:B9:D7:B4:E3:6B:73:A0:EC
>     >          SHA1:
> E2:3B:4B:4A:0E:05:CF:DA:59:09:55:8D:4E:6D:8A:1D:4E:DD:D4:62
>     >          SHA256:
>     >
> 89:AB:8E:3B:D4:EC:A6:D0:0E:D7:CB:65:8C:92:13:32:F2:FD:7E:41:C9:39:F5:66:D5:7D:F1:04:13:8A:4E:92
>     > Signature algorithm name: SHA256withRSA
>     > Subject Public Key Algorithm: 2048-bit RSA key
>     > Version: 3
>     >
>     > Extensions:
>     >
>     > #1: ObjectId: 2.16.840.1.113730.1.13 Criticality=false
>     > 0000: 16 24 4F 70 65 6E 53 53   4C 20 47 65 6E 65 72 61  .$OpenSSL
> Genera
>     > 0010: 74 65 64 20 53 65 72 76   65 72 20 43 65 72 74 69  ted Server
> Certi
>     > 0020: 66 69 63 61 74 65                                  ficate
>     >
>     >
>     > #2: ObjectId: 2.5.29.35 Criticality=false
>     > AuthorityKeyIdentifier [
>     > KeyIdentifier [
>     > 0000: E9 5C 42 72 5E 70 D9 02   05 AA 11 BA 0D 4D 8D 0D
> .\Br^p.......M..
>     > 0010: F3 37 2C 95                                        .7,.
>     > ]
>     > [CN=SAP Ariba Cobalt CA, OU=ES, O=SAP Ariba, L=Palo Alto, ST=CA,
> C=US]
>     > SerialNumber: [    1001]
>     > ]
>     >
>     > #3: ObjectId: 2.5.29.19 Criticality=false
>     > BasicConstraints:[
>     >   CA:false
>     >   PathLen: undefined
>     > ]
>     >
>     > #4: ObjectId: 2.5.29.37 Criticality=false
>     > ExtendedKeyUsages [
>     >   serverAuth
>     > ]
>     >
>     > #5: ObjectId: 2.5.29.15 Criticality=true
>     > KeyUsage [
>     >   DigitalSignature
>     >   Key_Encipherment
>     > ]
>     >
>     > #6: ObjectId: 2.16.840.1.113730.1.1 Criticality=false
>     > NetscapeCertType [
>     >    SSL server
>     > ]
>     >
>     > #7: ObjectId: 2.5.29.17 Criticality=false
>     > SubjectAlternativeName [
>     >   DNSName: search-solrcloud-solrcloud.service
>     >   DNSName: search-solrcloud-solrcloud.service.mu.aws.ariba.com
>     >   DNSName: *.query.mu.aws.ariba.com
>     >   DNSName: *.query
>     >   DNSName: *.service
>     >   DNSName:
>     >
> e046469b-1bb0-55f6-913f-bd6d52b238a8.search-solrcloud-solrcloud.service.mu.aws.ariba.com
>     >   DNSName:
>     >
> e046469b-1bb0-55f6-913f-bd6d52b238a8.search-solrcloud-solrcloud.service
>     >   DNSName: *.service.mu.aws.ariba.com
>     >   DNSName: 1.search-solrcloud-solrcloud.service.mu.aws.ariba.com
>     >   DNSName: 1.search-solrcloud-solrcloud.service
>     >   DNSName: localhost
>     >   IPAddress: 10.1.56.9
>     >   IPAddress: 10.169.50.16
>     >   IPAddress: 127.0.0.1
>     > ]
>     >
>     > #8: ObjectId: 2.5.29.14 Criticality=false
>     > SubjectKeyIdentifier [
>     > KeyIdentifier [
>     > 0000: 3F 9D 3D 24 48 1E 61 3C   BD C0 A4 07 8B 64 51 0D
> ?.=$H.a<.....dQ.
>     > 0010: A2 B2 FE 89                                        ....
