/Users/ingenthr/Library/Java/JavaVirtualMachines/temurin-17.0.9/Contents/Home/bin/java -javaagent:/Applications/IntelliJ IDEA.app/Contents/lib/idea_rt.jar=50262:/Applications/IntelliJ IDEA.app/Contents/bin -Dfile.encoding=UTF-8 -classpath /Users/ingenthr/src/cngateway-demo-client/target/classes:/Users/ingenthr/.m2/repository/com/couchbase/client/java-client/3.5.2/java-client-3.5.2.jar:/Users/ingenthr/.m2/repository/com/couchbase/client/core-io/2.5.2/core-io-2.5.2.jar:/Users/ingenthr/.m2/repository/io/projectreactor/reactor-core/3.5.8/reactor-core-3.5.8.jar:/Users/ingenthr/.m2/repository/org/reactivestreams/reactive-streams/1.0.4/reactive-streams-1.0.4.jar:/Users/ingenthr/.m2/repository/ch/qos/logback/logback-classic/1.4.7/logback-classic-1.4.7.jar:/Users/ingenthr/.m2/repository/ch/qos/logback/logback-core/1.4.7/logback-core-1.4.7.jar:/Users/ingenthr/.m2/repository/org/slf4j/slf4j-api/2.0.4/slf4j-api-2.0.4.jar:/Users/ingenthr/.m2/repository/io/opentelemetry/opentelemetry-api/1.31.0/opentelemetry-api-1.31.0.jar:/Users/ingenthr/.m2/repository/io/opentelemetry/opentelemetry-context/1.31.0/opentelemetry-context-1.31.0.jar com.couchbase.sdk.demo.Main 2024-01-12T18:50:47,709Z [main] DEBUG reactor.util.Loggers - Using Slf4j logging framework 2024-01-12T18:50:47,755Z [main] DEBUG c.c.c.c.d.i.n.u.i.l.InternalLoggerFactory - Using SLF4J as the default logging framework 2024-01-12T18:50:47,756Z [main] DEBUG c.c.c.c.d.i.n.u.ResourceLeakDetector - -Dcom.couchbase.client.core.deps.io.netty.leakDetection.level: simple 2024-01-12T18:50:47,756Z [main] DEBUG c.c.c.c.d.i.n.u.ResourceLeakDetector - -Dcom.couchbase.client.core.deps.io.netty.leakDetection.targetRecords: 4 2024-01-12T18:50:47,758Z [main] DEBUG c.c.c.c.d.i.n.u.ResourceLeakDetectorFactory - Loaded default ResourceLeakDetector: com.couchbase.client.core.deps.io.netty.util.ResourceLeakDetector@53fb3dab 2024-01-12T18:50:47,765Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent0 - -Dio.netty.noUnsafe: false 2024-01-12T18:50:47,765Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent0 - Java version: 17 2024-01-12T18:50:47,765Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent0 - sun.misc.Unsafe.theUnsafe: available 2024-01-12T18:50:47,765Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent0 - sun.misc.Unsafe.copyMemory: available 2024-01-12T18:50:47,765Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent0 - sun.misc.Unsafe.storeFence: available 2024-01-12T18:50:47,765Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent0 - java.nio.Buffer.address: available 2024-01-12T18:50:47,766Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent0 - direct buffer constructor: unavailable: Reflective setAccessible(true) disabled 2024-01-12T18:50:47,766Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent0 - java.nio.Bits.unaligned: available, true 2024-01-12T18:50:47,766Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent0 - jdk.internal.misc.Unsafe.allocateUninitializedArray(int): unavailable: class com.couchbase.client.core.deps.io.netty.util.internal.PlatformDependent0$7 cannot access class jdk.internal.misc.Unsafe (in module java.base) because module java.base does not export jdk.internal.misc to unnamed module @353d0772 2024-01-12T18:50:47,767Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent0 - java.nio.DirectByteBuffer.(long, {int,long}): unavailable 2024-01-12T18:50:47,767Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent - sun.misc.Unsafe: available 2024-01-12T18:50:47,767Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent - -Dio.netty.tmpdir: /var/folders/n_/4ywp81rn3gd451_nldz6flbc0000gr/T (java.io.tmpdir) 2024-01-12T18:50:47,767Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent - -Dio.netty.bitMode: 64 (sun.arch.data.model) 2024-01-12T18:50:47,767Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent - Platform: MacOS 2024-01-12T18:50:47,768Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent - -Dio.netty.maxDirectMemory: -1 bytes 2024-01-12T18:50:47,768Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent - -Dio.netty.uninitializedArrayAllocationThreshold: -1 2024-01-12T18:50:47,768Z [main] DEBUG c.c.c.c.d.i.n.u.i.CleanerJava9 - java.nio.ByteBuffer.cleaner(): available 2024-01-12T18:50:47,768Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent - -Dio.netty.noPreferDirect: false 2024-01-12T18:50:47,771Z [main] DEBUG c.c.c.c.d.i.n.u.i.PlatformDependent - com.couchbase.client.core.deps.org.jctools-core.MpscChunkedArrayQueue: available 2024-01-12T18:50:47,829Z [main] DEBUG c.c.c.c.d.i.n.u.i.NativeLibraryLoader - -Dio.netty.native.workdir: /var/folders/n_/4ywp81rn3gd451_nldz6flbc0000gr/T (io.netty.tmpdir) 2024-01-12T18:50:47,829Z [main] DEBUG c.c.c.c.d.i.n.u.i.NativeLibraryLoader - -Dio.netty.native.deleteLibAfterLoading: true 2024-01-12T18:50:47,829Z [main] DEBUG c.c.c.c.d.i.n.u.i.NativeLibraryLoader - -Dio.netty.native.tryPatchShadedId: true 2024-01-12T18:50:47,829Z [main] DEBUG c.c.c.c.d.i.n.u.i.NativeLibraryLoader - -Dio.netty.native.detectNativeLibraryDuplicates: true 2024-01-12T18:50:47,872Z [main] DEBUG c.c.c.c.d.i.n.u.i.NativeLibraryLoader - Execution of 'install_name_tool -id FkPewpKEY3oVIXFRw9ErjbIRfny0bGv85Q9A8D /var/folders/n_/4ywp81rn3gd451_nldz6flbc0000gr/T/libcom_couchbase_client_core_deps_netty_transport_native_kqueue_aarch_644239849935758046811.dylib' succeed: 0 2024-01-12T18:50:47,897Z [main] DEBUG c.c.c.c.d.i.n.u.i.NativeLibraryLoader - Execution of 'codesign -s - /var/folders/n_/4ywp81rn3gd451_nldz6flbc0000gr/T/libcom_couchbase_client_core_deps_netty_transport_native_kqueue_aarch_644239849935758046811.dylib' succeed: 0 2024-01-12T18:50:48,286Z [main] DEBUG c.c.c.c.d.i.n.u.i.NativeLibraryLoader - Successfully loaded the library /var/folders/n_/4ywp81rn3gd451_nldz6flbc0000gr/T/libcom_couchbase_client_core_deps_netty_transport_native_kqueue_aarch_644239849935758046811.dylib 2024-01-12T18:50:48,288Z [main] DEBUG c.c.c.c.deps.io.netty.util.NetUtil - -Djava.net.preferIPv4Stack: false 2024-01-12T18:50:48,288Z [main] DEBUG c.c.c.c.deps.io.netty.util.NetUtil - -Djava.net.preferIPv6Addresses: false 2024-01-12T18:50:48,291Z [main] DEBUG c.c.c.c.d.i.n.u.NetUtilInitializations - Loopback interface: lo0 (lo0, 0:0:0:0:0:0:0:1%lo0) 2024-01-12T18:50:48,291Z [main] DEBUG c.c.c.c.deps.io.netty.util.NetUtil - Failed to get SOMAXCONN from sysctl and file /proc/sys/net/core/somaxconn. Default: 128 2024-01-12T18:50:48,293Z [main] DEBUG c.c.c.c.d.i.n.c.MultithreadEventLoopGroup - -Dio.netty.eventLoopThreads: 20 2024-01-12T18:50:48,295Z [main] DEBUG c.c.c.c.d.i.n.u.c.GlobalEventExecutor - -Dio.netty.globalEventExecutor.quietPeriodSeconds: 1 2024-01-12T18:50:48,297Z [main] DEBUG c.c.c.c.d.i.n.u.i.InternalThreadLocalMap - -Dio.netty.threadLocalMap.stringBuilder.initialSize: 1024 2024-01-12T18:50:48,297Z [main] DEBUG c.c.c.c.d.i.n.u.i.InternalThreadLocalMap - -Dio.netty.threadLocalMap.stringBuilder.maxSize: 4096 2024-01-12T18:50:48,307Z [main] DEBUG c.c.c.c.d.i.n.buffer.AbstractByteBuf - -Dcom.couchbase.client.core.deps.io.netty.buffer.checkAccessible: true 2024-01-12T18:50:48,307Z [main] DEBUG c.c.c.c.d.i.n.buffer.AbstractByteBuf - -Dcom.couchbase.client.core.deps.io.netty.buffer.checkBounds: true 2024-01-12T18:50:48,307Z [main] DEBUG c.c.c.c.d.i.n.u.ResourceLeakDetectorFactory - Loaded default ResourceLeakDetector: com.couchbase.client.core.deps.io.netty.util.ResourceLeakDetector@5ce8d869 2024-01-12T18:50:48,451Z [main] DEBUG c.c.c.c.d.i.n.u.i.NativeLibraryLoader - Execution of 'install_name_tool -id INabp5NkW7iMnytqqk9QDY7O1p6 /var/folders/n_/4ywp81rn3gd451_nldz6flbc0000gr/T/libcom_couchbase_client_core_deps_netty_tcnative_osx_aarch_6415482899279056983536.dylib' succeed: 0 2024-01-12T18:50:48,474Z [main] DEBUG c.c.c.c.d.i.n.u.i.NativeLibraryLoader - Execution of 'codesign -s - /var/folders/n_/4ywp81rn3gd451_nldz6flbc0000gr/T/libcom_couchbase_client_core_deps_netty_tcnative_osx_aarch_6415482899279056983536.dylib' succeed: 0 2024-01-12T18:50:48,631Z [main] DEBUG c.c.c.c.d.i.n.u.i.NativeLibraryLoader - Successfully loaded the library /var/folders/n_/4ywp81rn3gd451_nldz6flbc0000gr/T/libcom_couchbase_client_core_deps_netty_tcnative_osx_aarch_6415482899279056983536.dylib 2024-01-12T18:50:48,632Z [main] DEBUG c.c.c.c.d.i.n.u.i.NativeLibraryLoader - Loaded library with name 'netty_tcnative_osx_aarch_64' 2024-01-12T18:50:48,632Z [main] DEBUG c.c.c.c.d.i.n.handler.ssl.OpenSsl - Initialize netty-tcnative using engine: 'default' 2024-01-12T18:50:48,632Z [main] DEBUG c.c.c.c.d.i.n.handler.ssl.OpenSsl - netty-tcnative using native library: BoringSSL 2024-01-12T18:50:48,685Z [main] DEBUG c.c.c.c.d.i.n.b.PooledByteBufAllocator - -Dio.netty.allocator.numHeapArenas: 20 2024-01-12T18:50:48,685Z [main] DEBUG c.c.c.c.d.i.n.b.PooledByteBufAllocator - -Dio.netty.allocator.numDirectArenas: 20 2024-01-12T18:50:48,685Z [main] DEBUG c.c.c.c.d.i.n.b.PooledByteBufAllocator - -Dio.netty.allocator.pageSize: 8192 2024-01-12T18:50:48,685Z [main] DEBUG c.c.c.c.d.i.n.b.PooledByteBufAllocator - -Dio.netty.allocator.maxOrder: 9 2024-01-12T18:50:48,685Z [main] DEBUG c.c.c.c.d.i.n.b.PooledByteBufAllocator - -Dio.netty.allocator.chunkSize: 4194304 2024-01-12T18:50:48,685Z [main] DEBUG c.c.c.c.d.i.n.b.PooledByteBufAllocator - -Dio.netty.allocator.smallCacheSize: 256 2024-01-12T18:50:48,685Z [main] DEBUG c.c.c.c.d.i.n.b.PooledByteBufAllocator - -Dio.netty.allocator.normalCacheSize: 64 2024-01-12T18:50:48,685Z [main] DEBUG c.c.c.c.d.i.n.b.PooledByteBufAllocator - -Dio.netty.allocator.maxCachedBufferCapacity: 32768 2024-01-12T18:50:48,685Z [main] DEBUG c.c.c.c.d.i.n.b.PooledByteBufAllocator - -Dio.netty.allocator.cacheTrimInterval: 8192 2024-01-12T18:50:48,685Z [main] DEBUG c.c.c.c.d.i.n.b.PooledByteBufAllocator - -Dio.netty.allocator.cacheTrimIntervalMillis: 0 2024-01-12T18:50:48,685Z [main] DEBUG c.c.c.c.d.i.n.b.PooledByteBufAllocator - -Dio.netty.allocator.useCacheForAllThreads: false 2024-01-12T18:50:48,685Z [main] DEBUG c.c.c.c.d.i.n.b.PooledByteBufAllocator - -Dio.netty.allocator.maxCachedByteBuffersPerChunk: 1023 2024-01-12T18:50:48,689Z [main] DEBUG c.c.c.c.d.i.netty.buffer.ByteBufUtil - -Dio.netty.allocator.type: pooled 2024-01-12T18:50:48,689Z [main] DEBUG c.c.c.c.d.i.netty.buffer.ByteBufUtil - -Dio.netty.threadLocalDirectBufferSize: 0 2024-01-12T18:50:48,689Z [main] DEBUG c.c.c.c.d.i.netty.buffer.ByteBufUtil - -Dio.netty.maxThreadLocalCharBufferSize: 16384 2024-01-12T18:50:48,691Z [main] DEBUG c.c.c.c.d.i.n.u.ResourceLeakDetectorFactory - Loaded default ResourceLeakDetector: com.couchbase.client.core.deps.io.netty.util.ResourceLeakDetector@24f43aa3 2024-01-12T18:50:48,693Z [main] DEBUG c.c.c.c.deps.io.netty.util.Recycler - -Dio.netty.recycler.maxCapacityPerThread: 4096 2024-01-12T18:50:48,693Z [main] DEBUG c.c.c.c.deps.io.netty.util.Recycler - -Dio.netty.recycler.ratio: 8 2024-01-12T18:50:48,693Z [main] DEBUG c.c.c.c.deps.io.netty.util.Recycler - -Dio.netty.recycler.chunkSize: 32 2024-01-12T18:50:48,693Z [main] DEBUG c.c.c.c.deps.io.netty.util.Recycler - -Dio.netty.recycler.blocking: false 2024-01-12T18:50:48,693Z [main] DEBUG c.c.c.c.deps.io.netty.util.Recycler - -Dio.netty.recycler.batchFastThreadLocalOnly: true 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 => ECDHE-ECDSA-AES128-GCM-SHA256 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 => ECDHE-ECDSA-AES128-GCM-SHA256 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 => ECDHE-RSA-AES128-GCM-SHA256 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_ECDHE_RSA_WITH_AES_128_GCM_SHA256 => ECDHE-RSA-AES128-GCM-SHA256 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 => ECDHE-ECDSA-AES256-GCM-SHA384 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 => ECDHE-ECDSA-AES256-GCM-SHA384 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 => ECDHE-RSA-AES256-GCM-SHA384 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384 => ECDHE-RSA-AES256-GCM-SHA384 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 => ECDHE-ECDSA-CHACHA20-POLY1305 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 => ECDHE-ECDSA-CHACHA20-POLY1305 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 => ECDHE-RSA-CHACHA20-POLY1305 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 => ECDHE-RSA-CHACHA20-POLY1305 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 => ECDHE-PSK-CHACHA20-POLY1305 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 => ECDHE-PSK-CHACHA20-POLY1305 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA => ECDHE-ECDSA-AES128-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA => ECDHE-ECDSA-AES128-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA => ECDHE-RSA-AES128-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA => ECDHE-RSA-AES128-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA => ECDHE-PSK-AES128-CBC-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_ECDHE_PSK_WITH_AES_128_CBC_SHA => ECDHE-PSK-AES128-CBC-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA => ECDHE-ECDSA-AES256-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA => ECDHE-ECDSA-AES256-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA => ECDHE-RSA-AES256-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA => ECDHE-RSA-AES256-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA => ECDHE-PSK-AES256-CBC-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_ECDHE_PSK_WITH_AES_256_CBC_SHA => ECDHE-PSK-AES256-CBC-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_RSA_WITH_AES_128_GCM_SHA256 => AES128-GCM-SHA256 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_RSA_WITH_AES_128_GCM_SHA256 => AES128-GCM-SHA256 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_RSA_WITH_AES_256_GCM_SHA384 => AES256-GCM-SHA384 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_RSA_WITH_AES_256_GCM_SHA384 => AES256-GCM-SHA384 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_RSA_WITH_AES_128_CBC_SHA => AES128-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_RSA_WITH_AES_128_CBC_SHA => AES128-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_PSK_WITH_AES_128_CBC_SHA => PSK-AES128-CBC-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_PSK_WITH_AES_128_CBC_SHA => PSK-AES128-CBC-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_RSA_WITH_AES_256_CBC_SHA => AES256-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_RSA_WITH_AES_256_CBC_SHA => AES256-SHA 2024-01-12T18:50:48,698Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_PSK_WITH_AES_256_CBC_SHA => PSK-AES256-CBC-SHA 2024-01-12T18:50:48,699Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_PSK_WITH_AES_256_CBC_SHA => PSK-AES256-CBC-SHA 2024-01-12T18:50:48,699Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: TLS_RSA_WITH_3DES_EDE_CBC_SHA => DES-CBC3-SHA 2024-01-12T18:50:48,699Z [main] DEBUG c.c.c.c.d.i.n.h.s.CipherSuiteConverter - Cipher suite mapping: SSL_RSA_WITH_3DES_EDE_CBC_SHA => DES-CBC3-SHA 2024-01-12T18:50:48,699Z [main] DEBUG c.c.c.c.d.i.n.handler.ssl.OpenSsl - Supported protocols (OpenSSL): [SSLv2Hello, TLSv1, TLSv1.1, TLSv1.2, TLSv1.3] 2024-01-12T18:50:48,699Z [main] DEBUG c.c.c.c.d.i.n.handler.ssl.OpenSsl - Default cipher suites (OpenSSL): [TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384, TLS_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384, TLS_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256] 2024-01-12T18:50:48,733Z [main] DEBUG c.c.c.c.d.i.n.c.nio.NioEventLoop - -Dio.netty.noKeySetOptimization: false 2024-01-12T18:50:48,733Z [main] DEBUG c.c.c.c.d.i.n.c.nio.NioEventLoop - -Dio.netty.selectorAutoRebuildThreshold: 512 2024-01-12T18:50:48,785Z [main] INFO com.couchbase.core - [CoreCreatedEvent] {"connectionString":"couchbase2://localhost","coreId":"0xb779dc3600000001"} {"clientVersion":"3.5.2","clientGitHash":"${buildNumber}","coreVersion":"2.5.2","coreGitHash":"${buildNumber}","userAgent":"couchbase-java/3.5.2 (Mac OS X 13.6.3 aarch64; OpenJDK 64-Bit Server VM 17.0.9+9)","maxNumRequestsInRetry":32768,"ioEnvironment":{"nativeIoEnabled":true,"eventLoopThreadCount":5,"eventLoopGroups":["KQueueEventLoopGroup"]},"ioConfig":{"captureTraffic":[],"mutationTokensEnabled":true,"networkResolution":"auto","dnsSrvEnabled":true,"tcpKeepAlivesEnabled":true,"tcpKeepAliveTimeMs":60000,"configPollIntervalMs":2500,"kvCircuitBreakerConfig":"disabled","queryCircuitBreakerConfig":"disabled","viewCircuitBreakerConfig":"disabled","searchCircuitBreakerConfig":"disabled","analyticsCircuitBreakerConfig":"disabled","managerCircuitBreakerConfig":"disabled","eventingCircuitBreakerConfig":"disabled","backupCircuitBreakerConfig":"disabled","numKvConnections":1,"maxHttpConnections":12,"idleHttpConnectionTimeoutMs":1000,"configIdleRedialTimeoutMs":300000,"memcachedHashingStrategy":"StandardMemcachedHashingStrategy","timerConfig":{"numTimers":1,"tickDurationMs":10,"numBuckets":512}},"compressionConfig":{"enabled":true,"minRatio":0.83,"minSize":32},"securityConfig":{"tlsEnabled":true,"nativeTlsEnabled":true,"hostnameVerificationEnabled":true,"trustCertificates":"[OU=Cloud, O=Couchbase (valid from 2019-12-06T22:12:59Z to 2029-12-06T23:12:59Z), CN=Trustwave Global ECC P256 Certification Authority, O=\"Trustwave Holdings, Inc.\", L=Chicago, ST=Illinois, C=US (valid from 2017-08-23T19:35:10Z to 2042-08-23T19:35:10Z), CN=Certainly Root E1, O=Certainly, C=US (valid from 2021-04-01T00:00:00Z to 2046-04-01T00:00:00Z), CN=Entrust Root Certification Authority - EC1, OU=\"(c) 2012 Entrust, Inc. - for authorized use only\", OU=See www.entrust.net/legal-terms, O=\"Entrust, Inc.\", C=US (valid from 2012-12-18T15:25:36Z to 2037-12-18T15:55:36Z), CN=SecureTrust CA, O=SecureTrust Corporation, C=US (valid from 2006-11-07T19:31:18Z to 2029-12-31T19:40:55Z), CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US (valid from 2006-11-10T00:00:00Z to 2031-11-10T00:00:00Z), OU=Security Communication RootCA1, O=SECOM Trust.net, C=JP (valid from 2003-09-30T04:20:49Z to 2023-09-30T04:20:49Z), CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM (valid from 2012-01-12T18:59:32Z to 2042-01-12T18:59:32Z), CN=Hellenic Academic and Research Institutions RootCA 2015, O=Hellenic Academic and Research Institutions Cert. Authority, L=Athens, C=GR (valid from 2015-07-07T10:11:21Z to 2040-06-30T10:11:21Z), CN=Autoridad de Certificacion Firmaprofesional CIF A62634068, C=ES (valid from 2014-09-23T15:22:07Z to 2036-05-05T15:22:07Z), CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US (valid from 2013-08-01T12:00:00Z to 2038-01-15T12:00:00Z), CN=Hellenic Academic and Research Institutions ECC RootCA 2015, O=Hellenic Academic and Research Institutions Cert. Authority, L=Athens, C=GR (valid from 2015-07-07T10:37:12Z to 2040-06-30T10:37:12Z), OU=Security Communication RootCA2, O=\"SECOM Trust Systems CO.,LTD.\", C=JP (valid from 2009-05-29T05:00:39Z to 2029-05-29T05:00:39Z), CN=emSign ECC Root CA - G3, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN (valid from 2018-02-18T18:30:00Z to 2043-02-18T18:30:00Z), OU=ePKI Root Certification Authority, O=\"Chunghwa Telecom Co., Ltd.\", C=TW (valid from 2004-12-20T02:31:27Z to 2034-12-20T02:31:27Z), CN=AffirmTrust Commercial, O=AffirmTrust, C=US (valid from 2010-01-29T14:06:06Z to 2030-12-31T14:06:06Z), CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL (valid from 2008-10-22T12:07:37Z to 2029-12-31T12:07:37Z), CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS, OID.2.5.4.97=VATES-Q2826004J, OU=Ceres, O=FNMT-RCM, C=ES (valid from 2018-12-20T09:37:33Z to 2043-12-20T09:37:33Z), CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, OU=www.xrampsecurity.com, C=US (valid from 2004-11-01T17:14:04Z to 2035-01-01T05:37:19Z), CN=D-TRUST EV Root CA 1 2020, O=D-Trust GmbH, C=DE (valid from 2020-02-11T10:00:00Z to 2035-02-11T09:59:59Z), CN=emSign Root CA - G1, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN (valid from 2018-02-18T18:30:00Z to 2043-02-18T18:30:00Z), CN=Trustwave Global Certification Authority, O=\"Trustwave Holdings, Inc.\", L=Chicago, ST=Illinois, C=US (valid from 2017-08-23T19:34:12Z to 2042-08-23T19:34:12Z), CN=Entrust Root Certification Authority - G4, OU=\"(c) 2015 Entrust, Inc. - for authorized use only\", OU=See www.entrust.net/legal-terms, O=\"Entrust, Inc.\", C=US (valid from 2015-05-27T11:11:16Z to 2037-12-27T11:41:16Z), CN=Telia Root CA v2, O=Telia Finland Oyj, C=FI (valid from 2018-11-29T11:55:54Z to 2043-11-29T11:55:54Z), CN=Certum Trusted Root CA, OU=Certum Certification Authority, O=Asseco Data Systems S.A., C=PL (valid from 2018-03-16T12:10:13Z to 2043-03-16T12:10:13Z), CN=vTrus ECC Root CA, O=\"iTrusChina Co.,Ltd.\", C=CN (valid from 2018-07-31T07:26:44Z to 2043-07-31T07:26:44Z), CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB (valid from 2008-03-06T00:00:00Z to 2038-01-18T23:59:59Z), CN=ISRG Root X1, O=Internet Security Research Group, C=US (valid from 2015-06-04T11:04:38Z to 2035-06-04T11:04:38Z), CN=ANF Secure Server Root CA, OU=ANF CA Raiz, O=ANF Autoridad de Certificacion, C=ES, SERIALNUMBER=G63287510 (valid from 2019-09-04T10:00:38Z to 2039-08-30T10:00:38Z), CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US (valid from 2006-11-10T00:00:00Z to 2031-11-10T00:00:00Z), CN=TrustCor RootCert CA-1, OU=TrustCor Certificate Authority, O=TrustCor Systems S. de R.L., L=Panama City, ST=Panama, C=PA (valid from 2016-02-04T12:32:16Z to 2029-12-31T17:23:16Z), CN=Security Communication RootCA3, O=\"SECOM Trust Systems CO.,LTD.