>     > ]
>     > ]
>     >
>     > Certificate[2]:
>     > Owner: CN=SAP Ariba Cobalt Sidecar Intermediate CA, OU=COBALT, O=SAP
>     > Ariba, ST=CA, C=US
>     > Issuer: CN=SAP Ariba Cobalt CA, OU=ES, O=SAP Ariba, L=Palo Alto,
> ST=CA,
>     > C=US
>     > Serial number: 1001
>     > Valid from: Thu Apr 16 07:18:55 GMT 2020 until: Sun Apr 14 07:18:55
> GMT
>     > 2030
>     > Certificate fingerprints:
>     >          MD5:  FA:70:2F:DB:63:36:66:71:A6:7B:0F:46:F3:52:0B:3C
>     >          SHA1:
> 4F:27:D3:E3:12:24:64:18:B5:97:D0:BF:94:37:2D:5C:33:EA:1E:40
>     >          SHA256:
>     >
> 15:28:F4:DB:B3:D5:2E:21:6A:2E:56:47:E3:6B:D3:16:96:18:06:96:DA:5D:28:6B:34:CB:6D:FA:E8:FA:85:13
>     > Signature algorithm name: SHA256withRSA
>     > Subject Public Key Algorithm: 4096-bit RSA key
>     > Version: 3
>     >
>     > Extensions:
>     >
>     > #1: ObjectId: 2.5.29.35 Criticality=false
>     > AuthorityKeyIdentifier [
>     > KeyIdentifier [
>     > 0000: D8 A1 D1 11 50 8C 1C 2A   67 69 82 40 DF B5 68 6A  ....P..*gi.@
> ..hj
>     > 0010: E4 97 6E 32                                        ..n2
>     > ]
>     > ]
>     >
>     > #2: ObjectId: 2.5.29.19 Criticality=true
>     > BasicConstraints:[
>     >   CA:true
>     >   PathLen:0
>     > ]
>     >
>     > #3: ObjectId: 2.5.29.15 Criticality=true
>     > KeyUsage [
>     >   DigitalSignature
>     >   Key_CertSign
>     >   Crl_Sign
>     > ]
>     >
>     > #4: ObjectId: 2.5.29.14 Criticality=false
>     > SubjectKeyIdentifier [
>     > KeyIdentifier [
>     > 0000: E9 5C 42 72 5E 70 D9 02   05 AA 11 BA 0D 4D 8D 0D
> .\Br^p.......M..
>     > 0010: F3 37 2C 95                                        .7,.
>     > ]
>     > ]
>     >
>     >
>     > Thanks,
>     > Rajeswari
>     >
>     > On 7/13/20, 2:16 PM, "Kevin Risden" <kris...@apache.org> wrote:
>     >
>     >     >
>     >     > In local with just certificate and one domain name  the SSL
>     > communication
>     >     > worked. With multiple DNS and 2 certificates SSL fails with
> below
>     > exception.
>     >     >
>     >
>     >     A client keystore by definition can only have a single
> certificate. A
>     >     server keystore can have multiple certificates. The reason being
> is
>     > that a
>     >     client can only be identified by a single certificate.
>     >
>     >     Can you share more details about specifically what your
> solr.in.sh
>     > configs
>     >     look like related to keystore/truststore and which files?
> Specifically
>     >     highlight which files have multiple certificates in them.
>     >
>     >     It looks like for the Solr internal http client, the client
> keystore
>     > has
>     >     more than one certificate in it and the error is correct. This
> is more
>     >     strict with recent versions of Jetty 9.4.x. Previously this would
>     > silently
>     >     fail, but was still incorrect. Now the error is bubbled up so
> that
>     > there is
>     >     no silent misconfigurations.
>     >
>     >     Kevin Risden
>     >
>     >
>     >     On Mon, Jul 13, 2020 at 4:54 PM Natarajan, Rajeswari <
>     >     rajeswari.natara...@sap.com> wrote:
>     >
>     >     > I looked at the patch mentioned in the JIRA
>     >     > https://issues.apache.org/jira/browse/SOLR-14105  reporting
> the
>     > below
>     >     > issue. I looked at the solr 8.5.1 code base , I see the patch
> is
>     > applied.
>     >     > But still seeing the same  exception with different stack
> trace. The
>     >     > initial excsption stacktrace was at
>     >     >
>     >     > at
>     >     >
>     >
> org.eclipse.jetty.util.ssl.SslContextFactory.doStart(SslContextFactory.java:245)
>     >     >
>     >     >
>     >     > Now the exception we encounter is at httpsolrclient creation
>     >     >
>     >     >
>     >     >         Caused by: java.lang.RuntimeException:
>     >     > java.lang.UnsupportedOperationException:
> X509ExtendedKeyManager only
>     >     > supported on Server
>     >     >               at
>     >     >
>     >
> org.apache.solr.client.solrj.impl.Http2SolrClient.createHttpClient(Http2SolrClient.java:223)
>     >     >
>     >     > I commented the JIRA also. Let me know if this is still an
> issue.