\", C=JP (valid from 2016-06-16T06:17:16Z to 2038-01-18T06:17:16Z), CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R3 (valid from 2009-03-18T10:00:00Z to 2029-03-18T10:00:00Z), CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE (valid from 2000-05-12T18:46:00Z to 2025-05-12T23:59:00Z), OU=Starfield Class 2 Certification Authority, O=\"Starfield Technologies, Inc.\", C=US (valid from 2004-06-29T17:39:16Z to 2034-06-29T17:39:16Z), CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB (valid from 2004-01-01T00:00:00Z to 2028-12-31T23:59:59Z), OU=AC RAIZ FNMT-RCM, O=FNMT-RCM, C=ES (valid from 2008-10-29T15:59:56Z to 2030-01-01T00:00:00Z), CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE (valid from 1998-09-01T12:00:00Z to 2028-01-28T12:00:00Z), CN=e-Szigno Root CA 2017, OID.2.5.4.97=VATHU-23584497, O=Microsec Ltd., L=Budapest, C=HU (valid from 2017-08-22T12:07:06Z to 2042-08-22T12:07:06Z), CN=AffirmTrust Networking, O=AffirmTrust, C=US (valid from 2010-01-29T14:08:24Z to 2030-12-31T14:08:24Z), CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW (valid from 2012-06-27T06:28:33Z to 2030-12-31T15:59:59Z), CN=AffirmTrust Premium, O=AffirmTrust, C=US (valid from 2010-01-29T14:10:36Z to 2040-12-31T14:10:36Z), CN=BJCA Global Root CA2, O=BEIJING CERTIFICATE AUTHORITY, C=CN (valid from 2019-12-19T03:18:21Z to 2044-12-12T03:18:21Z), CN=DigiCert TLS ECC P384 Root G5, O=\"DigiCert, Inc.\", C=US (valid from 2021-01-15T00:00:00Z to 2046-01-14T23:59:59Z), CN=TWCA Root Certification Authority, OU=Root CA, O=TAIWAN-CA, C=TW (valid from 2008-08-28T07:24:33Z to 2030-12-31T15:59:59Z), CN=GTS Root R4, O=Google Trust Services LLC, C=US (valid from 2016-06-22T00:00:00Z to 2036-06-22T00:00:00Z), CN=SSL.com TLS ECC Root CA 2022, O=SSL Corporation, C=US (valid from 2022-08-25T16:33:48Z to 2046-08-19T16:33:47Z), C=DE, O=Atos, CN=Atos TrustedRoot 2011 (valid from 2011-07-07T14:58:30Z to 2030-12-31T23:59:59Z), CN=SSL.com EV Root Certification Authority RSA R2, O=SSL Corporation, L=Houston, ST=Texas, C=US (valid from 2017-05-31T18:14:37Z to 2042-05-30T18:14:37Z), CN=SecureSign RootCA11, O=\"Japan Certification Services, Inc.\", C=JP (valid from 2009-04-08T04:56:47Z to 2029-04-08T04:56:47Z), CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH (valid from 2006-10-25T08:32:46Z to 2036-10-25T08:32:46Z), CN=Entrust Root Certification Authority - G2, OU=\"(c) 2009 Entrust, Inc. - for authorized use only\", OU=See www.entrust.net/legal-terms, O=\"Entrust, Inc.\", C=US (valid from 2009-07-07T17:25:54Z to 2030-12-07T17:55:54Z), CN=SSL.com Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US (valid from 2016-02-12T18:14:03Z to 2041-02-12T18:14:03Z), OU=Go Daddy Class 2 Certification Authority, O=\"The Go Daddy Group, Inc.\", C=US (valid from 2004-06-29T17:06:20Z to 2034-06-29T17:06:20Z), CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US (valid from 2006-11-10T00:00:00Z to 2031-11-10T00:00:00Z), CN=TrustCor RootCert CA-2, OU=TrustCor Certificate Authority, O=TrustCor Systems S. de R.L., L=Panama City, ST=Panama, C=PA (valid from 2016-02-04T12:32:23Z to 2034-12-31T17:26:39Z), CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1, OU=Kamu Sertifikasyon Merkezi - Kamu SM, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, L=Gebze - Kocaeli, C=TR (valid from 2013-11-25T08:25:55Z to 2043-10-25T08:25:55Z), CN=Secure Global CA, O=SecureTrust Corporation, C=US (valid from 2006-11-07T19:42:28Z to 2029-12-31T19:52:06Z), CN=HARICA TLS ECC Root CA 2021, O=Hellenic Academic and Research Institutions CA, C=GR (valid from 2021-02-19T11:01:10Z to 2045-02-13T11:01:09Z), CN=GTS Root R1, O=Google Trust Services LLC, C=US (valid from 2016-06-22T00:00:00Z to 2036-06-22T00:00:00Z), CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE (valid from 2008-10-01T10:29:56Z to 2033-10-01T23:59:59Z), CN=Certigna Root CA, OU=0002 48146308100036, O=Dhimyotis, C=FR (valid from 2013-10-01T08:32:27Z to 2033-10-01T08:32:27Z), CN=TunTrust Root CA, O=Agence Nationale de Certification Electronique, C=TN (valid from 2019-04-26T08:57:56Z to 2044-04-26T08:57:56Z), CN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US (valid from 2013-08-01T12:00:00Z to 2038-01-15T12:00:00Z), CN=Certainly Root R1, O=Certainly, C=US (valid from 2021-04-01T00:00:00Z to 2046-04-01T00:00:00Z), CN=TrustCor ECA-1, OU=TrustCor Certificate Authority, O=TrustCor Systems S. de R.L., L=Panama City, ST=Panama, C=PA (valid from 2016-02-04T12:32:33Z to 2029-12-31T17:28:07Z), CN=DigiCert TLS RSA4096 Root G5, O=\"DigiCert, Inc.\", C=US (valid from 2021-01-15T00:00:00Z to 2046-01-14T23:59:59Z), CN=GlobalSign Root R46, O=GlobalSign nv-sa, C=BE (valid from 2019-03-20T00:00:00Z to 2046-03-20T00:00:00Z), CN=CFCA EV ROOT, O=China Financial Certification Authority, C=CN (valid from 2012-08-08T03:07:01Z to 2029-12-31T03:07:01Z), C=DE, O=Atos, CN=Atos TrustedRoot Root CA ECC TLS 2021 (valid from 2021-04-22T09:26:23Z to 2041-04-17T09:26:22Z), CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R5 (valid from 2012-11-13T00:00:00Z to 2038-01-19T03:14:07Z), CN=NAVER Global Root Certification Authority, O=NAVER BUSINESS PLATFORM Corp., C=KR (valid from 2017-08-18T08:58:42Z to 2037-08-18T23:59:59Z), CN=Certum Trusted Network CA 2, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL (valid from 2011-10-06T08:39:56Z to 2046-10-06T08:39:56Z), CN=Starfield Root Certificate Authority - G2, O=\"Starfield Technologies, Inc.\", L=Scottsdale, ST=Arizona, C=US (valid from 2009-09-01T00:00:00Z to 2037-12-31T23:59:59Z), CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net (valid from 1999-12-24T17:50:51Z to 2029-07-24T14:15:12Z), CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US (valid from 2014-01-16T17:53:32Z to 2034-01-16T17:53:32Z), CN=TeliaSonera Root CA v1, O=TeliaSonera (valid from 2007-10-18T12:00:50Z to 2032-10-18T12:00:50Z), CN=Go Daddy Root Certificate Authority - G2, O=\"GoDaddy.com, Inc.\", L=Scottsdale, ST=Arizona, C=US (valid from 2009-09-01T00:00:00Z to 2037-12-31T23:59:59Z), CN=GTS Root R3, O=Google Trust Services LLC, C=US (valid from 2016-06-22T00:00:00Z to 2036-06-22T00:00:00Z), CN=Entrust Root Certification Authority, OU=\"(c) 2006 Entrust, Inc.\", OU=www.entrust.net/CPS is incorporated by reference, O=\"Entrust, Inc.