>     >     >
>     >     > Thanks,
>     >     > Rajeswari
>     >     >
>     >     > On 7/13/20, 2:03 AM, "Natarajan, Rajeswari" <
>     > rajeswari.natara...@sap.com>
>     >     > wrote:
>     >     >
>     >     >     Re-sending to see if anyone encountered  had this
> combination and
>     >     > encountered this issue. In local with just certificate and one
>     > domain name
>     >     > the SSL communication worked. With multiple DNS and 2
> certificates
>     > SSL
>     >     > fails with below exception.  Below JIRA says it is fixed for
>     >     > Http2SolrClient , wondering if this is fixed for http1 solr
> client
>     > as we
>     >     > pass -Dsolr.http1=true .
>     >     >
>     >     >     Thanks,
>     >     >     Rajeswari
>     >     >
>     >     >     https://issues.apache.org/jira/browse/SOLR-14105
>     >     >
>     >     >     On 7/6/20, 10:02 PM, "Natarajan, Rajeswari" <
>     >     > rajeswari.natara...@sap.com> wrote:
>     >     >
>     >     >         Hi,
>     >     >
>     >     >         We are using Solr 8.5.1 in cloud mode  with Java 8. We
> are
>     >     > enabling  TLS  with http1  (as we get a warning java 8 + solr
> 8.5
>     > SSL can’t
>     >     > be enabled) and we get below exception
>     >     >
>     >     >
>     >     >
>     >     >         2020-07-07 03:58:53.078 ERROR (main) [   ]
> o.a.s.c.SolrCore
>     >     > null:org.apache.solr.common.SolrException: Error instantiating
>     >     > shardHandlerFactory class [HttpShardHandlerFactory]:
>     >     > java.lang.UnsupportedOperationException:
> X509ExtendedKeyManager only
>     >     > supported on Server
>     >     >               at
>     >     >
>     >
> org.apache.solr.handler.component.ShardHandlerFactory.newInstance(ShardHandlerFactory.java:56)
>     >     >               at
>     >     > org.apache.solr.core.CoreContainer.load(CoreContainer.java:647)
>     >     >               at
>     >     >
>     >
> org.apache.solr.servlet.SolrDispatchFilter.createCoreContainer(SolrDispatchFilter.java:263)
>     >     >               at
>     >     >
>     >
> org.apache.solr.servlet.SolrDispatchFilter.init(SolrDispatchFilter.java:183)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.servlet.FilterHolder.initialize(FilterHolder.java:134)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.servlet.ServletHandler.lambda$initialize$0(ServletHandler.java:751)
>     >     >               at
>     >     >
>     >
> java.util.Spliterators$ArraySpliterator.forEachRemaining(Spliterators.java:948)
>     >     >               at
>     >     >
>     >
> java.util.stream.Streams$ConcatSpliterator.forEachRemaining(Streams.java:742)
>     >     >               at
>     >     >
>     >
> java.util.stream.Streams$ConcatSpliterator.forEachRemaining(Streams.java:742)
>     >     >               at
>     >     >
>     >
> java.util.stream.ReferencePipeline$Head.forEach(ReferencePipeline.java:580)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.servlet.ServletHandler.initialize(ServletHandler.java:744)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.servlet.ServletContextHandler.startContext(ServletContextHandler.java:360)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.webapp.WebAppContext.startWebapp(WebAppContext.java:1445)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.webapp.WebAppContext.startContext(WebAppContext.java:1409)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.server.handler.ContextHandler.doStart(ContextHandler.java:822)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.servlet.ServletContextHandler.doStart(ServletContextHandler.java:275)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.webapp.WebAppContext.doStart(WebAppContext.java:524)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.deploy.bindings.StandardStarter.processBinding(StandardStarter.java:46)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.deploy.AppLifeCycle.runBindings(AppLifeCycle.java:188)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.deploy.DeploymentManager.requestAppGoal(DeploymentManager.java:513)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.deploy.DeploymentManager.addApp(DeploymentManager.java:154)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.deploy.providers.ScanningAppProvider.fileAdded(ScanningAppProvider.java:173)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.deploy.providers.WebAppProvider.fileAdded(WebAppProvider.java:447)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.deploy.providers.ScanningAppProvider$1.fileAdded(ScanningAppProvider.java:66)
>     >     >               at
>     >     > org.eclipse.jetty.util.Scanner.reportAddition(Scanner.java:784)
>     >     >               at
>     >     >
> org.eclipse.jetty.util.Scanner.reportDifferences(Scanner.java:753)
>     >     >               at
>     > org.eclipse.jetty.util.Scanner.scan(Scanner.java:641)
>     >     >               at
>     > org.eclipse.jetty.util.Scanner.doStart(Scanner.java:540)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.deploy.providers.ScanningAppProvider.doStart(ScanningAppProvider.java:146)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.deploy.DeploymentManager.startAppProvider(DeploymentManager.java:599)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.deploy.DeploymentManager.doStart(DeploymentManager.java:249)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:169)
>     >     >               at
>     > org.eclipse.jetty.server.Server.start(Server.java:407)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:117)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.server.handler.AbstractHandler.doStart(AbstractHandler.java:100)
>     >     >               at
>     > org.eclipse.jetty.server.Server.doStart(Server.java:371)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.xml.XmlConfiguration.lambda$main$0(XmlConfiguration.java:1888)
>     >     >               at
> java.security.AccessController.doPrivileged(Native
>     > Method)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.xml.XmlConfiguration.main(XmlConfiguration.java:1837)
>     >     >               at
> sun.reflect.NativeMethodAccessorImpl.invoke0(Native
>     >     > Method)
>     >     >               at
>     >     >
>     >
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>     >     >               at
>     >     >
>     >
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>     >     >               at
> java.lang.reflect.Method.invoke(Method.java:498)
>     >     >               at
>     > org.eclipse.jetty.start.Main.invokeMain(Main.java:218)
>     >     >               at
> org.eclipse.jetty.start.Main.start(Main.java:491)
>     >     >               at
> org.eclipse.jetty.start.Main.main(Main.java:77)
>     >     >         Caused by: java.lang.RuntimeException:
>     >     > java.lang.UnsupportedOperationException:
> X509ExtendedKeyManager only
>     >     > supported on Server
>     >     >               at
>     >     >
>     >
> org.apache.solr.client.solrj.impl.Http2SolrClient.createHttpClient(Http2SolrClient.java:223)
>     >     >               at
>     >     >
>     >
> org.apache.solr.client.solrj.impl.Http2SolrClient.<init>(Http2SolrClient.java:153)
>     >     >               at
>     >     >
>     >
> org.apache.solr.client.solrj.impl.Http2SolrClient$Builder.build(Http2SolrClient.java:832)
>     >     >               at
>     >     >
>     >
> org.apache.solr.handler.component.HttpShardHandlerFactory.init(HttpShardHandlerFactory.java:321)
>     >     >               at
>     >     >
>     >
> org.apache.solr.handler.component.ShardHandlerFactory.newInstance(ShardHandlerFactory.java:51)
>     >     >               ... 50 more
>     >     >         Caused by: java.lang.UnsupportedOperationException:
>     >     > X509ExtendedKeyManager only supported on Server
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.util.ssl.SslContextFactory.newSniX509ExtendedKeyManager(SslContextFactory.java:1273)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.util.ssl.SslContextFactory.getKeyManagers(SslContextFactory.java:1255)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.util.ssl.SslContextFactory.load(SslContextFactory.java:374)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.util.ssl.SslContextFactory.doStart(SslContextFactory.java:245)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:169)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:117)
>     >     >               at
>     >     >
> org.eclipse.jetty.client.HttpClient.doStart(HttpClient.java:244)
>     >     >               at
>     >     >
>     >
> org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
>     >     >               at
>     >     >
>     >
> org.apache.solr.client.solrj.impl.Http2SolrClient.createHttpClient(Http2SolrClient.java:221)
>     >     >               ... 54 more
>     >     >
>     >     >
>     >     >         I see that there is a  below bug for this issue and is
>     > resolved.
>     >     > So I am not sure what will the cause of the issue.
>     >     >
>     >     >         https://issues.apache.org/jira/browse/SOLR-14105
>     >     >
>     >     >
>     >     >         Thanks,
>     >     >         Rajeswari
>     >     >
>     >     >
>     >     >
>     >
>     >
>
>

Reply via email to