\", C=US (valid from 2006-11-27T20:23:42Z to 2026-11-27T20:53:42Z), OU=certSIGN ROOT CA G2, O=CERTSIGN SA, C=RO (valid from 2017-02-06T09:27:35Z to 2042-02-06T09:27:35Z), CN=DigiCert Assured ID Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US (valid from 2013-08-01T12:00:00Z to 2038-01-15T12:00:00Z), CN=SSL.com Root Certification Authority RSA, O=SSL Corporation, L=Houston, ST=Texas, C=US (valid from 2016-02-12T17:39:39Z to 2041-02-12T17:39:39Z), CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R6 (valid from 2014-12-10T00:00:00Z to 2034-12-10T00:00:00Z), CN=Amazon Root CA 4, O=Amazon, C=US (valid from 2015-05-26T00:00:00Z to 2040-05-26T00:00:00Z), CN=BJCA Global Root CA1, O=BEIJING CERTIFICATE AUTHORITY, C=CN (valid from 2019-12-19T03:16:17Z to 2044-12-12T03:16:17Z), CN=OISTE WISeKey Global Root GC CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH (valid from 2017-05-09T09:48:34Z to 2042-05-09T09:58:33Z), CN=CA Disig Root R2, O=Disig a.s., L=Bratislava, C=SK (valid from 2012-07-19T09:15:30Z to 2042-07-19T09:15:30Z), CN=Buypass Class 2 Root CA, O=Buypass AS-983163327, C=NO (valid from 2010-10-26T08:38:03Z to 2040-10-26T08:38:03Z), CN=Hongkong Post Root CA 3, O=Hongkong Post, L=Hong Kong, ST=Hong Kong, C=HK (valid from 2017-06-03T02:29:46Z to 2042-06-03T02:29:46Z), CN=D-TRUST Root Class 3 CA 2 EV 2009, O=D-Trust GmbH, C=DE (valid from 2009-11-05T08:50:46Z to 2029-11-05T08:50:46Z), CN=DigiCert Assured ID Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US (valid from 2013-08-01T12:00:00Z to 2038-01-15T12:00:00Z), CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH (valid from 2006-10-25T08:30:35Z to 2036-10-25T08:30:35Z), CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US (valid from 2010-02-01T00:00:00Z to 2038-01-18T23:59:59Z), OU=certSIGN ROOT CA, O=certSIGN, C=RO (valid from 2006-07-04T17:20:04Z to 2031-07-04T17:20:04Z), CN=IdenTrust Commercial Root CA 1, O=IdenTrust, C=US (valid from 2014-01-16T18:12:23Z to 2034-01-16T18:12:23Z), CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM (valid from 2006-11-24T18:27:00Z to 2031-11-24T18:23:33Z), CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM (valid from 2012-01-12T17:27:44Z to 2042-01-12T17:27:44Z), CN=D-TRUST Root Class 3 CA 2 2009, O=D-Trust GmbH, C=DE (valid from 2009-11-05T08:35:58Z to 2029-11-05T08:35:58Z), CN=vTrus Root CA, O=\"iTrusChina Co.,Ltd.\", C=CN (valid from 2018-07-31T07:24:05Z to 2043-07-31T07:24:05Z), CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US (valid from 2010-02-01T00:00:00Z to 2038-01-18T23:59:59Z), CN=Izenpe.com, O=IZENPE S.A., C=ES (valid from 2007-12-13T13:08:28Z to 2037-12-13T08:27:25Z), CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM (valid from 2006-11-24T19:11:23Z to 2031-11-24T19:06:44Z), CN=Starfield Services Root Certificate Authority - G2, O=\"Starfield Technologies, Inc.\", L=Scottsdale, ST=Arizona, C=US (valid from 2009-09-01T00:00:00Z to 2037-12-31T23:59:59Z), CN=emSign ECC Root CA - C3, O=eMudhra Inc, OU=emSign PKI, C=US (valid from 2018-02-18T18:30:00Z to 2043-02-18T18:30:00Z), CN=OISTE WISeKey Global Root GB CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH (valid from 2014-12-01T15:00:32Z to 2039-12-01T15:10:31Z), CN=Amazon Root CA 3, O=Amazon, C=US (valid from 2015-05-26T00:00:00Z to 2040-05-26T00:00:00Z), CN=SSL.com TLS RSA Root CA 2022, O=SSL Corporation, C=US (valid from 2022-08-25T16:34:22Z to 2046-08-19T16:34:21Z), CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE (valid from 2019-03-20T00:00:00Z to 2046-03-20T00:00:00Z), CN=Microsoft RSA Root Certificate Authority 2017, O=Microsoft Corporation, C=US (valid from 2019-12-18T22:51:22Z to 2042-07-18T23:00:23Z), CN=QuoVadis Root CA 3 G3, O=QuoVadis Limited, C=BM (valid from 2012-01-12T20:26:32Z to 2042-01-12T20:26:32Z), EMAILADDRESS=info@e-szigno.hu, CN=Microsec e-Szigno Root CA 2009, O=Microsec Ltd., L=Budapest, C=HU (valid from 2009-06-16T11:30:18Z to 2029-12-30T11:30:18Z), CN=HARICA TLS RSA Root CA 2021, O=Hellenic Academic and Research Institutions CA, C=GR (valid from 2021-02-19T10:55:38Z to 2045-02-13T10:55:37Z), CN=GLOBALTRUST 2020, O=e-commerce monitoring GmbH, C=AT (valid from 2020-02-10T00:00:00Z to 2040-06-10T00:00:00Z), CN=NetLock Arany (Class Gold) Főtanúsítvány, OU=Tanúsítványkiadók (Certification Services), O=NetLock Kft., L=Budapest, C=HU (valid from 2008-12-11T15:08:21Z to 2028-12-06T15:08:21Z), CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, L=Milan, C=IT (valid from 2011-09-22T11:22:02Z to 2030-09-22T11:22:02Z), CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R4 (valid from 2012-11-13T00:00:00Z to 2038-01-19T03:14:07Z), CN=Certigna, O=Dhimyotis, C=FR (valid from 2007-06-29T15:13:05Z to 2027-06-29T15:13:05Z), CN=Certum EC-384 CA, OU=Certum Certification Authority, O=Asseco Data Systems S.A., C=PL (valid from 2018-03-26T07:24:54Z to 2043-03-26T07:24:54Z), C=ES, O=ACCV, OU=PKIACCV, CN=ACCVRAIZ1 (valid from 2011-05-05T09:37:37Z to 2030-12-31T09:37:37Z), CN=HiPKI Root CA - G1, O=\"Chunghwa Telecom Co., Ltd.\", C=TW (valid from 2019-02-22T09:46:04Z to 2037-12-31T15:59:59Z), CN=GTS Root R2, O=Google Trust Services LLC, C=US (valid from 2016-06-22T00:00:00Z to 2036-06-22T00:00:00Z), CN=SSL.com EV Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US (valid from 2016-02-12T18:15:23Z to 2041-02-12T18:15:23Z), CN=Buypass Class 3 Root CA, O=Buypass AS-983163327, C=NO (valid from 2010-10-26T08:28:58Z to 2040-10-26T08:28:58Z), CN=ISRG Root X2, O=Internet Security Research Group, C=US (valid from 2020-09-04T00:00:00Z to 2040-09-17T16:00:00Z), CN=Security Communication ECC RootCA1, O=\"SECOM Trust Systems CO.,LTD.\", C=JP (valid from 2016-06-16T05:15:28Z to 2038-01-18T05:15:28Z), CN=emSign Root CA - C1, O=eMudhra Inc, OU=emSign PKI, C=US (valid from 2018-02-18T18:30:00Z to 2043-02-18T18:30:00Z), CN=Amazon Root CA 1, O=Amazon, C=US (valid from 2015-05-26T00:00:00Z to 2038-01-17T00:00:00Z), CN=Trustwave Global ECC P384 Certification Authority, O=\"Trustwave Holdings, Inc.\", L=Chicago, ST=Illinois, C=US (valid from 2017-08-23T19:36:43Z to 2042-08-23T19:36:43Z), CN=GDCA TrustAUTH R5 ROOT, O=\"GUANG DONG CERTIFICATE AUTHORITY CO.,LTD.\", C=CN (valid from 2014-11-26T05:13:15Z to 2040-12-31T15:59:59Z), CN=Amazon Root CA 2, O=Amazon, C=US (valid from 2015-05-26T00:00:00Z to 2040-05-26T00:00:00Z), CN=UCA Extended Validation Root, O=UniTrust, C=CN (valid from 2015-03-13T00:00:00Z to 2038-12-31T00:00:00Z), CN=Sectigo Public Server Authentication Root E46, O=Sectigo Limited, C=GB (valid from 2021-03-22T00:00:00Z to 2046-03-21T23:59:59Z), CN=COMODO Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB (valid from 2006-12-01T00:00:00Z to 2029-12-31T23:59:59Z), C=DE, O=Atos, CN=Atos TrustedRoot Root CA RSA TLS 2021 (valid from 2021-04-22T09:21:10Z to 2041-04-17T09:21:09Z), CN=Sectigo Public Server Authentication Root R46, O=Sectigo Limited, C=GB (valid from 2021-03-22T00:00:00Z to 2046-03-21T23:59:59Z), CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB (valid from 2010-01-19T00:00:00Z to 2038-01-18T23:59:59Z), CN=UCA Global G2 Root, O=UniTrust, C=CN (valid from 2016-03-11T00:00:00Z to 2040-12-31T00:00:00Z), CN=Microsoft ECC Root Certificate Authority 2017, O=Microsoft Corporation, C=US (valid from 2019-12-18T23:06:45Z to 2042-07-18T23:16:04Z), CN=AffirmTrust Premium ECC, O=AffirmTrust, C=US (valid from 2010-01-29T14:20:24Z to 2040-12-31T14:20:24Z), CN=D-TRUST BR Root CA 1 2020, O=D-Trust GmbH, C=DE (valid from 2020-02-11T09:45:00Z to 2035-02-11T09:44:59Z), CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE (valid from 2008-10-01T10:40:14Z to 2033-10-01T23:59:59Z), CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US (valid from 2013-08-01T12:00:00Z to 2038-01-15T12:00:00Z), CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL (valid from 2015-10-19T07:43:30Z to 2035-10-19T07:43:30Z)]","trustManagerFactory":null,"ciphers":[]},"timeoutConfig":{"kvMs":2500,"kvDurableMs":10000,"kvScanMs":75000,"managementMs":75000,"queryMs":75000,"viewMs":75000,"searchMs":75000,"analyticsMs":75000,"connectMs":10000,"disconnectMs":10000,"eventingMs":75000,"backupMs":75000},"loggerConfig":{"diagnosticContextEnabled":false},"orphanReporterConfig":{"emitIntervalMs":10000,"sampleSize":10,"queueLength":1024,"enabled":true},"thresholdLoggingTracerConfig":{"enabled":true,"emitIntervalMs":10000,"sampleSize":10,"queueLength":1024,"kvThresholdMs":1,"queryThresholdMs":1000,"searchThresholdMs":1000,"analyticsThresholdMs":1000,"viewThresholdMs":1000,"transactionsThresholdMs":5000},"loggingMeterConfig":{"enabled":true,"emitIntervalMs":600000},"retryStrategy":"BestEffortRetryStrategy","requestTracer":"ThresholdLoggingTracer","meter":"LoggingMeter","numRequestCallbacks":0,"scheduler":"ParallelScheduler","schedulerThreadCount":10,"transactionsConfig":{"durabilityLevel":"MAJORITY","timeoutMs":15000,"cleanupConfig":{"runLostAttemptsCleanupThread":true,"runRegularAttemptsCleanupThread":true,"cleanupWindowMs":60000,"cleanupSet":""},"numAtrs":1024,"metadataCollection":"none","scanConsistency":"none"}} 2024-01-12T18:50:48,863Z [grpc-default-executor-0] DEBUG c.c.c.c.d.i.n.c.DefaultChannelId - -Dio.netty.processId: 80172 (auto-detected) 2024-01-12T18:50:48,865Z [grpc-default-executor-0] DEBUG c.c.c.c.d.i.n.c.DefaultChannelId - -Dio.netty.machineId: bc:d0:74:ff:fe:67:89:55 (auto-detected) 2024-01-12T18:50:48,872Z [grpc-default-executor-0] DEBUG c.c.c.c.d.i.n.b.ChannelInitializerExtensions - -Dio.netty.bootstrap.extensions: null 2024-01-12T18:50:48,887Z [grpc-nio-worker-ELG-6-2] DEBUG c.c.c.c.d.i.n.u.ResourceLeakDetectorFactory - Loaded default ResourceLeakDetector: com.couchbase.client.core.deps.io.netty.util.ResourceLeakDetector@2f92ed49 2024-01-12T18:50:48,931Z [cb-events] DEBUG com.couchbase.endpoint - [com.couchbase.endpoint][EndpointStateChangedEvent] Endpoint changed state from DISCONNECTED to CONNECTING {"coreId":"0xb779dc3600000001","remote":"localhost:18098"} 2024-01-12T18:50:49,057Z [grpc-default-executor-0] DEBUG c.c.c.c.d.i.n.h.s.ReferenceCountedOpenSslContext - verification of certificate failed sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) at java.base/sun.security.validator.Validator.validate(Validator.java:264) at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:285) at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:144) at com.couchbase.client.core.deps.io.netty.handler.ssl.EnhancingX509ExtendedTrustManager.checkServerTrusted(EnhancingX509ExtendedTrustManager.java:69) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslClientContext$ExtendedTrustManagerVerifyCallback.verify(ReferenceCountedOpenSslClientContext.java:235) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslContext$AbstractCertificateVerifier.verify(ReferenceCountedOpenSslContext.java:790) at com.couchbase.client.core.deps.io.netty.internal.tcnative.CertificateVerifierTask.runTask(CertificateVerifierTask.java:36) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:48) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:42) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.runAndResetNeedTask(ReferenceCountedOpenSslEngine.java:1534) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.access$700(ReferenceCountedOpenSslEngine.java:96) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine$TaskDecorator.run(ReferenceCountedOpenSslEngine.java:1509) at com.couchbase.client.core.deps.io.netty.handler.ssl.SslHandler$SslTasksRunner.run(SslHandler.java:1889) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635) at java.base/java.lang.Thread.run(Thread.java:840) Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:148) at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:129) at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ... 17 common frames omitted 2024-01-12T18:50:49,079Z [grpc-default-executor-0] DEBUG c.c.c.c.d.i.n.h.s.ReferenceCountedOpenSslContext - verification of certificate failed sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) at java.base/sun.security.validator.Validator.validate(Validator.java:264) at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:285) at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:144) at com.couchbase.client.core.deps.io.netty.handler.ssl.EnhancingX509ExtendedTrustManager.checkServerTrusted(EnhancingX509ExtendedTrustManager.java:69) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslClientContext$ExtendedTrustManagerVerifyCallback.verify(ReferenceCountedOpenSslClientContext.java:235) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslContext$AbstractCertificateVerifier.verify(ReferenceCountedOpenSslContext.java:790) at com.couchbase.client.core.deps.io.netty.internal.tcnative.CertificateVerifierTask.runTask(CertificateVerifierTask.java:36) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:48) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:42) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.runAndResetNeedTask(ReferenceCountedOpenSslEngine.java:1534) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.access$700(ReferenceCountedOpenSslEngine.java:96) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine$TaskDecorator.run(ReferenceCountedOpenSslEngine.java:1509) at com.couchbase.client.core.deps.io.netty.handler.ssl.SslHandler$SslTasksRunner.run(SslHandler.java:1889) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635) at java.base/java.lang.Thread.run(Thread.java:840) Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:148) at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:129) at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ... 17 common frames omitted 2024-01-12T18:50:49,140Z [cb-events] DEBUG com.couchbase.endpoint - [com.couchbase.endpoint][EndpointStateChangedEvent] Endpoint changed state from CONNECTING to CONNECTING {"coreId":"0xb779dc3600000001","remote":"localhost:18098"} 2024-01-12T18:50:50,042Z [grpc-default-executor-0] DEBUG c.c.c.c.d.i.n.h.s.ReferenceCountedOpenSslContext - verification of certificate failed sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) at java.base/sun.security.validator.Validator.validate(Validator.java:264) at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:285) at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:144) at com.couchbase.client.core.deps.io.netty.handler.ssl.EnhancingX509ExtendedTrustManager.checkServerTrusted(EnhancingX509ExtendedTrustManager.java:69) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslClientContext$ExtendedTrustManagerVerifyCallback.verify(ReferenceCountedOpenSslClientContext.java:235) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslContext$AbstractCertificateVerifier.verify(ReferenceCountedOpenSslContext.java:790) at com.couchbase.client.core.deps.io.netty.internal.tcnative.CertificateVerifierTask.runTask(CertificateVerifierTask.java:36) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:48) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:42) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.runAndResetNeedTask(ReferenceCountedOpenSslEngine.java:1534) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.access$700(ReferenceCountedOpenSslEngine.java:96) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine$TaskDecorator.run(ReferenceCountedOpenSslEngine.java:1509) at com.couchbase.client.core.deps.io.netty.handler.ssl.SslHandler$SslTasksRunner.run(SslHandler.java:1889) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635) at java.base/java.lang.Thread.run(Thread.java:840) Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:148) at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:129) at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ... 17 common frames omitted 2024-01-12T18:50:50,065Z [grpc-default-executor-0] DEBUG c.c.c.c.d.i.n.h.s.ReferenceCountedOpenSslContext - verification of certificate failed sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) at java.base/sun.security.validator.Validator.validate(Validator.java:264) at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:285) at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:144) at com.couchbase.client.core.deps.io.netty.handler.ssl.EnhancingX509ExtendedTrustManager.checkServerTrusted(EnhancingX509ExtendedTrustManager.java:69) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslClientContext$ExtendedTrustManagerVerifyCallback.verify(ReferenceCountedOpenSslClientContext.java:235) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslContext$AbstractCertificateVerifier.verify(ReferenceCountedOpenSslContext.java:790) at com.couchbase.client.core.deps.io.netty.internal.tcnative.CertificateVerifierTask.runTask(CertificateVerifierTask.java:36) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:48) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:42) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.runAndResetNeedTask(ReferenceCountedOpenSslEngine.java:1534) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.access$700(ReferenceCountedOpenSslEngine.java:96) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine$TaskDecorator.run(ReferenceCountedOpenSslEngine.java:1509) at com.couchbase.client.core.deps.io.netty.handler.ssl.SslHandler$SslTasksRunner.run(SslHandler.java:1889) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635) at java.base/java.lang.Thread.run(Thread.java:840) Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:148) at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:129) at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ... 17 common frames omitted 2024-01-12T18:50:51,527Z [grpc-default-executor-0] DEBUG c.c.c.c.d.i.n.h.s.ReferenceCountedOpenSslContext - verification of certificate failed sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) at java.base/sun.security.validator.Validator.validate(Validator.java:264) at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:285) at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:144) at com.couchbase.client.core.deps.io.netty.handler.ssl.EnhancingX509ExtendedTrustManager.checkServerTrusted(EnhancingX509ExtendedTrustManager.java:69) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslClientContext$ExtendedTrustManagerVerifyCallback.verify(ReferenceCountedOpenSslClientContext.java:235) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslContext$AbstractCertificateVerifier.verify(ReferenceCountedOpenSslContext.java:790) at com.couchbase.client.core.deps.io.netty.internal.tcnative.CertificateVerifierTask.runTask(CertificateVerifierTask.java:36) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:48) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:42) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.runAndResetNeedTask(ReferenceCountedOpenSslEngine.java:1534) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.access$700(ReferenceCountedOpenSslEngine.java:96) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine$TaskDecorator.run(ReferenceCountedOpenSslEngine.java:1509) at com.couchbase.client.core.deps.io.netty.handler.ssl.SslHandler$SslTasksRunner.run(SslHandler.java:1889) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635) at java.base/java.lang.Thread.run(Thread.java:840) Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:148) at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:129) at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ... 17 common frames omitted 2024-01-12T18:50:51,542Z [grpc-default-executor-0] DEBUG c.c.c.c.d.i.n.h.s.ReferenceCountedOpenSslContext - verification of certificate failed sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) at java.base/sun.security.validator.Validator.validate(Validator.java:264) at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:285) at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:144) at com.couchbase.client.core.deps.io.netty.handler.ssl.EnhancingX509ExtendedTrustManager.checkServerTrusted(EnhancingX509ExtendedTrustManager.java:69) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslClientContext$ExtendedTrustManagerVerifyCallback.verify(ReferenceCountedOpenSslClientContext.java:235) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslContext$AbstractCertificateVerifier.verify(ReferenceCountedOpenSslContext.java:790) at com.couchbase.client.core.deps.io.netty.internal.tcnative.CertificateVerifierTask.runTask(CertificateVerifierTask.java:36) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:48) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:42) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.runAndResetNeedTask(ReferenceCountedOpenSslEngine.java:1534) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.access$700(ReferenceCountedOpenSslEngine.java:96) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine$TaskDecorator.run(ReferenceCountedOpenSslEngine.java:1509) at com.couchbase.client.core.deps.io.netty.handler.ssl.SslHandler$SslTasksRunner.run(SslHandler.java:1889) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635) at java.base/java.lang.Thread.run(Thread.java:840) Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:148) at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:129) at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ... 17 common frames omitted 2024-01-12T18:50:54,065Z [grpc-default-executor-0] DEBUG c.c.c.c.d.i.n.h.s.ReferenceCountedOpenSslContext - verification of certificate failed sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) at java.base/sun.security.validator.Validator.validate(Validator.java:264) at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:285) at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:144) at com.couchbase.client.core.deps.io.netty.handler.ssl.EnhancingX509ExtendedTrustManager.checkServerTrusted(EnhancingX509ExtendedTrustManager.java:69) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslClientContext$ExtendedTrustManagerVerifyCallback.verify(ReferenceCountedOpenSslClientContext.java:235) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslContext$AbstractCertificateVerifier.verify(ReferenceCountedOpenSslContext.java:790) at com.couchbase.client.core.deps.io.netty.internal.tcnative.CertificateVerifierTask.runTask(CertificateVerifierTask.java:36) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:48) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:42) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.runAndResetNeedTask(ReferenceCountedOpenSslEngine.java:1534) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.access$700(ReferenceCountedOpenSslEngine.java:96) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine$TaskDecorator.run(ReferenceCountedOpenSslEngine.java:1509) at com.couchbase.client.core.deps.io.netty.handler.ssl.SslHandler$SslTasksRunner.run(SslHandler.java:1889) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635) at java.base/java.lang.Thread.run(Thread.java:840) Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:148) at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:129) at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ... 17 common frames omitted 2024-01-12T18:50:54,089Z [grpc-default-executor-0] DEBUG c.c.c.c.d.i.n.h.s.ReferenceCountedOpenSslContext - verification of certificate failed sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) at java.base/sun.security.validator.Validator.validate(Validator.java:264) at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:285) at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:144) at com.couchbase.client.core.deps.io.netty.handler.ssl.EnhancingX509ExtendedTrustManager.checkServerTrusted(EnhancingX509ExtendedTrustManager.java:69) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslClientContext$ExtendedTrustManagerVerifyCallback.verify(ReferenceCountedOpenSslClientContext.java:235) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslContext$AbstractCertificateVerifier.verify(ReferenceCountedOpenSslContext.java:790) at com.couchbase.client.core.deps.io.netty.internal.tcnative.CertificateVerifierTask.runTask(CertificateVerifierTask.java:36) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:48) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:42) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.runAndResetNeedTask(ReferenceCountedOpenSslEngine.java:1534) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.access$700(ReferenceCountedOpenSslEngine.java:96) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine$TaskDecorator.run(ReferenceCountedOpenSslEngine.java:1509) at com.couchbase.client.core.deps.io.netty.handler.ssl.SslHandler$SslTasksRunner.run(SslHandler.java:1889) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635) at java.base/java.lang.Thread.run(Thread.java:840) Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:148) at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:129) at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ... 17 common frames omitted 2024-01-12T18:50:58,162Z [grpc-default-executor-0] DEBUG c.c.c.c.d.i.n.h.s.ReferenceCountedOpenSslContext - verification of certificate failed sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) at java.base/sun.security.validator.Validator.validate(Validator.java:264) at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:285) at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:144) at com.couchbase.client.core.deps.io.netty.handler.ssl.EnhancingX509ExtendedTrustManager.checkServerTrusted(EnhancingX509ExtendedTrustManager.java:69) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslClientContext$ExtendedTrustManagerVerifyCallback.verify(ReferenceCountedOpenSslClientContext.java:235) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslContext$AbstractCertificateVerifier.verify(ReferenceCountedOpenSslContext.java:790) at com.couchbase.client.core.deps.io.netty.internal.tcnative.CertificateVerifierTask.runTask(CertificateVerifierTask.java:36) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:48) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:42) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.runAndResetNeedTask(ReferenceCountedOpenSslEngine.java:1534) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.access$700(ReferenceCountedOpenSslEngine.java:96) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine$TaskDecorator.run(ReferenceCountedOpenSslEngine.java:1509) at com.couchbase.client.core.deps.io.netty.handler.ssl.SslHandler$SslTasksRunner.run(SslHandler.java:1889) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635) at java.base/java.lang.Thread.run(Thread.java:840) Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:148) at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:129) at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ... 17 common frames omitted 2024-01-12T18:50:58,180Z [grpc-default-executor-0] DEBUG c.c.c.c.d.i.n.h.s.ReferenceCountedOpenSslContext - verification of certificate failed sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) at java.base/sun.security.validator.Validator.validate(Validator.java:264) at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:285) at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:144) at com.couchbase.client.core.deps.io.netty.handler.ssl.EnhancingX509ExtendedTrustManager.checkServerTrusted(EnhancingX509ExtendedTrustManager.java:69) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslClientContext$ExtendedTrustManagerVerifyCallback.verify(ReferenceCountedOpenSslClientContext.java:235) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslContext$AbstractCertificateVerifier.verify(ReferenceCountedOpenSslContext.java:790) at com.couchbase.client.core.deps.io.netty.internal.tcnative.CertificateVerifierTask.runTask(CertificateVerifierTask.java:36) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:48) at com.couchbase.client.core.deps.io.netty.internal.tcnative.SSLTask.run(SSLTask.java:42) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.runAndResetNeedTask(ReferenceCountedOpenSslEngine.java:1534) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine.access$700(ReferenceCountedOpenSslEngine.java:96) at com.couchbase.client.core.deps.io.netty.handler.ssl.ReferenceCountedOpenSslEngine$TaskDecorator.run(ReferenceCountedOpenSslEngine.java:1509) at com.couchbase.client.core.deps.io.netty.handler.ssl.SslHandler$SslTasksRunner.run(SslHandler.java:1889) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635) at java.base/java.lang.Thread.run(Thread.java:840) Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:148) at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:129) at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ... 17 common frames omitted Exception in thread "main" com.couchbase.client.core.error.UnambiguousTimeoutException: Timed out while waiting for Protostellar endpoint localhost:18098 {} Suppressed: java.lang.Exception: The above exception was originally thrown by another thread at the following location. Process finished with exit code 1